Analysis
-
max time kernel
88s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:55
Static task
static1
Behavioral task
behavioral1
Sample
b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe
Resource
win10v2004-20230220-en
General
-
Target
b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe
-
Size
659KB
-
MD5
33d4020b09563bd82ee8abf5b76d1560
-
SHA1
fa5cebacdf301a8b7cfe2dc9a03807c6bd67b9bc
-
SHA256
b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41
-
SHA512
5eb2adfe75544ea876bebd1ed27a399b51665306a941fd1690964c59df2139b49ca56016042855f4e6b63a35aafd0dc1a7092bd85494bca21ace5b168a801bbb
-
SSDEEP
12288:IMriy90JU30vm4zyzvWW+8T4e/PBTELFt59/rwJZNCXAVft/juC4j1:qygO0vm44ve3U4Zt5RuZUXyBrI1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1582.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1582.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1582.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/3108-186-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-187-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-189-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-191-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-193-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-195-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-197-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-199-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-201-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-205-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-211-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-209-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-213-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-215-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-217-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-219-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-221-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/3108-223-0x0000000002520000-0x000000000255F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un932477.exepro1582.exequ4835.exesi125915.exepid process 1220 un932477.exe 4464 pro1582.exe 3108 qu4835.exe 4220 si125915.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1582.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1582.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exeun932477.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un932477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un932477.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4320 4464 WerFault.exe pro1582.exe 4824 3108 WerFault.exe qu4835.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1582.exequ4835.exesi125915.exepid process 4464 pro1582.exe 4464 pro1582.exe 3108 qu4835.exe 3108 qu4835.exe 4220 si125915.exe 4220 si125915.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1582.exequ4835.exesi125915.exedescription pid process Token: SeDebugPrivilege 4464 pro1582.exe Token: SeDebugPrivilege 3108 qu4835.exe Token: SeDebugPrivilege 4220 si125915.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exeun932477.exedescription pid process target process PID 3032 wrote to memory of 1220 3032 b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe un932477.exe PID 3032 wrote to memory of 1220 3032 b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe un932477.exe PID 3032 wrote to memory of 1220 3032 b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe un932477.exe PID 1220 wrote to memory of 4464 1220 un932477.exe pro1582.exe PID 1220 wrote to memory of 4464 1220 un932477.exe pro1582.exe PID 1220 wrote to memory of 4464 1220 un932477.exe pro1582.exe PID 1220 wrote to memory of 3108 1220 un932477.exe qu4835.exe PID 1220 wrote to memory of 3108 1220 un932477.exe qu4835.exe PID 1220 wrote to memory of 3108 1220 un932477.exe qu4835.exe PID 3032 wrote to memory of 4220 3032 b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe si125915.exe PID 3032 wrote to memory of 4220 3032 b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe si125915.exe PID 3032 wrote to memory of 4220 3032 b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe si125915.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe"C:\Users\Admin\AppData\Local\Temp\b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932477.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10804⤵
- Program crash
PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4835.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4835.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 17724⤵
- Program crash
PID:4824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125915.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4464 -ip 44641⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3108 -ip 31081⤵PID:3124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55a5dbe01464b7306820ab09c0144aecb
SHA1bbb20ee17b81912877d0e989c303d549e401d5a5
SHA2565c8d9c6ad9741872250ba219748019d4a198d3346f4115d14bf2b56c57a1f44e
SHA51209d2c9e7e390ac23b17b7e4e32ece8914a8f1f5451133713a3126c2673864c51da0345e9a9179724329299af20dc5b300e593daffd4c94517e7786005a0efbab
-
Filesize
175KB
MD55a5dbe01464b7306820ab09c0144aecb
SHA1bbb20ee17b81912877d0e989c303d549e401d5a5
SHA2565c8d9c6ad9741872250ba219748019d4a198d3346f4115d14bf2b56c57a1f44e
SHA51209d2c9e7e390ac23b17b7e4e32ece8914a8f1f5451133713a3126c2673864c51da0345e9a9179724329299af20dc5b300e593daffd4c94517e7786005a0efbab
-
Filesize
517KB
MD524053b6e5a48d79e78f8bb0021fde4f1
SHA14b411fc846d264908eddd2b1c1744c0def6d7664
SHA256f5b45bdf3a4b48f09ccfdff623f733e9b6d31d1831f84a10e020144a3959150d
SHA512ca852bfacff8093edd35cd64624a0f875e925e8908515293c41d6d126f1e51d8db5459ce5019a1517b0cf07f52c2c8c04023b92c503384e36097747ba7d74f19
-
Filesize
517KB
MD524053b6e5a48d79e78f8bb0021fde4f1
SHA14b411fc846d264908eddd2b1c1744c0def6d7664
SHA256f5b45bdf3a4b48f09ccfdff623f733e9b6d31d1831f84a10e020144a3959150d
SHA512ca852bfacff8093edd35cd64624a0f875e925e8908515293c41d6d126f1e51d8db5459ce5019a1517b0cf07f52c2c8c04023b92c503384e36097747ba7d74f19
-
Filesize
237KB
MD5f61cb1c8d08aaef7049922e6a207bc2d
SHA10168194911ae6f9cf3b98df9cfcfa41748d93a91
SHA256d535b6c1da20879b712066accf63cd0824617d0e9b4803bcd4869ba2563d339c
SHA51229f30bd708042a4f4659e11d0bb1d586c690acae06b9305cb7ce05852b0563a1904315359dc681a46d50cda8e2081e2106ee848e78f8ff055bdb7e55a1a739b3
-
Filesize
237KB
MD5f61cb1c8d08aaef7049922e6a207bc2d
SHA10168194911ae6f9cf3b98df9cfcfa41748d93a91
SHA256d535b6c1da20879b712066accf63cd0824617d0e9b4803bcd4869ba2563d339c
SHA51229f30bd708042a4f4659e11d0bb1d586c690acae06b9305cb7ce05852b0563a1904315359dc681a46d50cda8e2081e2106ee848e78f8ff055bdb7e55a1a739b3
-
Filesize
295KB
MD5f655f59757be61f2521f9dd9cae522cd
SHA1c86ce0b1be80588e855b6fd7b681e3e7110f3cc9
SHA256d3c54dc4f0f8d1817f9318b2eea2805c91b0cd1f7a75da721e05b9a0e396367e
SHA51285bf5778183745650cae52d7d774b77900d30483b81823b9da772435dd29b9452438e5311c8f3d27ec8b96542daeb00e07e4df813176cfe1f3c64a53593695ca
-
Filesize
295KB
MD5f655f59757be61f2521f9dd9cae522cd
SHA1c86ce0b1be80588e855b6fd7b681e3e7110f3cc9
SHA256d3c54dc4f0f8d1817f9318b2eea2805c91b0cd1f7a75da721e05b9a0e396367e
SHA51285bf5778183745650cae52d7d774b77900d30483b81823b9da772435dd29b9452438e5311c8f3d27ec8b96542daeb00e07e4df813176cfe1f3c64a53593695ca