Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe
Resource
win10v2004-20230220-en
General
-
Target
a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe
-
Size
561KB
-
MD5
5a2491869ec421008c3deb5dad60a8f5
-
SHA1
4786af4bb99708f3bf7d7739a49edf936424ea82
-
SHA256
a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7
-
SHA512
2ec4b242f0094a6cfe95bb5e40c295721fef57b79b763ed5a9b13681205ddcfe756c7b5f8f05c9deee235e2600271b3ef62ce4a1449c57d4fb009b26aaed14a5
-
SSDEEP
12288:aMrny90+dr9MU4Quem3MuwhTQRvR3i/MSq3TMdwFJs:By9rmVMTqR3qeTMdw0
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf78ZG34KT28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf78ZG34KT28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf78ZG34KT28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf78ZG34KT28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf78ZG34KT28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf78ZG34KT28.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4772-155-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-156-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-158-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-160-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-162-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-165-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-169-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-171-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-173-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-175-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-177-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-179-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-181-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-183-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-185-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-187-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-189-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-191-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-193-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-195-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-197-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-199-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-201-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-203-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-205-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-207-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-209-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-211-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-213-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-215-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-217-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-219-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4772-221-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 520 vhKn5289kt.exe 1496 sf78ZG34KT28.exe 4772 tf83LG18Gr67.exe 2480 uhGA83Bd64ri.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf78ZG34KT28.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhKn5289kt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhKn5289kt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3428 4772 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1496 sf78ZG34KT28.exe 1496 sf78ZG34KT28.exe 4772 tf83LG18Gr67.exe 4772 tf83LG18Gr67.exe 2480 uhGA83Bd64ri.exe 2480 uhGA83Bd64ri.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1496 sf78ZG34KT28.exe Token: SeDebugPrivilege 4772 tf83LG18Gr67.exe Token: SeDebugPrivilege 2480 uhGA83Bd64ri.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2224 wrote to memory of 520 2224 a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe 86 PID 2224 wrote to memory of 520 2224 a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe 86 PID 2224 wrote to memory of 520 2224 a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe 86 PID 520 wrote to memory of 1496 520 vhKn5289kt.exe 87 PID 520 wrote to memory of 1496 520 vhKn5289kt.exe 87 PID 520 wrote to memory of 4772 520 vhKn5289kt.exe 92 PID 520 wrote to memory of 4772 520 vhKn5289kt.exe 92 PID 520 wrote to memory of 4772 520 vhKn5289kt.exe 92 PID 2224 wrote to memory of 2480 2224 a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe 97 PID 2224 wrote to memory of 2480 2224 a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe 97 PID 2224 wrote to memory of 2480 2224 a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe"C:\Users\Admin\AppData\Local\Temp\a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhKn5289kt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhKn5289kt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf78ZG34KT28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf78ZG34KT28.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83LG18Gr67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83LG18Gr67.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 14324⤵
- Program crash
PID:3428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhGA83Bd64ri.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhGA83Bd64ri.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4772 -ip 47721⤵PID:1144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5e790a3b5f4871d4a1eefccf531b260c7
SHA172d7c22e14add3c5de12871b5a021b2d60f4c888
SHA256ff8785251e6909a09d069ddf0582e2d0213a776ad0a1e66f2761eecb251c9da7
SHA5123fe1935aa48af31c101b6e88973cd648065a0f1d4b5315a3cce0f589a638c76db56dd8208b4b18c983fa690752e9184208f2356b9aea3b608443c0f921bd3daa
-
Filesize
176KB
MD5e790a3b5f4871d4a1eefccf531b260c7
SHA172d7c22e14add3c5de12871b5a021b2d60f4c888
SHA256ff8785251e6909a09d069ddf0582e2d0213a776ad0a1e66f2761eecb251c9da7
SHA5123fe1935aa48af31c101b6e88973cd648065a0f1d4b5315a3cce0f589a638c76db56dd8208b4b18c983fa690752e9184208f2356b9aea3b608443c0f921bd3daa
-
Filesize
416KB
MD59bc64b81e42e6b9487ce143d2037e433
SHA18dc0feffeffe3ea9669817d0b9d5a9bb22177a95
SHA256bce399064d7fdb472d6f9c8bf9ed8a014c9ecc96272b6034974668b9b161b40e
SHA51210396be036a4e844fd47cb1b40092bb7e79be43a10e41b08e60292bd4f779a8e2044a96d93bbf9a1a0a6dafa5d4bd6da0061bed9ed82ca6ac8863c0a6fc26879
-
Filesize
416KB
MD59bc64b81e42e6b9487ce143d2037e433
SHA18dc0feffeffe3ea9669817d0b9d5a9bb22177a95
SHA256bce399064d7fdb472d6f9c8bf9ed8a014c9ecc96272b6034974668b9b161b40e
SHA51210396be036a4e844fd47cb1b40092bb7e79be43a10e41b08e60292bd4f779a8e2044a96d93bbf9a1a0a6dafa5d4bd6da0061bed9ed82ca6ac8863c0a6fc26879
-
Filesize
12KB
MD5163c1fd0cdefbd60262bf301469a2dab
SHA1d437fbf3306084052c9b898d4105ad900661a1a9
SHA256c49e7dbe9577d03c46b8036026441aa142dd8367cb70eabc31400ccd269fb78e
SHA5121027df225cf670615a12e780986eda34323bcbaf485c3deff72d795502be3f1bb4f170ae2f9f81b37c8b8d7f2cee8ea222a76c858ffc04d4e5992d6422a9fee8
-
Filesize
12KB
MD5163c1fd0cdefbd60262bf301469a2dab
SHA1d437fbf3306084052c9b898d4105ad900661a1a9
SHA256c49e7dbe9577d03c46b8036026441aa142dd8367cb70eabc31400ccd269fb78e
SHA5121027df225cf670615a12e780986eda34323bcbaf485c3deff72d795502be3f1bb4f170ae2f9f81b37c8b8d7f2cee8ea222a76c858ffc04d4e5992d6422a9fee8
-
Filesize
419KB
MD56b48a9a5ca542b20633aff65ae0e882a
SHA1c5e08fe68b82b937492e9686347567a37d606a48
SHA256763b078fafe64dce994f8843a962741a00784eb2adcd8de0a1865f459e454355
SHA51205e452f2b6540bc566b8d3b956c1e1ca8b645be991583374a559bd84fcd13c1ec79526a5b7dfb01369b0120793d1ac6aa4b5b956a5311ac504ed79cd0ea9e2e5
-
Filesize
419KB
MD56b48a9a5ca542b20633aff65ae0e882a
SHA1c5e08fe68b82b937492e9686347567a37d606a48
SHA256763b078fafe64dce994f8843a962741a00784eb2adcd8de0a1865f459e454355
SHA51205e452f2b6540bc566b8d3b956c1e1ca8b645be991583374a559bd84fcd13c1ec79526a5b7dfb01369b0120793d1ac6aa4b5b956a5311ac504ed79cd0ea9e2e5