Analysis
-
max time kernel
125s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe
Resource
win10v2004-20230220-en
General
-
Target
b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe
-
Size
890KB
-
MD5
cf044ef6066b956c134c2a63c966e37f
-
SHA1
3fa449b2ad158e12c02acc3a45099743b5ada59e
-
SHA256
b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205
-
SHA512
940a566da3ddd716d7d791cc401b73daa445b4c9500a3ada3a5bb0b0168ae80707dc85598cca0210fee21ae8648b71ca81556099ce59d40300779892d6718c32
-
SSDEEP
12288:Dy90bFiw+5CLeGBwgMRlV4PFVRiY3CL9wwECiVI+bbLe2FDPYcS4+P84:Dy4fJXK4NVRiYCxwwE+q5SPX
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s15156005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s15156005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s15156005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s15156005.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s15156005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s15156005.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation p32262701.exe -
Executes dropped EXE 5 IoCs
pid Process 2308 y59910283.exe 5016 p32262701.exe 1464 1.exe 1960 r98913897.exe 2556 s15156005.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s15156005.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s15156005.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y59910283.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y59910283.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3796 5016 WerFault.exe 84 2144 2556 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1464 1.exe 1960 r98913897.exe 1960 r98913897.exe 1464 1.exe 2556 s15156005.exe 2556 s15156005.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5016 p32262701.exe Token: SeDebugPrivilege 1464 1.exe Token: SeDebugPrivilege 1960 r98913897.exe Token: SeDebugPrivilege 2556 s15156005.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3116 wrote to memory of 2308 3116 b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe 83 PID 3116 wrote to memory of 2308 3116 b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe 83 PID 3116 wrote to memory of 2308 3116 b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe 83 PID 2308 wrote to memory of 5016 2308 y59910283.exe 84 PID 2308 wrote to memory of 5016 2308 y59910283.exe 84 PID 2308 wrote to memory of 5016 2308 y59910283.exe 84 PID 5016 wrote to memory of 1464 5016 p32262701.exe 86 PID 5016 wrote to memory of 1464 5016 p32262701.exe 86 PID 5016 wrote to memory of 1464 5016 p32262701.exe 86 PID 2308 wrote to memory of 1960 2308 y59910283.exe 91 PID 2308 wrote to memory of 1960 2308 y59910283.exe 91 PID 2308 wrote to memory of 1960 2308 y59910283.exe 91 PID 3116 wrote to memory of 2556 3116 b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe 96 PID 3116 wrote to memory of 2556 3116 b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe 96 PID 3116 wrote to memory of 2556 3116 b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe"C:\Users\Admin\AppData\Local\Temp\b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59910283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59910283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32262701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32262701.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 12084⤵
- Program crash
PID:3796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r98913897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r98913897.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s15156005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s15156005.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 10843⤵
- Program crash
PID:2144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5016 -ip 50161⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2556 -ip 25561⤵PID:5060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD52f69919137c52116cb8d726bbb9bfd39
SHA1e7a7c86e937f89cf9d3acef2bc5bbc973ff99ab2
SHA25635304551c82cc075060f00830fb72fe39a72a4593883c15c126e7e2b9edd5604
SHA512e65344e581ec28662974a08d6dc615ee4bc782e922d1dd1146b7df6012b3d8a9991b135d8dfa192d40bbed8fd0aa9d33f3e60bfc0ac197d10094eddb73af8197
-
Filesize
344KB
MD52f69919137c52116cb8d726bbb9bfd39
SHA1e7a7c86e937f89cf9d3acef2bc5bbc973ff99ab2
SHA25635304551c82cc075060f00830fb72fe39a72a4593883c15c126e7e2b9edd5604
SHA512e65344e581ec28662974a08d6dc615ee4bc782e922d1dd1146b7df6012b3d8a9991b135d8dfa192d40bbed8fd0aa9d33f3e60bfc0ac197d10094eddb73af8197
-
Filesize
589KB
MD5ec1ae64ed8c07c7d4a592d3ef9e47248
SHA1b66f53a6e5974bf4d5ed717a443af102dafc6887
SHA2564f084b69f0a8d68172dffce3be31ccfd1ce371e6c265a391311b610b8bb4da74
SHA5126efcf8b99cb1617ef49324308aab04108f9300fd00e477be42c0fa24e1f3da8e423d563ccc06d9f977b520c859f188711ea4a236691a74110e40a41b7a555377
-
Filesize
589KB
MD5ec1ae64ed8c07c7d4a592d3ef9e47248
SHA1b66f53a6e5974bf4d5ed717a443af102dafc6887
SHA2564f084b69f0a8d68172dffce3be31ccfd1ce371e6c265a391311b610b8bb4da74
SHA5126efcf8b99cb1617ef49324308aab04108f9300fd00e477be42c0fa24e1f3da8e423d563ccc06d9f977b520c859f188711ea4a236691a74110e40a41b7a555377
-
Filesize
529KB
MD50948641d2c61845175bd623c867b2b58
SHA1e4c665103e887ffca17429ceec013a1cedc5a012
SHA256ba55907607980fdea15d5232bdd340b4c5bad63f51cc2d48b0485c27a5fc3613
SHA512f277c2e4d5354619b0a089fc989f070382a6ba6551db03012c480d0d255b516a2c8a649ae476711c4fd957309f917c7aed90d92143c68facaf2df2549b650555
-
Filesize
529KB
MD50948641d2c61845175bd623c867b2b58
SHA1e4c665103e887ffca17429ceec013a1cedc5a012
SHA256ba55907607980fdea15d5232bdd340b4c5bad63f51cc2d48b0485c27a5fc3613
SHA512f277c2e4d5354619b0a089fc989f070382a6ba6551db03012c480d0d255b516a2c8a649ae476711c4fd957309f917c7aed90d92143c68facaf2df2549b650555
-
Filesize
169KB
MD5f4b48b598b0faa46cf88ab742b7559c6
SHA14c35cedd0cfa542739bbf5f9f1fa0ab413fa947b
SHA256ab0751837085be7f1f3c71a3e44f3afd9a43e543420ccdc2a9e89f35958e126f
SHA512b75f0f463afb8fc1c5ff9ab133048ece746020caba5231c21de34b22e4c66bfefc80426eb6f8c94009cbaa0201431e136ac73c6b4e54a93e21198d8c8b6f852e
-
Filesize
169KB
MD5f4b48b598b0faa46cf88ab742b7559c6
SHA14c35cedd0cfa542739bbf5f9f1fa0ab413fa947b
SHA256ab0751837085be7f1f3c71a3e44f3afd9a43e543420ccdc2a9e89f35958e126f
SHA512b75f0f463afb8fc1c5ff9ab133048ece746020caba5231c21de34b22e4c66bfefc80426eb6f8c94009cbaa0201431e136ac73c6b4e54a93e21198d8c8b6f852e
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf