Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe
Resource
win10v2004-20230220-en
General
-
Target
5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe
-
Size
696KB
-
MD5
f92dfa9d9649dfc537fd07276c72f5ab
-
SHA1
9d398516266fbd6d108aba61fac4efc9ca997ee9
-
SHA256
5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55
-
SHA512
704d206143e5af79be1eda32d13ff9f07ae4187336a35322dc1907e80417979fd6eb918596b00438b70768c9cbc967712290328087eeeebd74bc56ca6941c0a0
-
SSDEEP
12288:qMrFy905GGuMLJNNO0NQAhnSmBaDzsuvYAkdtn0WuVwptZYI94CBncVI:/ywGX6JHBqAhSmBOAuwAUN0WuStSCaVI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0354.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3780-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-192-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-194-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-197-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-201-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-203-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-205-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-207-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-209-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-211-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-213-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-215-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-217-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-219-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-221-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-223-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-225-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3780-227-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1532 un736006.exe 1940 pro0354.exe 3780 qu5788.exe 64 si714107.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0354.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un736006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un736006.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4280 1940 WerFault.exe 84 988 3780 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1940 pro0354.exe 1940 pro0354.exe 3780 qu5788.exe 3780 qu5788.exe 64 si714107.exe 64 si714107.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1940 pro0354.exe Token: SeDebugPrivilege 3780 qu5788.exe Token: SeDebugPrivilege 64 si714107.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4768 wrote to memory of 1532 4768 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe 83 PID 4768 wrote to memory of 1532 4768 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe 83 PID 4768 wrote to memory of 1532 4768 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe 83 PID 1532 wrote to memory of 1940 1532 un736006.exe 84 PID 1532 wrote to memory of 1940 1532 un736006.exe 84 PID 1532 wrote to memory of 1940 1532 un736006.exe 84 PID 1532 wrote to memory of 3780 1532 un736006.exe 90 PID 1532 wrote to memory of 3780 1532 un736006.exe 90 PID 1532 wrote to memory of 3780 1532 un736006.exe 90 PID 4768 wrote to memory of 64 4768 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe 95 PID 4768 wrote to memory of 64 4768 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe 95 PID 4768 wrote to memory of 64 4768 5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe"C:\Users\Admin\AppData\Local\Temp\5ba769fccc056c3300269f4c0899daea91387e89c2fc17304b06b84c1d6f3d55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un736006.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un736006.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0354.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 10804⤵
- Program crash
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5788.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 15404⤵
- Program crash
PID:988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si714107.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si714107.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1940 -ip 19401⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3780 -ip 37801⤵PID:2888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b9f3431753061e3f4622c18229fe7436
SHA1e61def390e12481bf4b2a13eebcdad1066709473
SHA256cc43607cdf62f7aadb7d7867b434c4508e1b5cdc723543dc8dcbd34abcdcaa33
SHA512a88b1396e27d0e3eb43bc0a525dbef1c305f8eb88a98f8508afc2a2aa1100e2bf36b862d515c2d3c77a1f06e42a3dac65e6fdce32259df9e13d44c01109603df
-
Filesize
175KB
MD5b9f3431753061e3f4622c18229fe7436
SHA1e61def390e12481bf4b2a13eebcdad1066709473
SHA256cc43607cdf62f7aadb7d7867b434c4508e1b5cdc723543dc8dcbd34abcdcaa33
SHA512a88b1396e27d0e3eb43bc0a525dbef1c305f8eb88a98f8508afc2a2aa1100e2bf36b862d515c2d3c77a1f06e42a3dac65e6fdce32259df9e13d44c01109603df
-
Filesize
554KB
MD5e1061b54e30dfdfabd8f49412ecc8d80
SHA1f9786eed809acac69e190d7c3e2a43f3b7448cd0
SHA256ab9b05bf56f165dfccffedb303c8c2dbce504c477bd5e8ade4122f34b8e1161a
SHA512ba8885e30731bae49fe20f490b0ffe68d60cb6bd8b1bac36ef1123bc994d0608fb86fe6abfadc3698ea53b8e1f16739bcea38512b27b2ea708d6cf4f5f8bbae8
-
Filesize
554KB
MD5e1061b54e30dfdfabd8f49412ecc8d80
SHA1f9786eed809acac69e190d7c3e2a43f3b7448cd0
SHA256ab9b05bf56f165dfccffedb303c8c2dbce504c477bd5e8ade4122f34b8e1161a
SHA512ba8885e30731bae49fe20f490b0ffe68d60cb6bd8b1bac36ef1123bc994d0608fb86fe6abfadc3698ea53b8e1f16739bcea38512b27b2ea708d6cf4f5f8bbae8
-
Filesize
347KB
MD5254a6a5a209826e37524ed45b88f7f53
SHA124358f00d98ca44d2559280150f305e4cae88546
SHA2566e91f859327a65d7ea17e00b0c91a6f49c674b247473f772a0b798bb0a3e051e
SHA512a6c34b11d0ae2c98926a89796f2ee3d6ba7e6a21be476c7ac0afdc10e9c6434a7a02ebd49f041784768d1040febe4377235da52c81df992338f88650841cd102
-
Filesize
347KB
MD5254a6a5a209826e37524ed45b88f7f53
SHA124358f00d98ca44d2559280150f305e4cae88546
SHA2566e91f859327a65d7ea17e00b0c91a6f49c674b247473f772a0b798bb0a3e051e
SHA512a6c34b11d0ae2c98926a89796f2ee3d6ba7e6a21be476c7ac0afdc10e9c6434a7a02ebd49f041784768d1040febe4377235da52c81df992338f88650841cd102
-
Filesize
405KB
MD5306ec74eb1f7d997d20e876a0c762d86
SHA19e164ea918b9a2bd651997e1a67982ae07bc0a72
SHA256c374548073077e159b9a33b8bb4c3fbe72329083505c3e81033fd727499adde7
SHA51260202583fc82209a2e7878bbb79cd9bd1ca1b2a0196e91cfa118b8896ad96804049dbeffc341a96f821089fab41eac9599a3824f0fb5b6b752b7c4794d039126
-
Filesize
405KB
MD5306ec74eb1f7d997d20e876a0c762d86
SHA19e164ea918b9a2bd651997e1a67982ae07bc0a72
SHA256c374548073077e159b9a33b8bb4c3fbe72329083505c3e81033fd727499adde7
SHA51260202583fc82209a2e7878bbb79cd9bd1ca1b2a0196e91cfa118b8896ad96804049dbeffc341a96f821089fab41eac9599a3824f0fb5b6b752b7c4794d039126