Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:39
Static task
static1
Behavioral task
behavioral1
Sample
5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe
Resource
win10v2004-20230220-en
General
-
Target
5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe
-
Size
701KB
-
MD5
593a1f21bce127775943b2c84ab07865
-
SHA1
a76420fb725eedfd40e9e23c76271c825ebda9fc
-
SHA256
5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39
-
SHA512
483161fe0b8479abfe929d2a53f0e057e1a2024141cfcf21d404723afc7092f6fc2f8c90a7d05bf85e150da2bd084fc88856ea941172b98d9ec7941607693c7d
-
SSDEEP
12288:7Mrsy90FFPYq5mcOLko2NJxm58F7+BvMpbj5o/eYato4o:LyOPYYmccQnF7+18j2mYlB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0171.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3624-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-190-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-193-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-195-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-197-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-199-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-201-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-203-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-205-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-207-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-209-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-211-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-213-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-215-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-217-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-219-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-221-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline behavioral1/memory/3624-223-0x0000000004CC0000-0x0000000004CFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 548 un435714.exe 2120 pro0171.exe 3624 qu0177.exe 764 si204951.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0171.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0171.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un435714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un435714.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3144 2120 WerFault.exe 84 4832 3624 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2120 pro0171.exe 2120 pro0171.exe 3624 qu0177.exe 3624 qu0177.exe 764 si204951.exe 764 si204951.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2120 pro0171.exe Token: SeDebugPrivilege 3624 qu0177.exe Token: SeDebugPrivilege 764 si204951.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1176 wrote to memory of 548 1176 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe 83 PID 1176 wrote to memory of 548 1176 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe 83 PID 1176 wrote to memory of 548 1176 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe 83 PID 548 wrote to memory of 2120 548 un435714.exe 84 PID 548 wrote to memory of 2120 548 un435714.exe 84 PID 548 wrote to memory of 2120 548 un435714.exe 84 PID 548 wrote to memory of 3624 548 un435714.exe 93 PID 548 wrote to memory of 3624 548 un435714.exe 93 PID 548 wrote to memory of 3624 548 un435714.exe 93 PID 1176 wrote to memory of 764 1176 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe 98 PID 1176 wrote to memory of 764 1176 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe 98 PID 1176 wrote to memory of 764 1176 5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe"C:\Users\Admin\AppData\Local\Temp\5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435714.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0171.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0171.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 10644⤵
- Program crash
PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0177.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0177.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 13204⤵
- Program crash
PID:4832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si204951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si204951.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2120 -ip 21201⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3624 -ip 36241⤵PID:2592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b682222832457e66cba17500ece81d06
SHA150d5ce36b1b3a300d4da0954859e8c296634e94b
SHA256bf7271be34d00f60aea85abb2c6d4be96ec9879415a59447973227b21cd4c4dc
SHA512ad992c5714fbb85b3298d91bdcbf643540ccfd27610e3ec54d09aa918b81198e184376d1e17dca861b62644249d674d2302f7eb3eba00569aa35bcceab517855
-
Filesize
175KB
MD5b682222832457e66cba17500ece81d06
SHA150d5ce36b1b3a300d4da0954859e8c296634e94b
SHA256bf7271be34d00f60aea85abb2c6d4be96ec9879415a59447973227b21cd4c4dc
SHA512ad992c5714fbb85b3298d91bdcbf643540ccfd27610e3ec54d09aa918b81198e184376d1e17dca861b62644249d674d2302f7eb3eba00569aa35bcceab517855
-
Filesize
558KB
MD516d609e05110f1c8686fc98f73e94e35
SHA1e84e5d07f936efc602496458ee8d9446fda03138
SHA25625189ee8ffc022e215daed336f7b23500884255c47004614b7d812b4c225b061
SHA51225398007408b6554bc66570a6bce81fed710a203fa5ce33d1bacfec8a89d2b9b090ff4ad67f178686677ca3dd97ab6356dae4edc31f73d10e0c1325ce9991acb
-
Filesize
558KB
MD516d609e05110f1c8686fc98f73e94e35
SHA1e84e5d07f936efc602496458ee8d9446fda03138
SHA25625189ee8ffc022e215daed336f7b23500884255c47004614b7d812b4c225b061
SHA51225398007408b6554bc66570a6bce81fed710a203fa5ce33d1bacfec8a89d2b9b090ff4ad67f178686677ca3dd97ab6356dae4edc31f73d10e0c1325ce9991acb
-
Filesize
307KB
MD5a7419b4b488c9174ef53a9b59748a3b3
SHA1e149773b612c002640769aa659cccfb410890469
SHA256e88446d137a9d3280e28b4b7d152b5004efe3ed4291aa334ac8da68b4dbcb5e2
SHA51213d655619ca9de2e5869326b58ef99814d11a3e882fdfdaed70874c6d156007aab34a864f32e5d02038f397ddd3f916b5502c9096cced7a26bde9c7e912d9860
-
Filesize
307KB
MD5a7419b4b488c9174ef53a9b59748a3b3
SHA1e149773b612c002640769aa659cccfb410890469
SHA256e88446d137a9d3280e28b4b7d152b5004efe3ed4291aa334ac8da68b4dbcb5e2
SHA51213d655619ca9de2e5869326b58ef99814d11a3e882fdfdaed70874c6d156007aab34a864f32e5d02038f397ddd3f916b5502c9096cced7a26bde9c7e912d9860
-
Filesize
365KB
MD51a92986d6edf0b913168e28305d966f2
SHA178cdab661d47068a1ce4e504772fa1068738d015
SHA256bc51801697c7cfbc0a6ed237516ca804b2a97b91e1dd6e400d8e2278bd48fb0d
SHA5123e724b1de1bf58256ba3a0b5f703ba236a43a92612cd45a4dbb46454251ddcf1824cdd76634397da32e063e1fa96d31a66c5745d38192a56389e0d497afac44c
-
Filesize
365KB
MD51a92986d6edf0b913168e28305d966f2
SHA178cdab661d47068a1ce4e504772fa1068738d015
SHA256bc51801697c7cfbc0a6ed237516ca804b2a97b91e1dd6e400d8e2278bd48fb0d
SHA5123e724b1de1bf58256ba3a0b5f703ba236a43a92612cd45a4dbb46454251ddcf1824cdd76634397da32e063e1fa96d31a66c5745d38192a56389e0d497afac44c