Analysis
-
max time kernel
52s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-04-2023 16:00
Static task
static1
Behavioral task
behavioral1
Sample
5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe
Resource
win10-20230220-en
General
-
Target
5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe
-
Size
659KB
-
MD5
fbdc8b96f6cd66dd8cf0004115402459
-
SHA1
bba4b4a695968244222cbab87e57af578ebb0903
-
SHA256
5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9
-
SHA512
4e4794ea11924f0e058b300dac78f133e4edebc20700a88da2276163c6b35aa2fa8100d60885176f75eb99be989798eb54a8afb6d8a2e3fa737da4690e903bec
-
SSDEEP
12288:MMrAy90w4k4CLGqt2GNrO6qyGpKF5s4yvAjEspXsuKjlQoqBiUPidtUwiYV/Bw:syQE1dZO6qyVYvAjEsZUZQDDutUG/Bw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8640.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8640.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8640.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8640.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8640.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/2692-180-0x0000000004A00000-0x0000000004A46000-memory.dmp family_redline behavioral1/memory/2692-181-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/2692-182-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-183-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-185-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-187-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-189-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-191-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-193-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-195-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-197-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-199-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-201-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-203-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-205-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-207-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-209-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-212-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-216-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-218-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/2692-1097-0x0000000004AD0000-0x0000000004AE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4116 un429305.exe 3324 pro8640.exe 2692 qu5081.exe 3896 si328054.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8640.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8640.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un429305.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un429305.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3324 pro8640.exe 3324 pro8640.exe 2692 qu5081.exe 2692 qu5081.exe 3896 si328054.exe 3896 si328054.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3324 pro8640.exe Token: SeDebugPrivilege 2692 qu5081.exe Token: SeDebugPrivilege 3896 si328054.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4036 wrote to memory of 4116 4036 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe 66 PID 4036 wrote to memory of 4116 4036 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe 66 PID 4036 wrote to memory of 4116 4036 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe 66 PID 4116 wrote to memory of 3324 4116 un429305.exe 67 PID 4116 wrote to memory of 3324 4116 un429305.exe 67 PID 4116 wrote to memory of 3324 4116 un429305.exe 67 PID 4116 wrote to memory of 2692 4116 un429305.exe 68 PID 4116 wrote to memory of 2692 4116 un429305.exe 68 PID 4116 wrote to memory of 2692 4116 un429305.exe 68 PID 4036 wrote to memory of 3896 4036 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe 70 PID 4036 wrote to memory of 3896 4036 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe 70 PID 4036 wrote to memory of 3896 4036 5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe"C:\Users\Admin\AppData\Local\Temp\5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429305.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429305.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8640.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8640.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5081.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328054.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328054.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b41d456c70f3f60f21dbb87fc524474f
SHA18327b3662770ea2d0a4b089895aa0ee1563faad1
SHA2565e22e01f1efec0a8cc7a96bcfcf232965cf47ab4d75b02cc0c7dfdf3772ae962
SHA512b4d4fce72cbb70606aad4af5d073f094567a790f019fd48efa6fa3c806bc6aaa1ea88554d494e1934f55c11534c0e2cab6bd1ed38d91ba940350d372e7f32e78
-
Filesize
175KB
MD5b41d456c70f3f60f21dbb87fc524474f
SHA18327b3662770ea2d0a4b089895aa0ee1563faad1
SHA2565e22e01f1efec0a8cc7a96bcfcf232965cf47ab4d75b02cc0c7dfdf3772ae962
SHA512b4d4fce72cbb70606aad4af5d073f094567a790f019fd48efa6fa3c806bc6aaa1ea88554d494e1934f55c11534c0e2cab6bd1ed38d91ba940350d372e7f32e78
-
Filesize
516KB
MD57a4c8cb5928fbf3b2b3ec2f4edd7852c
SHA17e8426baf9c28e9b670c1629184884f759a5b0e7
SHA25686e7b1b9ddcc19fc00dca1aad3af8c3a61c0abf1638f7b604622d9b307b91f23
SHA512144b0674f9f52da4caa1e9812ae3de2620d6d4256317821a78552f535171fcd6ef4fddaaee7cfb6c2a196e8a90976cbd3ebbdd542b42e9c0d956b1b611dbdc7b
-
Filesize
516KB
MD57a4c8cb5928fbf3b2b3ec2f4edd7852c
SHA17e8426baf9c28e9b670c1629184884f759a5b0e7
SHA25686e7b1b9ddcc19fc00dca1aad3af8c3a61c0abf1638f7b604622d9b307b91f23
SHA512144b0674f9f52da4caa1e9812ae3de2620d6d4256317821a78552f535171fcd6ef4fddaaee7cfb6c2a196e8a90976cbd3ebbdd542b42e9c0d956b1b611dbdc7b
-
Filesize
295KB
MD5935a8f587c289f0306e88483f25f4dcb
SHA1837a514c42d8781b3a55c6e9a848fef3dbb7e408
SHA256ad75bb157b84547f8bb9220fe9f45406fb2c055a14ce642dfe8da2d99b09274a
SHA512cefc367b53a5522e76c501ae1c14e554e93047e84f1a03112787c847c379a0cca97ba0f7067da886c64cabd743d35ebf8b671bd98034cebad5708a0c70adbddf
-
Filesize
295KB
MD5935a8f587c289f0306e88483f25f4dcb
SHA1837a514c42d8781b3a55c6e9a848fef3dbb7e408
SHA256ad75bb157b84547f8bb9220fe9f45406fb2c055a14ce642dfe8da2d99b09274a
SHA512cefc367b53a5522e76c501ae1c14e554e93047e84f1a03112787c847c379a0cca97ba0f7067da886c64cabd743d35ebf8b671bd98034cebad5708a0c70adbddf
-
Filesize
354KB
MD558f923dadfa19617ff4287d0113eb929
SHA140752857476a54cdc5a67d51b00a2cc55407d0b7
SHA256edbf8013b1b7dd50be0d47c542b7a6827fd373255f94cffbd9532a84cfd43cea
SHA51267675f05a69b735d005df78e983652ae44e7482c7cb99a0514be1e063099e1d71037c6ec60672ca428a68e3c864156f8e7b35815461e10bdf029614e4d3ffdb0
-
Filesize
354KB
MD558f923dadfa19617ff4287d0113eb929
SHA140752857476a54cdc5a67d51b00a2cc55407d0b7
SHA256edbf8013b1b7dd50be0d47c542b7a6827fd373255f94cffbd9532a84cfd43cea
SHA51267675f05a69b735d005df78e983652ae44e7482c7cb99a0514be1e063099e1d71037c6ec60672ca428a68e3c864156f8e7b35815461e10bdf029614e4d3ffdb0