Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 03:47
Static task
static1
Behavioral task
behavioral1
Sample
c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe
Resource
win10v2004-20230220-en
General
-
Target
c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe
-
Size
689KB
-
MD5
5a68a98ae93f262f72f4d816d1ec606b
-
SHA1
16c70a5de3290458db7bccb591d618cb80f13084
-
SHA256
c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698
-
SHA512
706d461f14ca2216b53ce6bba69b64def713a29032231da4bb0f8965e49e432cc7f9dbbd86f3a06710a3426d2db075a4d35a1aa5b727d2abbbd42b7c629a0929
-
SSDEEP
12288:NMrEy90xqn3pvS7gepMAt0yw65hLuz0SngKHA2Xvnb7xmJGv4Fzgfig8wLbUmcqv:lynU7gexPPfaz0SJH7Xv3xmJGQzgag8q
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro7391.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7391.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7391.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/872-195-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-196-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-198-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-200-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-202-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-204-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-206-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-208-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-210-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-212-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-214-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-216-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-218-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-220-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-222-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-224-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-226-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline behavioral1/memory/872-228-0x0000000006080000-0x00000000060BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un316513.exepro7391.exequ6578.exesi913060.exepid process 2568 un316513.exe 4732 pro7391.exe 872 qu6578.exe 4792 si913060.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7391.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7391.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7391.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exeun316513.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un316513.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un316513.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3144 4732 WerFault.exe pro7391.exe 4816 872 WerFault.exe qu6578.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7391.exequ6578.exesi913060.exepid process 4732 pro7391.exe 4732 pro7391.exe 872 qu6578.exe 872 qu6578.exe 4792 si913060.exe 4792 si913060.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7391.exequ6578.exesi913060.exedescription pid process Token: SeDebugPrivilege 4732 pro7391.exe Token: SeDebugPrivilege 872 qu6578.exe Token: SeDebugPrivilege 4792 si913060.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exeun316513.exedescription pid process target process PID 4412 wrote to memory of 2568 4412 c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe un316513.exe PID 4412 wrote to memory of 2568 4412 c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe un316513.exe PID 4412 wrote to memory of 2568 4412 c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe un316513.exe PID 2568 wrote to memory of 4732 2568 un316513.exe pro7391.exe PID 2568 wrote to memory of 4732 2568 un316513.exe pro7391.exe PID 2568 wrote to memory of 4732 2568 un316513.exe pro7391.exe PID 2568 wrote to memory of 872 2568 un316513.exe qu6578.exe PID 2568 wrote to memory of 872 2568 un316513.exe qu6578.exe PID 2568 wrote to memory of 872 2568 un316513.exe qu6578.exe PID 4412 wrote to memory of 4792 4412 c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe si913060.exe PID 4412 wrote to memory of 4792 4412 c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe si913060.exe PID 4412 wrote to memory of 4792 4412 c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe si913060.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe"C:\Users\Admin\AppData\Local\Temp\c5781f0d82c613adad3eea0b39679e018647fe83a83eaf07540b0b6d24d2d698.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un316513.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un316513.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7391.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 10844⤵
- Program crash
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6578.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 13324⤵
- Program crash
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913060.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4732 -ip 47321⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 872 -ip 8721⤵PID:4904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5114b193b02dc68e48958fcdec72b51df
SHA1f0b60deeae603b94be4f893ec1130d5311e9dcbf
SHA25623af1e689d30f2978d669c430d0aafb3df2aab87bcb4a89b5daf0a32086ce7de
SHA512dc2fa82871201f534a7649ce7f00ca6d5d58c17591bcf4b72b8bf32dff178a8d3e8a22aec871bae03e6e2d3aac1ddb3b85a7e94a9cad7a826753d14915356d97
-
Filesize
175KB
MD5114b193b02dc68e48958fcdec72b51df
SHA1f0b60deeae603b94be4f893ec1130d5311e9dcbf
SHA25623af1e689d30f2978d669c430d0aafb3df2aab87bcb4a89b5daf0a32086ce7de
SHA512dc2fa82871201f534a7649ce7f00ca6d5d58c17591bcf4b72b8bf32dff178a8d3e8a22aec871bae03e6e2d3aac1ddb3b85a7e94a9cad7a826753d14915356d97
-
Filesize
547KB
MD5e5e1d7c4fe027f6195a27d94391c4836
SHA17c13815293ae18e81b0fb6a67676142f83c61efe
SHA256876a3d3b50fb0ad3981bcae830f066e7c3d44463a600b9e2b1d072224f02b02b
SHA512d04e2cc18c044c85af2a310f6f63042743426e573ef5195f27e3576fee4e671092a67e63ff8f43cee150b8ee4b7138f7469906de7487d3e3521d58c3d555d55e
-
Filesize
547KB
MD5e5e1d7c4fe027f6195a27d94391c4836
SHA17c13815293ae18e81b0fb6a67676142f83c61efe
SHA256876a3d3b50fb0ad3981bcae830f066e7c3d44463a600b9e2b1d072224f02b02b
SHA512d04e2cc18c044c85af2a310f6f63042743426e573ef5195f27e3576fee4e671092a67e63ff8f43cee150b8ee4b7138f7469906de7487d3e3521d58c3d555d55e
-
Filesize
291KB
MD562b47c62f741ec500064015f6cad4469
SHA1d910fa8dc4df77a66cf9e9c65f89f1ecf5d88724
SHA256bb16eba3c63756885fa000b89c7605db3936e8efd4f56a889d0b2b597bd89df0
SHA5124db0f9b6ada03c876e77ae16e6c1c1f27b6ae67863fd5ec5a9ff3e9dbaa6d759dde90e24193fa63b27124dff64cb24363af91ec242b5af1fd7bb93d92d1d74db
-
Filesize
291KB
MD562b47c62f741ec500064015f6cad4469
SHA1d910fa8dc4df77a66cf9e9c65f89f1ecf5d88724
SHA256bb16eba3c63756885fa000b89c7605db3936e8efd4f56a889d0b2b597bd89df0
SHA5124db0f9b6ada03c876e77ae16e6c1c1f27b6ae67863fd5ec5a9ff3e9dbaa6d759dde90e24193fa63b27124dff64cb24363af91ec242b5af1fd7bb93d92d1d74db
-
Filesize
345KB
MD5e6c1e4f731e44a8a5e8bef9e73626238
SHA14e3e0e2868aac4d699ab0c4dc6a9f7cd25fcbc72
SHA256617d74e67834b29f2f91404090e449873ebbe2855ba23c3fd78d14111d7c95e6
SHA5126cca80bb29441eb7d8a33076a37d162a4f4a7d0a6f47963941180d36dfa45bacc584cc8715661d533fd161f4abd100bd3fefd42b4b033483fb39d3e4eff1cb68
-
Filesize
345KB
MD5e6c1e4f731e44a8a5e8bef9e73626238
SHA14e3e0e2868aac4d699ab0c4dc6a9f7cd25fcbc72
SHA256617d74e67834b29f2f91404090e449873ebbe2855ba23c3fd78d14111d7c95e6
SHA5126cca80bb29441eb7d8a33076a37d162a4f4a7d0a6f47963941180d36dfa45bacc584cc8715661d533fd161f4abd100bd3fefd42b4b033483fb39d3e4eff1cb68