Analysis
-
max time kernel
56s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 23:34
Static task
static1
Behavioral task
behavioral1
Sample
5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe
Resource
win10-20230220-en
General
-
Target
5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe
-
Size
700KB
-
MD5
c8737d4d6b65d292b244a8b6bc5f57a5
-
SHA1
3812badf8205f93e666985b4c6c6d59867bf56be
-
SHA256
5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8
-
SHA512
3f716f256b6ba5d1670a7fac524023f5fbb82c62c9f8c11577c1b1fa06e2ab7099a04632de3031b921d9a3c38bbea04c191c30cc6adfbd01df937b2e92c6200a
-
SSDEEP
12288:EMrsy90tye21nPNH/o9D5RcAHOQ8Fg40HZrsz4XBRpcG+c+9pR:4yqye21FH/MHOQ8W405vXB5F+nR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4210.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1088-178-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/1088-179-0x0000000004B90000-0x0000000004BD4000-memory.dmp family_redline behavioral1/memory/1088-180-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-181-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-183-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-185-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-187-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-189-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-191-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-193-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-196-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-200-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-203-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-205-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-207-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-209-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-211-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-213-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-215-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-217-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/1088-1100-0x0000000004C20000-0x0000000004C30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4960 un333967.exe 3000 pro4210.exe 1088 qu2320.exe 2116 si669063.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4210.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un333967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un333967.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3000 pro4210.exe 3000 pro4210.exe 1088 qu2320.exe 1088 qu2320.exe 2116 si669063.exe 2116 si669063.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3000 pro4210.exe Token: SeDebugPrivilege 1088 qu2320.exe Token: SeDebugPrivilege 2116 si669063.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4960 1736 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe 66 PID 1736 wrote to memory of 4960 1736 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe 66 PID 1736 wrote to memory of 4960 1736 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe 66 PID 4960 wrote to memory of 3000 4960 un333967.exe 67 PID 4960 wrote to memory of 3000 4960 un333967.exe 67 PID 4960 wrote to memory of 3000 4960 un333967.exe 67 PID 4960 wrote to memory of 1088 4960 un333967.exe 68 PID 4960 wrote to memory of 1088 4960 un333967.exe 68 PID 4960 wrote to memory of 1088 4960 un333967.exe 68 PID 1736 wrote to memory of 2116 1736 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe 70 PID 1736 wrote to memory of 2116 1736 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe 70 PID 1736 wrote to memory of 2116 1736 5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe"C:\Users\Admin\AppData\Local\Temp\5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333967.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2320.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2320.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si669063.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si669063.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD550a92857cfdf272e4712fddfeaee256a
SHA1fefc8a7218c7ad1fac0f9ad0b2b814c4020fefea
SHA256e8c7feca30efacce03537c43c45e88f0becbc87f15fb596f45d0ba1e70b0e938
SHA51227e4e824126b5b19aea548542c5144063757feccd74c6cb695c6a557eb27650f52a73e56aabd402c51bde4201d8a37df55d5ea1e6d20f2599d13af156eca6e42
-
Filesize
175KB
MD550a92857cfdf272e4712fddfeaee256a
SHA1fefc8a7218c7ad1fac0f9ad0b2b814c4020fefea
SHA256e8c7feca30efacce03537c43c45e88f0becbc87f15fb596f45d0ba1e70b0e938
SHA51227e4e824126b5b19aea548542c5144063757feccd74c6cb695c6a557eb27650f52a73e56aabd402c51bde4201d8a37df55d5ea1e6d20f2599d13af156eca6e42
-
Filesize
558KB
MD582d15008b6e714e27f993b1b663c32a3
SHA12c3dfb2ccf7c5b393895603b93ec81eb39f6c1b5
SHA2562f5e6ec5ef018c94fc91e015a7e6cba774e4f6b099aa52f8464406e3caff953d
SHA512a2f1d2c41eb0fe42d641a64ea6e31e909cf76eb9cb12e86dd51c3c4f83f0fff10c837e39402586eb38db272de8e9496409a1971fec4fc317111cfd0e0f140b6d
-
Filesize
558KB
MD582d15008b6e714e27f993b1b663c32a3
SHA12c3dfb2ccf7c5b393895603b93ec81eb39f6c1b5
SHA2562f5e6ec5ef018c94fc91e015a7e6cba774e4f6b099aa52f8464406e3caff953d
SHA512a2f1d2c41eb0fe42d641a64ea6e31e909cf76eb9cb12e86dd51c3c4f83f0fff10c837e39402586eb38db272de8e9496409a1971fec4fc317111cfd0e0f140b6d
-
Filesize
307KB
MD515e20b0fd45cd4e239df8060c7c05af8
SHA14600a19c38c3ae1e5453bb5fc3f73534fa33da3a
SHA256c961d2f6adc526cd12c16b4bd1a60c01c5e901746decf83f697ed7a8ccbc4dd3
SHA5123689a80ad44223c9e8123792c991008b844aa377b7f3c6ab71c8364bd794b80c828ced7228720c4e77ce829619c890bcbf8c62890e305b1794a3c1babb704842
-
Filesize
307KB
MD515e20b0fd45cd4e239df8060c7c05af8
SHA14600a19c38c3ae1e5453bb5fc3f73534fa33da3a
SHA256c961d2f6adc526cd12c16b4bd1a60c01c5e901746decf83f697ed7a8ccbc4dd3
SHA5123689a80ad44223c9e8123792c991008b844aa377b7f3c6ab71c8364bd794b80c828ced7228720c4e77ce829619c890bcbf8c62890e305b1794a3c1babb704842
-
Filesize
365KB
MD58eccc05196ec9228610a8a5723fa7afa
SHA1e2b7c68fc696252bb2c6c7c999e48af680b947ef
SHA256f4618aafb604c376bcf7e8f996a97706965780ddf4af0f6c8ac103bc0af030ed
SHA512ce0409df6081f1375e973e04916f6fc310b0378277d55e92498e70a98da0b3463b5be24bf3649dc66d94cdfa7bf92fff732ed13d827e8f8eb7611f409b0ee9d6
-
Filesize
365KB
MD58eccc05196ec9228610a8a5723fa7afa
SHA1e2b7c68fc696252bb2c6c7c999e48af680b947ef
SHA256f4618aafb604c376bcf7e8f996a97706965780ddf4af0f6c8ac103bc0af030ed
SHA512ce0409df6081f1375e973e04916f6fc310b0378277d55e92498e70a98da0b3463b5be24bf3649dc66d94cdfa7bf92fff732ed13d827e8f8eb7611f409b0ee9d6