Analysis
-
max time kernel
65s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:33
Static task
static1
Behavioral task
behavioral1
Sample
5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe
Resource
win10v2004-20230220-en
General
-
Target
5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe
-
Size
713KB
-
MD5
6b054922153dbdc8e5a82dc96b0639b5
-
SHA1
2181b7c3b85c639301d4ccba814d4c36092259c5
-
SHA256
5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d
-
SHA512
1ad870131efd16ae5b924ebe101246ac6795b85f8ee65df5a664897eaf9832598584ed2b91f62a5fb9231b9b173e2f57a26b0cfbcac1005d7ace634e79b24243
-
SSDEEP
12288:dSibsV1r1eXRKAaCwprt7hyU/+BGN95KKVLQFkW31fBBv409iS9uB:B4zr6EAaCurt9bGBGN95KlFJ39gc9u
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
jr155826.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr155826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr155826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr155826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr155826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr155826.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr155826.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/3380-158-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-159-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-161-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-163-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-165-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-167-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-169-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-172-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-176-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-178-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-180-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-182-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-184-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-186-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-188-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-190-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-192-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-194-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-196-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-198-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-200-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-202-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-204-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-206-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-208-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-210-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-212-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-214-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-216-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-218-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-220-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline behavioral1/memory/3380-222-0x0000000007280000-0x00000000072BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zinW6705.exejr155826.exeku638698.exelr892963.exepid process 4620 zinW6705.exe 4864 jr155826.exe 3380 ku638698.exe 3768 lr892963.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr155826.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr155826.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exezinW6705.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zinW6705.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinW6705.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4080 3380 WerFault.exe ku638698.exe 3040 3304 WerFault.exe 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr155826.exeku638698.exelr892963.exepid process 4864 jr155826.exe 4864 jr155826.exe 3380 ku638698.exe 3380 ku638698.exe 3768 lr892963.exe 3768 lr892963.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr155826.exeku638698.exelr892963.exedescription pid process Token: SeDebugPrivilege 4864 jr155826.exe Token: SeDebugPrivilege 3380 ku638698.exe Token: SeDebugPrivilege 3768 lr892963.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exezinW6705.exedescription pid process target process PID 3304 wrote to memory of 4620 3304 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe zinW6705.exe PID 3304 wrote to memory of 4620 3304 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe zinW6705.exe PID 3304 wrote to memory of 4620 3304 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe zinW6705.exe PID 4620 wrote to memory of 4864 4620 zinW6705.exe jr155826.exe PID 4620 wrote to memory of 4864 4620 zinW6705.exe jr155826.exe PID 4620 wrote to memory of 3380 4620 zinW6705.exe ku638698.exe PID 4620 wrote to memory of 3380 4620 zinW6705.exe ku638698.exe PID 4620 wrote to memory of 3380 4620 zinW6705.exe ku638698.exe PID 3304 wrote to memory of 3768 3304 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe lr892963.exe PID 3304 wrote to memory of 3768 3304 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe lr892963.exe PID 3304 wrote to memory of 3768 3304 5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe lr892963.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe"C:\Users\Admin\AppData\Local\Temp\5975715aa48f80d94702f93c64e27d07b68345812dd2aa53d4d22e4aa411fa1d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinW6705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinW6705.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr155826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr155826.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku638698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku638698.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 19404⤵
- Program crash
PID:4080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr892963.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr892963.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 4842⤵
- Program crash
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3380 -ip 33801⤵PID:612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3304 -ip 33041⤵PID:3716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c5dd023f8011ccb36487cbb5c9d0badf
SHA1a67e24c344df3cefdd1dc924db45ca67e101e3d4
SHA2567016afd4aa13923a95ff6fd67b2e42b91f55fd31e20930af14f289cd9b19ec0c
SHA5122373e18ce0dc56b3067e3b989fc857e0b1c337dc3bf00e3066c082de5d4879f11d8d4d020473f2b56eeb67e1effb919e5af7442c762c273943a6fc25f58a5412
-
Filesize
175KB
MD5c5dd023f8011ccb36487cbb5c9d0badf
SHA1a67e24c344df3cefdd1dc924db45ca67e101e3d4
SHA2567016afd4aa13923a95ff6fd67b2e42b91f55fd31e20930af14f289cd9b19ec0c
SHA5122373e18ce0dc56b3067e3b989fc857e0b1c337dc3bf00e3066c082de5d4879f11d8d4d020473f2b56eeb67e1effb919e5af7442c762c273943a6fc25f58a5412
-
Filesize
407KB
MD5cabb3463f51c332c467c2ff736fe05bb
SHA1aadc455ffed9978efd77f729064bb0d4b178f595
SHA2564fad65b6cabba38e0ec7b35cd8a81c916f5d73b24e5428a2107e115a1daad86d
SHA512b4146c8234fdfcbf3fdceee02951896dc408f98ffc93a255239e1e6943a1a960c8f29ffaffd70e14fcd4d4c18f64b83603efef8e7615f330082880e6c0aff9d4
-
Filesize
407KB
MD5cabb3463f51c332c467c2ff736fe05bb
SHA1aadc455ffed9978efd77f729064bb0d4b178f595
SHA2564fad65b6cabba38e0ec7b35cd8a81c916f5d73b24e5428a2107e115a1daad86d
SHA512b4146c8234fdfcbf3fdceee02951896dc408f98ffc93a255239e1e6943a1a960c8f29ffaffd70e14fcd4d4c18f64b83603efef8e7615f330082880e6c0aff9d4
-
Filesize
11KB
MD55fa07e8ccf055edf11bd2372900432f0
SHA1ddc5d6fc54d06df47d85955411b5036334f194a0
SHA25681e8f55b18c82e85455874813ef9da8e01a50963ee05cf8a8763c05b146037c6
SHA512353b21e2294e81b3b324e9e2ad7157fbe8ad0ad5e51f2020d1ab080783c20c11ee176240f8a06b37bfc70f694a272981c3fea65729415d7bd0ecd00a7ae272ea
-
Filesize
11KB
MD55fa07e8ccf055edf11bd2372900432f0
SHA1ddc5d6fc54d06df47d85955411b5036334f194a0
SHA25681e8f55b18c82e85455874813ef9da8e01a50963ee05cf8a8763c05b146037c6
SHA512353b21e2294e81b3b324e9e2ad7157fbe8ad0ad5e51f2020d1ab080783c20c11ee176240f8a06b37bfc70f694a272981c3fea65729415d7bd0ecd00a7ae272ea
-
Filesize
380KB
MD56e32a72abf890a2c9a13c750398cc48d
SHA10e684f0273666a9129c94c15c7426dcf803928f4
SHA2568e26a07ce5e3e1a02b7f5eb9f6c8ef802ebc58fb8b2d9c2dd03b63cedfb76082
SHA512a52d4cb4d29f9c5d7029c168ca693b9b844525866eb6944ff72274ae6ba83a2657bade67028e15d16abc2e62a0b20f4470db769fa501ad34624790c9cc08aa77
-
Filesize
380KB
MD56e32a72abf890a2c9a13c750398cc48d
SHA10e684f0273666a9129c94c15c7426dcf803928f4
SHA2568e26a07ce5e3e1a02b7f5eb9f6c8ef802ebc58fb8b2d9c2dd03b63cedfb76082
SHA512a52d4cb4d29f9c5d7029c168ca693b9b844525866eb6944ff72274ae6ba83a2657bade67028e15d16abc2e62a0b20f4470db769fa501ad34624790c9cc08aa77