Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:33
Static task
static1
Behavioral task
behavioral1
Sample
5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe
Resource
win10v2004-20230220-en
General
-
Target
5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe
-
Size
700KB
-
MD5
af71d23fa23391f4ae7b17e4b0b25d4c
-
SHA1
fc35f4c3b5a4b0db48738d86fa83203f56dfc2b7
-
SHA256
5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf
-
SHA512
61dd94403ce8611fa3f8797f4101fe043f19b0bec8eb630cc411eea23723ec94e6e27987687c197cac1a7176ff123922d4cf802c7325d96a0e46aac35e9b2b0c
-
SSDEEP
12288:+MrIy90sli6ydVrt9KY/XeD9D5wcARCNsfkeTQjgqFs4lFywPcyGQ:GySH7MYXfJfb0fplj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5598.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5598.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1972-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/1972-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1752 un895528.exe 2416 pro5598.exe 1972 qu5243.exe 1456 si477584.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5598.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un895528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un895528.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2092 2416 WerFault.exe 85 3380 1972 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2416 pro5598.exe 2416 pro5598.exe 1972 qu5243.exe 1972 qu5243.exe 1456 si477584.exe 1456 si477584.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2416 pro5598.exe Token: SeDebugPrivilege 1972 qu5243.exe Token: SeDebugPrivilege 1456 si477584.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5044 wrote to memory of 1752 5044 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe 84 PID 5044 wrote to memory of 1752 5044 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe 84 PID 5044 wrote to memory of 1752 5044 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe 84 PID 1752 wrote to memory of 2416 1752 un895528.exe 85 PID 1752 wrote to memory of 2416 1752 un895528.exe 85 PID 1752 wrote to memory of 2416 1752 un895528.exe 85 PID 1752 wrote to memory of 1972 1752 un895528.exe 92 PID 1752 wrote to memory of 1972 1752 un895528.exe 92 PID 1752 wrote to memory of 1972 1752 un895528.exe 92 PID 5044 wrote to memory of 1456 5044 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe 96 PID 5044 wrote to memory of 1456 5044 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe 96 PID 5044 wrote to memory of 1456 5044 5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe"C:\Users\Admin\AppData\Local\Temp\5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5598.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 10844⤵
- Program crash
PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5243.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 13404⤵
- Program crash
PID:3380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477584.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2416 -ip 24161⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1972 -ip 19721⤵PID:2152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD564a455dffdbc0f968c29b58d6c71cdd3
SHA1f95b57d4958f391d5a1d230711b89155b5856944
SHA256a03343f415e0c9fec73eee61a1995cd100bdbc5084c7c008b09dd0da79e70739
SHA51233571587061772a54e35a8f869c663e73decec0a042c966ae9ad22ac474d49fa446c30691ae07dbd644fbf7a3870cd3cb3e1d1b45eadb831da17421e9f4a6b76
-
Filesize
175KB
MD564a455dffdbc0f968c29b58d6c71cdd3
SHA1f95b57d4958f391d5a1d230711b89155b5856944
SHA256a03343f415e0c9fec73eee61a1995cd100bdbc5084c7c008b09dd0da79e70739
SHA51233571587061772a54e35a8f869c663e73decec0a042c966ae9ad22ac474d49fa446c30691ae07dbd644fbf7a3870cd3cb3e1d1b45eadb831da17421e9f4a6b76
-
Filesize
558KB
MD5b87e8c273f356b072c31f06a9cb1a04f
SHA13be77358d8bd7b2762c3b82020c7b76d88de529e
SHA25664bf7e8dbe86528888d08512ea287123fde37e8dc683c9419ad00433cefb9992
SHA512effd6811f966e68ee9de4cfc9e42f137d95cde0913fc26249584c5fbd3ef86710772072dfd18a74b628062ab9cdbd472038c9220c8ed26b9f5ea72450790f523
-
Filesize
558KB
MD5b87e8c273f356b072c31f06a9cb1a04f
SHA13be77358d8bd7b2762c3b82020c7b76d88de529e
SHA25664bf7e8dbe86528888d08512ea287123fde37e8dc683c9419ad00433cefb9992
SHA512effd6811f966e68ee9de4cfc9e42f137d95cde0913fc26249584c5fbd3ef86710772072dfd18a74b628062ab9cdbd472038c9220c8ed26b9f5ea72450790f523
-
Filesize
307KB
MD5a5ad3577a804fe113ec9eadda8b6504f
SHA1aec8e38ff3c453538ad58f36028a9cc1b8abbe84
SHA256ef030d9c07c0e58bddbe73ccce059ef5e48106c4fb196978ff47f281d8579414
SHA512be168077ba0041159a6957e35ac57d07c4ff1e28ba9b8ce316e10bbe3e759712a119b80ae95cad1b14d04b974b88345ccf1a2a5ca2bb0523cc13be8cdecef3f8
-
Filesize
307KB
MD5a5ad3577a804fe113ec9eadda8b6504f
SHA1aec8e38ff3c453538ad58f36028a9cc1b8abbe84
SHA256ef030d9c07c0e58bddbe73ccce059ef5e48106c4fb196978ff47f281d8579414
SHA512be168077ba0041159a6957e35ac57d07c4ff1e28ba9b8ce316e10bbe3e759712a119b80ae95cad1b14d04b974b88345ccf1a2a5ca2bb0523cc13be8cdecef3f8
-
Filesize
365KB
MD568e8cf54d550b18d71327fc2049e6988
SHA1b5627ac6225b16db39761b9b38d8b2aa7b6811c7
SHA2567c30ecb1ca46b18bb151ddfb6d9cc25578e405b035f5d44a13810890240467b9
SHA5127c22d9197ffb968321d9bcdbc70278145dc08c9b51646bb38c68e2c675be7a5dbde1c67fd5d6f5d6b9dd01e70b3248e802d9fdb38b1a0f72ee3906ba3b44a1f8
-
Filesize
365KB
MD568e8cf54d550b18d71327fc2049e6988
SHA1b5627ac6225b16db39761b9b38d8b2aa7b6811c7
SHA2567c30ecb1ca46b18bb151ddfb6d9cc25578e405b035f5d44a13810890240467b9
SHA5127c22d9197ffb968321d9bcdbc70278145dc08c9b51646bb38c68e2c675be7a5dbde1c67fd5d6f5d6b9dd01e70b3248e802d9fdb38b1a0f72ee3906ba3b44a1f8