Analysis
-
max time kernel
111s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe
Resource
win10v2004-20230220-en
General
-
Target
0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe
-
Size
536KB
-
MD5
b7b379de1a821bd3d2de8c581d825db5
-
SHA1
e0e2c1a862cc2cf806dbfac7163878104f62e7a9
-
SHA256
0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286
-
SHA512
d6a44e15f82209bb3c5b1bb16ddd5ba334e081d3eff9dd2a4be0aa5336ddcad4d3492450bf0a786c8b60d72400cf8787214683072512256f0cfb80a3e39c392c
-
SSDEEP
12288:hMr7y90A/8GJTCsH002Yx/2rpt1YjOpKyo9g8l:ayr7JTvUJYB2rpzYjOpO
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw52HX55cH18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw52HX55cH18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw52HX55cH18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw52HX55cH18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw52HX55cH18.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw52HX55cH18.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2264-155-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-156-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-160-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-158-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-164-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-162-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-166-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-168-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-173-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-170-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-176-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-178-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-182-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-184-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-180-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-186-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-190-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-188-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-194-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-192-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-198-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-196-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-206-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-210-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-214-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-216-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-212-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-208-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-204-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-202-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-218-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-200-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-220-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2264-1070-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2352 vLr4909vh.exe 4188 sw52HX55cH18.exe 2264 tJC51jK07.exe 4776 uqG32ZD05.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw52HX55cH18.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vLr4909vh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vLr4909vh.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4188 sw52HX55cH18.exe 4188 sw52HX55cH18.exe 2264 tJC51jK07.exe 2264 tJC51jK07.exe 4776 uqG32ZD05.exe 4776 uqG32ZD05.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4188 sw52HX55cH18.exe Token: SeDebugPrivilege 2264 tJC51jK07.exe Token: SeDebugPrivilege 4776 uqG32ZD05.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2352 4612 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe 86 PID 4612 wrote to memory of 2352 4612 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe 86 PID 4612 wrote to memory of 2352 4612 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe 86 PID 2352 wrote to memory of 4188 2352 vLr4909vh.exe 87 PID 2352 wrote to memory of 4188 2352 vLr4909vh.exe 87 PID 2352 wrote to memory of 2264 2352 vLr4909vh.exe 88 PID 2352 wrote to memory of 2264 2352 vLr4909vh.exe 88 PID 2352 wrote to memory of 2264 2352 vLr4909vh.exe 88 PID 4612 wrote to memory of 4776 4612 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe 90 PID 4612 wrote to memory of 4776 4612 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe 90 PID 4612 wrote to memory of 4776 4612 0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe"C:\Users\Admin\AppData\Local\Temp\0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLr4909vh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLr4909vh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw52HX55cH18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw52HX55cH18.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJC51jK07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJC51jK07.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uqG32ZD05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uqG32ZD05.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58a457a266f4cf034d6d29e52d691508b
SHA1733322bad9498307c2fcf9e01849d64af6972e4a
SHA256c667a3851729512e1e518a5c340efb9f01b46f10339c74bfe011371f1bcd9058
SHA5128fd2ddbfcbf7741deed7511c1087d4b4fa6a2c496cd48ccf9108f92f7969fc6a3e052ff13d05f424977c3528b8915631d2e95f4aae9d87bc38f0a3257a5639d1
-
Filesize
175KB
MD58a457a266f4cf034d6d29e52d691508b
SHA1733322bad9498307c2fcf9e01849d64af6972e4a
SHA256c667a3851729512e1e518a5c340efb9f01b46f10339c74bfe011371f1bcd9058
SHA5128fd2ddbfcbf7741deed7511c1087d4b4fa6a2c496cd48ccf9108f92f7969fc6a3e052ff13d05f424977c3528b8915631d2e95f4aae9d87bc38f0a3257a5639d1
-
Filesize
391KB
MD5bf78df0aacc8d696f61e05b28aa29ab2
SHA130b8ef22403efb7d02ffab965d072f58dfab1fbf
SHA25640700ef85b7d2951edd592dccefdbd292c1ec473e86cf568e2f67ba93b6f83f6
SHA512836bc2351f44654e434ebe31c45b207007764aecebb721e201167eb5218738b0e178f93a6c33230bda9f1420ba38d7edc85c67d80bad35434e339b080432af0a
-
Filesize
391KB
MD5bf78df0aacc8d696f61e05b28aa29ab2
SHA130b8ef22403efb7d02ffab965d072f58dfab1fbf
SHA25640700ef85b7d2951edd592dccefdbd292c1ec473e86cf568e2f67ba93b6f83f6
SHA512836bc2351f44654e434ebe31c45b207007764aecebb721e201167eb5218738b0e178f93a6c33230bda9f1420ba38d7edc85c67d80bad35434e339b080432af0a
-
Filesize
11KB
MD5b0290c12d3f462d90c8ac05fd604eb1c
SHA1b2aeb79cd128f638ee00bbf2800ad75a4a6189eb
SHA25655a2aa7c5a65fd1d92867a0c3366e15980856dfbe25d97ce7193949b4cb3296d
SHA512c7123283333b0b57a773c1204a23f3fe0436da1bd22ae44b6fa668a05fea16ed4b42889b230ec51471faad9451b226eaee9891d20addaa62a71c414a3d2eb460
-
Filesize
11KB
MD5b0290c12d3f462d90c8ac05fd604eb1c
SHA1b2aeb79cd128f638ee00bbf2800ad75a4a6189eb
SHA25655a2aa7c5a65fd1d92867a0c3366e15980856dfbe25d97ce7193949b4cb3296d
SHA512c7123283333b0b57a773c1204a23f3fe0436da1bd22ae44b6fa668a05fea16ed4b42889b230ec51471faad9451b226eaee9891d20addaa62a71c414a3d2eb460
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729