Analysis
-
max time kernel
85s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe
Resource
win10v2004-20230221-en
General
-
Target
2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe
-
Size
726KB
-
MD5
390d75a4715d43ab83c63198e0c1d4e2
-
SHA1
a3e06b2c12c398b5425a135ed359bfa63e312606
-
SHA256
2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b
-
SHA512
a93a1f7b870ad65ccf76ef817ddf94dabfc4fd5453d589c79514cc95c349fa4e557efca9ebda315a3f6f564445bff00b88f3e3956ebde5f95d0a94a9302c13e4
-
SSDEEP
12288:BMr2y90eFCJJ04UxqggkMW2aa0XMNLMRuONa+n2R9/D/AMTHnxuE77ud7l:nyh4U29dYsOPn2RZkOHxu87uP
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r5275kj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r5275kj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection r5275kj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r5275kj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r5275kj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r5275kj.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2904-194-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-195-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-197-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-199-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-201-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-203-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-205-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-207-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-209-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-211-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-213-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-215-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-217-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-219-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-221-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-223-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-225-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline behavioral1/memory/2904-227-0x0000000005070000-0x00000000050AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4940 ycVA8542fR.exe 2448 r5275kj.exe 2904 w81Ha21.exe 4960 xptVf50.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r5275kj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r5275kj.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycVA8542fR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycVA8542fR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 208 2448 WerFault.exe 85 4872 2904 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2448 r5275kj.exe 2448 r5275kj.exe 2904 w81Ha21.exe 2904 w81Ha21.exe 4960 xptVf50.exe 4960 xptVf50.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2448 r5275kj.exe Token: SeDebugPrivilege 2904 w81Ha21.exe Token: SeDebugPrivilege 4960 xptVf50.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2860 wrote to memory of 4940 2860 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe 83 PID 2860 wrote to memory of 4940 2860 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe 83 PID 2860 wrote to memory of 4940 2860 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe 83 PID 4940 wrote to memory of 2448 4940 ycVA8542fR.exe 85 PID 4940 wrote to memory of 2448 4940 ycVA8542fR.exe 85 PID 4940 wrote to memory of 2448 4940 ycVA8542fR.exe 85 PID 4940 wrote to memory of 2904 4940 ycVA8542fR.exe 90 PID 4940 wrote to memory of 2904 4940 ycVA8542fR.exe 90 PID 4940 wrote to memory of 2904 4940 ycVA8542fR.exe 90 PID 2860 wrote to memory of 4960 2860 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe 93 PID 2860 wrote to memory of 4960 2860 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe 93 PID 2860 wrote to memory of 4960 2860 2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe"C:\Users\Admin\AppData\Local\Temp\2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycVA8542fR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycVA8542fR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275kj.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275kj.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 11084⤵
- Program crash
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81Ha21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81Ha21.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 17084⤵
- Program crash
PID:4872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xptVf50.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xptVf50.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2448 -ip 24481⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2904 -ip 29041⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
581KB
MD5f0e9d7d70c2b0c0de1c7b40876b51381
SHA15e9d2613a8d8aa59edb86d844431747f1d05082b
SHA2568f4319eb3738863d11c1d43b59180d2292d395a859ccab09a00776ea28d5e831
SHA512fe8d06594f6a9924aff1ec1a1e0cafae880e5419aed9de4112a3302d08f9f3f8fb865d89abb2f9a2e4ac63578366c1e59108a8484e456073aaa07c6e199baa44
-
Filesize
581KB
MD5f0e9d7d70c2b0c0de1c7b40876b51381
SHA15e9d2613a8d8aa59edb86d844431747f1d05082b
SHA2568f4319eb3738863d11c1d43b59180d2292d395a859ccab09a00776ea28d5e831
SHA512fe8d06594f6a9924aff1ec1a1e0cafae880e5419aed9de4112a3302d08f9f3f8fb865d89abb2f9a2e4ac63578366c1e59108a8484e456073aaa07c6e199baa44
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
392KB
MD5c043039d011fe79d35f7b0bca0e4b9ac
SHA1d9f8d058327a1e2232685832b9785c831b5465dd
SHA2569dee345f969dda3f5c2ba41b9852030043a3c0e03ccea25983c18170a9a1b51c
SHA512032401a08b4f2baf654c0c84d69b9c24821d6497c51f32816920606c458f603188cb3cd0400ce8814d937523765b0e6483a519abb44433bb4af1d6b391839365
-
Filesize
392KB
MD5c043039d011fe79d35f7b0bca0e4b9ac
SHA1d9f8d058327a1e2232685832b9785c831b5465dd
SHA2569dee345f969dda3f5c2ba41b9852030043a3c0e03ccea25983c18170a9a1b51c
SHA512032401a08b4f2baf654c0c84d69b9c24821d6497c51f32816920606c458f603188cb3cd0400ce8814d937523765b0e6483a519abb44433bb4af1d6b391839365