Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/03/2023, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
5c90302cbb280e3a62dfb885f06c0a73.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c90302cbb280e3a62dfb885f06c0a73.exe
Resource
win10v2004-20230220-en
General
-
Target
5c90302cbb280e3a62dfb885f06c0a73.exe
-
Size
536KB
-
MD5
5c90302cbb280e3a62dfb885f06c0a73
-
SHA1
91933b9371b72831311061c52e6eb2e51fd298f1
-
SHA256
38335d1c12c313646a3aa279c3448ff517acda6b20e472e90c544553a5d633be
-
SHA512
c17147bd1cf9b9450884dd11ca4034f5d49eaa22cda62810d07d03f9d7555f124925d56d17b998768193b4ce190b7f4acd3d965badcb51daa307736a469dfda0
-
SSDEEP
12288:bMr4y90L0JNVZhbI57fC/or22ZweiyiA0gQjR+QtaKooi:fyRTVzQ7RrLZweiyiAZ4R7oN
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw95jZ88lZ09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw95jZ88lZ09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw95jZ88lZ09.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw95jZ88lZ09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw95jZ88lZ09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw95jZ88lZ09.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 39 IoCs
resource yara_rule behavioral1/memory/1632-83-0x0000000000CD0000-0x0000000000D16000-memory.dmp family_redline behavioral1/memory/1632-86-0x00000000022E0000-0x0000000002324000-memory.dmp family_redline behavioral1/memory/1632-87-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-88-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-90-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-92-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-94-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-96-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-98-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-100-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-102-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-104-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-106-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-108-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-110-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-112-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-114-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-116-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-118-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-122-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-120-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-124-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-126-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-128-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-130-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-134-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-132-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-136-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-138-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-140-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-142-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-144-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-146-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-148-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-150-0x00000000022E0000-0x000000000231E000-memory.dmp family_redline behavioral1/memory/1632-190-0x0000000004C10000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/1632-192-0x0000000004C10000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/1632-995-0x0000000004C10000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/1632-997-0x0000000004C10000-0x0000000004C50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1584 vwj2367oD.exe 1692 sw95jZ88lZ09.exe 1632 tJp42xx42.exe 2020 uJu83EH35.exe -
Loads dropped DLL 8 IoCs
pid Process 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 1584 vwj2367oD.exe 1584 vwj2367oD.exe 1584 vwj2367oD.exe 1584 vwj2367oD.exe 1632 tJp42xx42.exe 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 2020 uJu83EH35.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features sw95jZ88lZ09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw95jZ88lZ09.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c90302cbb280e3a62dfb885f06c0a73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c90302cbb280e3a62dfb885f06c0a73.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vwj2367oD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vwj2367oD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1692 sw95jZ88lZ09.exe 1692 sw95jZ88lZ09.exe 1632 tJp42xx42.exe 1632 tJp42xx42.exe 2020 uJu83EH35.exe 2020 uJu83EH35.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1692 sw95jZ88lZ09.exe Token: SeDebugPrivilege 1632 tJp42xx42.exe Token: SeDebugPrivilege 2020 uJu83EH35.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1076 wrote to memory of 1584 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 26 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1692 1584 vwj2367oD.exe 27 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1584 wrote to memory of 1632 1584 vwj2367oD.exe 28 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30 PID 1076 wrote to memory of 2020 1076 5c90302cbb280e3a62dfb885f06c0a73.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c90302cbb280e3a62dfb885f06c0a73.exe"C:\Users\Admin\AppData\Local\Temp\5c90302cbb280e3a62dfb885f06c0a73.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD588ed71c9ea2cfc40f286ee45f5dd9706
SHA1571018c26155d7a137f9d137fb12acf44f73b475
SHA256ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525
SHA512ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0
-
Filesize
175KB
MD588ed71c9ea2cfc40f286ee45f5dd9706
SHA1571018c26155d7a137f9d137fb12acf44f73b475
SHA256ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525
SHA512ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0
-
Filesize
391KB
MD5dee73a1b5fe1e66da448bb57d16d3a36
SHA1c1acd6846483c9f26345b02e185c0e0c22a39783
SHA2563cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26
SHA51275853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4
-
Filesize
391KB
MD5dee73a1b5fe1e66da448bb57d16d3a36
SHA1c1acd6846483c9f26345b02e185c0e0c22a39783
SHA2563cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26
SHA51275853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4
-
Filesize
11KB
MD5d4fb3164fc1b8498a1adae8241163056
SHA1a62dffcd8e476fcb39c02f2bad59cc269e1ecf78
SHA25651634dc26530b823523bdc2ef9f3d95feceb82be3b6c80d73847cc04ab5c6a50
SHA512fef8e462b216c2b5a36241713e2fee7bae8e14bee5f8bdd70d2011c926b3d964b59c9e6d0fd0b1578bd63fc4e5ce164d79a1190812a609c6a2cdc6d64295d3b6
-
Filesize
11KB
MD5d4fb3164fc1b8498a1adae8241163056
SHA1a62dffcd8e476fcb39c02f2bad59cc269e1ecf78
SHA25651634dc26530b823523bdc2ef9f3d95feceb82be3b6c80d73847cc04ab5c6a50
SHA512fef8e462b216c2b5a36241713e2fee7bae8e14bee5f8bdd70d2011c926b3d964b59c9e6d0fd0b1578bd63fc4e5ce164d79a1190812a609c6a2cdc6d64295d3b6
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
175KB
MD588ed71c9ea2cfc40f286ee45f5dd9706
SHA1571018c26155d7a137f9d137fb12acf44f73b475
SHA256ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525
SHA512ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0
-
Filesize
175KB
MD588ed71c9ea2cfc40f286ee45f5dd9706
SHA1571018c26155d7a137f9d137fb12acf44f73b475
SHA256ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525
SHA512ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0
-
Filesize
391KB
MD5dee73a1b5fe1e66da448bb57d16d3a36
SHA1c1acd6846483c9f26345b02e185c0e0c22a39783
SHA2563cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26
SHA51275853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4
-
Filesize
391KB
MD5dee73a1b5fe1e66da448bb57d16d3a36
SHA1c1acd6846483c9f26345b02e185c0e0c22a39783
SHA2563cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26
SHA51275853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4
-
Filesize
11KB
MD5d4fb3164fc1b8498a1adae8241163056
SHA1a62dffcd8e476fcb39c02f2bad59cc269e1ecf78
SHA25651634dc26530b823523bdc2ef9f3d95feceb82be3b6c80d73847cc04ab5c6a50
SHA512fef8e462b216c2b5a36241713e2fee7bae8e14bee5f8bdd70d2011c926b3d964b59c9e6d0fd0b1578bd63fc4e5ce164d79a1190812a609c6a2cdc6d64295d3b6
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e