Analysis
-
max time kernel
66s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:24
Static task
static1
Behavioral task
behavioral1
Sample
5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe
Resource
win10v2004-20230221-en
General
-
Target
5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe
-
Size
699KB
-
MD5
509aca804538f3e19a56a4a37089af72
-
SHA1
e73d25a6fd711c55662a6ec2694d37b9cb26be85
-
SHA256
5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5
-
SHA512
3447485a4a050516a27eb7609fb330001830f036ffe910c84878f7a3f0dfc22da4c2c55a58216dc16fbe40aa660605a461cba2f55015e5ad230cb86d46f4c930
-
SSDEEP
12288:bMr7y90C6iXcdPQeq2C5hCKN6jW1zDrM9NwPAiL2alpyzda4sk/:0yz6HPz+PCK6WDrM9NAAY2anEdaO/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7054.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/840-191-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-190-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-193-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-195-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-197-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-199-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-201-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-203-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-205-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-207-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-209-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-211-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-213-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-215-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-217-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-219-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-221-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-223-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/840-228-0x0000000004CD0000-0x0000000004CE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3684 un087903.exe 704 pro7054.exe 840 qu1209.exe 1152 si757073.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7054.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un087903.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un087903.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5056 704 WerFault.exe 83 4648 840 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 704 pro7054.exe 704 pro7054.exe 840 qu1209.exe 840 qu1209.exe 1152 si757073.exe 1152 si757073.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 704 pro7054.exe Token: SeDebugPrivilege 840 qu1209.exe Token: SeDebugPrivilege 1152 si757073.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4320 wrote to memory of 3684 4320 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe 82 PID 4320 wrote to memory of 3684 4320 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe 82 PID 4320 wrote to memory of 3684 4320 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe 82 PID 3684 wrote to memory of 704 3684 un087903.exe 83 PID 3684 wrote to memory of 704 3684 un087903.exe 83 PID 3684 wrote to memory of 704 3684 un087903.exe 83 PID 3684 wrote to memory of 840 3684 un087903.exe 86 PID 3684 wrote to memory of 840 3684 un087903.exe 86 PID 3684 wrote to memory of 840 3684 un087903.exe 86 PID 4320 wrote to memory of 1152 4320 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe 90 PID 4320 wrote to memory of 1152 4320 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe 90 PID 4320 wrote to memory of 1152 4320 5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe"C:\Users\Admin\AppData\Local\Temp\5340e8e4b8f0e7ca7891f874a67eb8c88e368d0a80c3f97a6417cb30607d96b5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un087903.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un087903.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 10124⤵
- Program crash
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1209.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 17764⤵
- Program crash
PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si757073.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si757073.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 704 -ip 7041⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 840 -ip 8401⤵PID:3428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52971445546f379b8b0cac8f2d9982bc0
SHA17b8a3bbaac70fff00a8f5bccab2be42289a3b3a2
SHA25679574a797f9e3b27d40a04aca3fbf90bbc2daa9799c46c75faaf135a76456f2a
SHA512a9bde4c92748bb0740fc2662bc95f72911b67d3c6cd8715cedabc4c88ca05179e88c64ad338d0d91b1301c7bd425ca062cb1fc316149d7aac3839318eb346e76
-
Filesize
175KB
MD52971445546f379b8b0cac8f2d9982bc0
SHA17b8a3bbaac70fff00a8f5bccab2be42289a3b3a2
SHA25679574a797f9e3b27d40a04aca3fbf90bbc2daa9799c46c75faaf135a76456f2a
SHA512a9bde4c92748bb0740fc2662bc95f72911b67d3c6cd8715cedabc4c88ca05179e88c64ad338d0d91b1301c7bd425ca062cb1fc316149d7aac3839318eb346e76
-
Filesize
557KB
MD5ef4c36d95992b2235c1c8b4f0e2a246d
SHA1394c8fb6b85c7a2889c83cca6b2363e2c077fa70
SHA25631ecd3bb987af8414ff9e45b8934ce0ef04cf50ea279776c288a450b743b65a6
SHA512430654beeb3b71f41b9652d4c6997351e1da1191fa838b144fc66a1cfa46180db67a69bc55705d748bae9c9bc0ac17058838a27c313311809c6b77aec35ef0ff
-
Filesize
557KB
MD5ef4c36d95992b2235c1c8b4f0e2a246d
SHA1394c8fb6b85c7a2889c83cca6b2363e2c077fa70
SHA25631ecd3bb987af8414ff9e45b8934ce0ef04cf50ea279776c288a450b743b65a6
SHA512430654beeb3b71f41b9652d4c6997351e1da1191fa838b144fc66a1cfa46180db67a69bc55705d748bae9c9bc0ac17058838a27c313311809c6b77aec35ef0ff
-
Filesize
307KB
MD57a829153cab73ce7b2e5ee4623cca3b0
SHA1f24111c6f5f103b06440b9eab3946c0de31f3c47
SHA256262d08280c099ccb1d1100bbf85621bb60b0b5e5aaf2a923a359d36794114211
SHA512fe37fe5f0928d0625b700da259d4ba61679ff15da7066ef1d29ea9f739a27d77390b3a29c1f447886528d8aadbb4b93aefa9071cf9b739b2d3f4c0a73f2b48fa
-
Filesize
307KB
MD57a829153cab73ce7b2e5ee4623cca3b0
SHA1f24111c6f5f103b06440b9eab3946c0de31f3c47
SHA256262d08280c099ccb1d1100bbf85621bb60b0b5e5aaf2a923a359d36794114211
SHA512fe37fe5f0928d0625b700da259d4ba61679ff15da7066ef1d29ea9f739a27d77390b3a29c1f447886528d8aadbb4b93aefa9071cf9b739b2d3f4c0a73f2b48fa
-
Filesize
366KB
MD553cf9a1db23b94b3220b3722bc6a8660
SHA1aa6f7a53a4335b3e630522fddf165f427e12dc14
SHA256c3ffb3fa5bb794fe4d316144390994dfe9f6918e163290595f40ee03d9fdcaaa
SHA512be9059df1c0e13da7a5d1c4f499cc01e6d2a85c84dec10d430691e8c9a712707251c79d238fcfd3f4510a5040067864146f5283ea866e9c4c8f57b8eefdd8f69
-
Filesize
366KB
MD553cf9a1db23b94b3220b3722bc6a8660
SHA1aa6f7a53a4335b3e630522fddf165f427e12dc14
SHA256c3ffb3fa5bb794fe4d316144390994dfe9f6918e163290595f40ee03d9fdcaaa
SHA512be9059df1c0e13da7a5d1c4f499cc01e6d2a85c84dec10d430691e8c9a712707251c79d238fcfd3f4510a5040067864146f5283ea866e9c4c8f57b8eefdd8f69