Analysis
-
max time kernel
106s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 18:55
Static task
static1
Behavioral task
behavioral1
Sample
5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe
Resource
win10v2004-20230220-en
General
-
Target
5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe
-
Size
695KB
-
MD5
4be8a89a6906559812324881b2c02ebc
-
SHA1
8aa2dc81b42b20c13bfc0a339f8ee629129601a2
-
SHA256
5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a
-
SHA512
cba88bb180a7154069d141c1a834173db92d5758c39e242f6ab7838b35a86dce35ad5fc9331b0f6b081222937317a04a58a88ec852a7d31944c961ffb4370c45
-
SSDEEP
12288:EMrTy90nPvxcAQBbQjxNDtx9yJXuPly8WBIb0Izz6MJ6UahHB:HytAbnxyXely8WawwzdcX9B
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5619.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/616-191-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-193-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-198-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-200-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-202-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-208-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-206-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-204-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-210-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-212-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-214-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-216-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-218-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-220-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-222-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-224-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-226-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline behavioral1/memory/616-228-0x00000000052F0000-0x000000000532F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3572 un410124.exe 2428 pro5619.exe 616 qu6607.exe 4132 si969229.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5619.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un410124.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un410124.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2428 pro5619.exe 2428 pro5619.exe 616 qu6607.exe 616 qu6607.exe 4132 si969229.exe 4132 si969229.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2428 pro5619.exe Token: SeDebugPrivilege 616 qu6607.exe Token: SeDebugPrivilege 4132 si969229.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1828 wrote to memory of 3572 1828 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe 86 PID 1828 wrote to memory of 3572 1828 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe 86 PID 1828 wrote to memory of 3572 1828 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe 86 PID 3572 wrote to memory of 2428 3572 un410124.exe 87 PID 3572 wrote to memory of 2428 3572 un410124.exe 87 PID 3572 wrote to memory of 2428 3572 un410124.exe 87 PID 3572 wrote to memory of 616 3572 un410124.exe 91 PID 3572 wrote to memory of 616 3572 un410124.exe 91 PID 3572 wrote to memory of 616 3572 un410124.exe 91 PID 1828 wrote to memory of 4132 1828 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe 92 PID 1828 wrote to memory of 4132 1828 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe 92 PID 1828 wrote to memory of 4132 1828 5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe"C:\Users\Admin\AppData\Local\Temp\5f220adba649187b87eb749178f20eb62b860437217a027649f9b9218dfe085a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410124.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410124.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5619.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5619.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6607.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si969229.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si969229.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51d629fc343f67e76b39d7bba50029bd0
SHA118dc1c2d8df883ab3ef32a4dc4f46e67d15523b1
SHA256c5df1e6f74711fbbcc183cade85c2b4032b97848d9b9d68cfb8e18e72ec995f6
SHA5126fad5f1e394ec7d34c46e9a366be9f274755966c5e1aab84fe09f95f08f255e9e12af2885d0304d9d047cc33e8633274a93cddd5652a34d289b14237fe6436d7
-
Filesize
175KB
MD51d629fc343f67e76b39d7bba50029bd0
SHA118dc1c2d8df883ab3ef32a4dc4f46e67d15523b1
SHA256c5df1e6f74711fbbcc183cade85c2b4032b97848d9b9d68cfb8e18e72ec995f6
SHA5126fad5f1e394ec7d34c46e9a366be9f274755966c5e1aab84fe09f95f08f255e9e12af2885d0304d9d047cc33e8633274a93cddd5652a34d289b14237fe6436d7
-
Filesize
553KB
MD5102a6f2e7f07edbbd00a7dff07519b53
SHA11ac92af8f591b50bc247a3273d2f7303062d565d
SHA2566d224263e86c1f778e51210a4ae3084cd9fc9998924d5d6155b2ee5e81944116
SHA512a6dbbbb4b0ae8c8501c46156057b49bf2da24ef2c8555b8624c54150d7b05df7bc5f6f9ef91fd8fa7abda72546cd0eebb8dc63cfcf1f2735048f8d4014ec6785
-
Filesize
553KB
MD5102a6f2e7f07edbbd00a7dff07519b53
SHA11ac92af8f591b50bc247a3273d2f7303062d565d
SHA2566d224263e86c1f778e51210a4ae3084cd9fc9998924d5d6155b2ee5e81944116
SHA512a6dbbbb4b0ae8c8501c46156057b49bf2da24ef2c8555b8624c54150d7b05df7bc5f6f9ef91fd8fa7abda72546cd0eebb8dc63cfcf1f2735048f8d4014ec6785
-
Filesize
308KB
MD5b90db39af01e31d31bddfffd8a5b666c
SHA109a1e8cc32f211ebe9f007e418311c7f9d472a1c
SHA256b0f8c66d9215c4025f7b73e7b6b75f1a33d9cafd6b197bc8bdc363dfe1b35fec
SHA5122b783f35ecef1fdd043025627fc18e33aec0bf9c7cfdaaacb75b0d0c09a2cac454f36e85ba9ac6175edbc5567fc37e3328fd8b0380ed0b8073a20c619b7be4c1
-
Filesize
308KB
MD5b90db39af01e31d31bddfffd8a5b666c
SHA109a1e8cc32f211ebe9f007e418311c7f9d472a1c
SHA256b0f8c66d9215c4025f7b73e7b6b75f1a33d9cafd6b197bc8bdc363dfe1b35fec
SHA5122b783f35ecef1fdd043025627fc18e33aec0bf9c7cfdaaacb75b0d0c09a2cac454f36e85ba9ac6175edbc5567fc37e3328fd8b0380ed0b8073a20c619b7be4c1
-
Filesize
366KB
MD5dc5ef97bb599571f9d4a76b32f396b63
SHA1d46c2a97059dc5b219a5862899b9a8e2661f3475
SHA25673e097cf2917ada55cded65e1fd52982a99e443fc8b417f21b1c2206702f033d
SHA512f064d922a640d2c4f9c58b32fea96da4504e76c5efa01174b1bd7da3216ac3a41561106ea73b64c3cbfd43e628795a03043a2c217901a34570fff05d4be96a07
-
Filesize
366KB
MD5dc5ef97bb599571f9d4a76b32f396b63
SHA1d46c2a97059dc5b219a5862899b9a8e2661f3475
SHA25673e097cf2917ada55cded65e1fd52982a99e443fc8b417f21b1c2206702f033d
SHA512f064d922a640d2c4f9c58b32fea96da4504e76c5efa01174b1bd7da3216ac3a41561106ea73b64c3cbfd43e628795a03043a2c217901a34570fff05d4be96a07