Analysis
-
max time kernel
57s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 17:02
Static task
static1
Behavioral task
behavioral1
Sample
5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe
Resource
win10-20230220-en
General
-
Target
5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe
-
Size
695KB
-
MD5
8254d38d6a048b49526386b56a70ede3
-
SHA1
fd392ca3e6782cb0488cd476550c442d5a178579
-
SHA256
5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0
-
SHA512
7f7f43a0b742b2e87446671f1d3cea3192f06d5c15477da1219ede33fd8ade1ae29557d81e5de4d8270531139176418b84f677de369b3e62a8b913deef4cd7f4
-
SSDEEP
12288:WMrsy907/5Qv4zATq1baX9KjrDhmApdnhRAQs6yIoo+qkmXfHRhuD:iyMuv4zaSY9KjrdXhRAQs/to+qkmXfH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6487.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/2056-176-0x0000000002360000-0x00000000023A6000-memory.dmp family_redline behavioral1/memory/2056-177-0x0000000002650000-0x0000000002694000-memory.dmp family_redline behavioral1/memory/2056-179-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-178-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-181-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-183-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-185-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-187-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-189-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-191-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-193-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-195-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-197-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-199-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-201-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-203-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-205-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-207-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-209-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-211-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2056-1097-0x00000000023F0000-0x0000000002400000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4108 un826905.exe 2072 pro6487.exe 2056 qu5155.exe 4544 si658971.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6487.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un826905.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un826905.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2072 pro6487.exe 2072 pro6487.exe 2056 qu5155.exe 2056 qu5155.exe 4544 si658971.exe 4544 si658971.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2072 pro6487.exe Token: SeDebugPrivilege 2056 qu5155.exe Token: SeDebugPrivilege 4544 si658971.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4108 3612 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe 66 PID 3612 wrote to memory of 4108 3612 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe 66 PID 3612 wrote to memory of 4108 3612 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe 66 PID 4108 wrote to memory of 2072 4108 un826905.exe 67 PID 4108 wrote to memory of 2072 4108 un826905.exe 67 PID 4108 wrote to memory of 2072 4108 un826905.exe 67 PID 4108 wrote to memory of 2056 4108 un826905.exe 68 PID 4108 wrote to memory of 2056 4108 un826905.exe 68 PID 4108 wrote to memory of 2056 4108 un826905.exe 68 PID 3612 wrote to memory of 4544 3612 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe 70 PID 3612 wrote to memory of 4544 3612 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe 70 PID 3612 wrote to memory of 4544 3612 5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe"C:\Users\Admin\AppData\Local\Temp\5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826905.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826905.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6487.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658971.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dc637bfb23c5f9db2d1def1dcde7638b
SHA114366dbb4f61df3a7e07e19b5ba2929bbbe7b1d2
SHA25662b8a951f49e5885fb8ca68846d360ab4fa53708dcb5bfcd2741acb365addf37
SHA512fda0d8261d7479f02d98edcb9ac01911cb5fd110b7d9cd4e23d0219c5643438efa7571dfea1829183e2d9b99b81a61a2a2e67c5bab1f531a683aa3bc99587f24
-
Filesize
175KB
MD5dc637bfb23c5f9db2d1def1dcde7638b
SHA114366dbb4f61df3a7e07e19b5ba2929bbbe7b1d2
SHA25662b8a951f49e5885fb8ca68846d360ab4fa53708dcb5bfcd2741acb365addf37
SHA512fda0d8261d7479f02d98edcb9ac01911cb5fd110b7d9cd4e23d0219c5643438efa7571dfea1829183e2d9b99b81a61a2a2e67c5bab1f531a683aa3bc99587f24
-
Filesize
553KB
MD5793d009e7040f64b458806d6a43ff622
SHA146a4bf5e16d421236014c8407ddfaa750a082fc0
SHA256405215ee5603f6fffaf236802da85c6a068887ac9ef72d8cd18cc5d2b4b9db6a
SHA5121cc8cf81952a916fb6bc8eea97643b9717dc16ff645e5ede9eb0f2ab112d4a560e7eb287d3e565750d8491703a38ef84f04f9be55f9d8f0fa7dfa2b37c5be563
-
Filesize
553KB
MD5793d009e7040f64b458806d6a43ff622
SHA146a4bf5e16d421236014c8407ddfaa750a082fc0
SHA256405215ee5603f6fffaf236802da85c6a068887ac9ef72d8cd18cc5d2b4b9db6a
SHA5121cc8cf81952a916fb6bc8eea97643b9717dc16ff645e5ede9eb0f2ab112d4a560e7eb287d3e565750d8491703a38ef84f04f9be55f9d8f0fa7dfa2b37c5be563
-
Filesize
308KB
MD53383303cff8139fd680f1426bf73257f
SHA1b942c309512cba2082ed3133b9b9a07c9051a38c
SHA256350a784dfc995a3151f639b94e06cd8ab3143b7b7e767de1ce60ca2be72f9cd4
SHA5121afc13e2bb42114fb12fcf217c45570397b56e921ea0bd369c6a2bf1388208ad840920b3bf47c3462e64efaf82f91dbbdd5e736f275cd987cc3acdf0a309f158
-
Filesize
308KB
MD53383303cff8139fd680f1426bf73257f
SHA1b942c309512cba2082ed3133b9b9a07c9051a38c
SHA256350a784dfc995a3151f639b94e06cd8ab3143b7b7e767de1ce60ca2be72f9cd4
SHA5121afc13e2bb42114fb12fcf217c45570397b56e921ea0bd369c6a2bf1388208ad840920b3bf47c3462e64efaf82f91dbbdd5e736f275cd987cc3acdf0a309f158
-
Filesize
366KB
MD550885192d99d4c69196d20a99a2939a0
SHA1f866afb8a0bf867afec38eae1f5118b10b1fcee3
SHA256a8bf732340d5be1df56bad43d571f27e43af1260a530c6569c48ed0698046b92
SHA5123283861f5f368c6ad8e0c452999e6f7f1aef46e3af5b48c3a5e4888991c149635e4be531cc008be3789191bf0f83deee382d6233382898016c24c42918c25507
-
Filesize
366KB
MD550885192d99d4c69196d20a99a2939a0
SHA1f866afb8a0bf867afec38eae1f5118b10b1fcee3
SHA256a8bf732340d5be1df56bad43d571f27e43af1260a530c6569c48ed0698046b92
SHA5123283861f5f368c6ad8e0c452999e6f7f1aef46e3af5b48c3a5e4888991c149635e4be531cc008be3789191bf0f83deee382d6233382898016c24c42918c25507