Analysis
-
max time kernel
65s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:19
Static task
static1
Behavioral task
behavioral1
Sample
5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe
Resource
win10v2004-20230220-en
General
-
Target
5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe
-
Size
700KB
-
MD5
6ac331da05b89cf9ffa4726444d5ed02
-
SHA1
d661c8a2473e4339395af1a6c7b3cb55d0ad5506
-
SHA256
5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12
-
SHA512
26ab5504fd5e91ee8cab151b7ff29ba47dc981dcbaa29bb4e3b340add4265a4bbc3bb9b9671eefcf1aaf4611e335ead08b5c191abbc13a7ff72f159d0f4bfb84
-
SSDEEP
12288:3Mr9y90luSYDqH4Y9NM9s9D5wcANAN+fbqfse7tBZA+PF:2ysdjG9fbre7V1F
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8328.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2436-191-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-192-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-194-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-196-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-198-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-200-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-205-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-204-0x0000000004F40000-0x0000000004F50000-memory.dmp family_redline behavioral1/memory/2436-207-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-209-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-211-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-213-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-215-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-217-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-219-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-221-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-223-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-225-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-227-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/2436-1106-0x0000000004F40000-0x0000000004F50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1760 un743461.exe 4244 pro8328.exe 2436 qu3562.exe 1692 si328873.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8328.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un743461.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un743461.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4076 4244 WerFault.exe 84 2148 2436 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4244 pro8328.exe 4244 pro8328.exe 2436 qu3562.exe 2436 qu3562.exe 1692 si328873.exe 1692 si328873.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4244 pro8328.exe Token: SeDebugPrivilege 2436 qu3562.exe Token: SeDebugPrivilege 1692 si328873.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1760 4804 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe 83 PID 4804 wrote to memory of 1760 4804 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe 83 PID 4804 wrote to memory of 1760 4804 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe 83 PID 1760 wrote to memory of 4244 1760 un743461.exe 84 PID 1760 wrote to memory of 4244 1760 un743461.exe 84 PID 1760 wrote to memory of 4244 1760 un743461.exe 84 PID 1760 wrote to memory of 2436 1760 un743461.exe 90 PID 1760 wrote to memory of 2436 1760 un743461.exe 90 PID 1760 wrote to memory of 2436 1760 un743461.exe 90 PID 4804 wrote to memory of 1692 4804 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe 94 PID 4804 wrote to memory of 1692 4804 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe 94 PID 4804 wrote to memory of 1692 4804 5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe"C:\Users\Admin\AppData\Local\Temp\5b316ecf55ac535593bac4ef48b846fe92e09fa3f4d1a312f8d589b049dddb12.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un743461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un743461.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8328.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 10804⤵
- Program crash
PID:4076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3562.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3562.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 13284⤵
- Program crash
PID:2148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328873.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4244 -ip 42441⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2436 -ip 24361⤵PID:2992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53884f2656efe86949dcefc899fe63452
SHA154f60d6f0ed41aa4a5d19b62dfe027a6182c687e
SHA256da4e70b9299ed52252d0fa7fb5f0e0db83221484c05fb6199946aaaa06963766
SHA512b38fcad3dcd95bb60a3de8722922fbb8bf29c58118a7ee03ca4edb8b31663e28aee7ace3b40ada8a146043b7c34e527a190a1a57fd13f27b67a4669bdbec9b2b
-
Filesize
175KB
MD53884f2656efe86949dcefc899fe63452
SHA154f60d6f0ed41aa4a5d19b62dfe027a6182c687e
SHA256da4e70b9299ed52252d0fa7fb5f0e0db83221484c05fb6199946aaaa06963766
SHA512b38fcad3dcd95bb60a3de8722922fbb8bf29c58118a7ee03ca4edb8b31663e28aee7ace3b40ada8a146043b7c34e527a190a1a57fd13f27b67a4669bdbec9b2b
-
Filesize
558KB
MD5b7a67b6438ddbd96a93bfbf8774ff771
SHA156caf0e4153c1a3b4145f8c938d9b965ce031499
SHA256d65174ab7a86905c17f627b32b221dd76cb3907a9e6c75efe8875ed4fa5bfe9c
SHA512105d90da2f7ea17a2e9145139eadfd1ffd4a8f79439dd3978383b3290c8c19c836f246d8bf205a3ed286520e32e8cd3bbe14531a1d00add051fccd665cd24b26
-
Filesize
558KB
MD5b7a67b6438ddbd96a93bfbf8774ff771
SHA156caf0e4153c1a3b4145f8c938d9b965ce031499
SHA256d65174ab7a86905c17f627b32b221dd76cb3907a9e6c75efe8875ed4fa5bfe9c
SHA512105d90da2f7ea17a2e9145139eadfd1ffd4a8f79439dd3978383b3290c8c19c836f246d8bf205a3ed286520e32e8cd3bbe14531a1d00add051fccd665cd24b26
-
Filesize
307KB
MD5de6f361bc1e4588a3cbb74db347a86df
SHA1fe716a1101f77fb43f838753f23daf0921b072ee
SHA256c589acca5b001a87aeffa23a21c47f2da0376d0ca977b422cd3443ebcfa574aa
SHA51287708836a77b34ff6945d52dcd58c35cf7a3621ca370bc996e88cec1db103fde62156fe278af4e0eb7f207236048ecb40af739aaf4ad8485d2f23278863012ba
-
Filesize
307KB
MD5de6f361bc1e4588a3cbb74db347a86df
SHA1fe716a1101f77fb43f838753f23daf0921b072ee
SHA256c589acca5b001a87aeffa23a21c47f2da0376d0ca977b422cd3443ebcfa574aa
SHA51287708836a77b34ff6945d52dcd58c35cf7a3621ca370bc996e88cec1db103fde62156fe278af4e0eb7f207236048ecb40af739aaf4ad8485d2f23278863012ba
-
Filesize
365KB
MD523878f941b945b94d6934c567650b7e7
SHA199fd9f1505bade21d1ba8e08e9ebc7b7f483ab32
SHA256f71f98d76543296f941d0e1b1ddd6061b97b0b2f9fe82799b650b163960dfdbe
SHA51212648baf1eabef04c3f78b13817acbe337f0f70207c2aaf3b9d189a888c4594296ab99ac852c0c096309a65c0e54b44ae7ac7f69cc1304fdabe239db0bb40cb6
-
Filesize
365KB
MD523878f941b945b94d6934c567650b7e7
SHA199fd9f1505bade21d1ba8e08e9ebc7b7f483ab32
SHA256f71f98d76543296f941d0e1b1ddd6061b97b0b2f9fe82799b650b163960dfdbe
SHA51212648baf1eabef04c3f78b13817acbe337f0f70207c2aaf3b9d189a888c4594296ab99ac852c0c096309a65c0e54b44ae7ac7f69cc1304fdabe239db0bb40cb6