Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 10:59
Static task
static1
Behavioral task
behavioral1
Sample
pdf-readers565.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
pdf-readers565.exe
Resource
win10v2004-20230221-en
General
-
Target
pdf-readers565.exe
-
Size
1.0MB
-
MD5
60bb31528c97d9c52b0db0fe05c55a4b
-
SHA1
a832db2e136737db2b57c94d29739fa39df8114f
-
SHA256
caa744c8e12d2e63bad721fc8703218fa753d6e9ebffc4445366f3d57197e4ef
-
SHA512
43747b03b7426dd5365eff6e1b23b512ff3b15222ac85eb815aff25cf95c7ad293e5e2f38e22500ce3ec31e8ffee53286fa14849b59b5ad8c3a3ec592f64c670
-
SSDEEP
24576:ryMo2fYVymxN1nqvynTrsewrjlPnsMhPMuWsjbW4RE/tw:ed3XRqvyT/wvRsMRWsjs/
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0954287.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0954287.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0954287.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0954287.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0954287.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0954287.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/1476-220-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-221-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-224-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-226-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-228-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-230-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-232-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-234-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-236-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-238-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-240-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-242-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-244-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-248-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-246-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-250-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-252-0x0000000002540000-0x000000000257C000-memory.dmp family_redline behavioral2/memory/1476-254-0x0000000002540000-0x000000000257C000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 1136 v8641376.exe 2692 v0196661.exe 4348 a0954287.exe 1984 b5507194.exe 3876 c6381172.exe 2176 c6381172.exe 2284 c6381172.exe 1476 d2230385.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0954287.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0954287.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0196661.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pdf-readers565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" pdf-readers565.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8641376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8641376.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0196661.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3876 set thread context of 2284 3876 c6381172.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 3848 2284 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4348 a0954287.exe 4348 a0954287.exe 1984 b5507194.exe 1984 b5507194.exe 1476 d2230385.exe 1476 d2230385.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4348 a0954287.exe Token: SeDebugPrivilege 1984 b5507194.exe Token: SeDebugPrivilege 3876 c6381172.exe Token: SeDebugPrivilege 1476 d2230385.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2284 c6381172.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1136 2636 pdf-readers565.exe 82 PID 2636 wrote to memory of 1136 2636 pdf-readers565.exe 82 PID 2636 wrote to memory of 1136 2636 pdf-readers565.exe 82 PID 1136 wrote to memory of 2692 1136 v8641376.exe 83 PID 1136 wrote to memory of 2692 1136 v8641376.exe 83 PID 1136 wrote to memory of 2692 1136 v8641376.exe 83 PID 2692 wrote to memory of 4348 2692 v0196661.exe 84 PID 2692 wrote to memory of 4348 2692 v0196661.exe 84 PID 2692 wrote to memory of 4348 2692 v0196661.exe 84 PID 2692 wrote to memory of 1984 2692 v0196661.exe 85 PID 2692 wrote to memory of 1984 2692 v0196661.exe 85 PID 2692 wrote to memory of 1984 2692 v0196661.exe 85 PID 1136 wrote to memory of 3876 1136 v8641376.exe 86 PID 1136 wrote to memory of 3876 1136 v8641376.exe 86 PID 1136 wrote to memory of 3876 1136 v8641376.exe 86 PID 3876 wrote to memory of 2176 3876 c6381172.exe 87 PID 3876 wrote to memory of 2176 3876 c6381172.exe 87 PID 3876 wrote to memory of 2176 3876 c6381172.exe 87 PID 3876 wrote to memory of 2176 3876 c6381172.exe 87 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 3876 wrote to memory of 2284 3876 c6381172.exe 89 PID 2636 wrote to memory of 1476 2636 pdf-readers565.exe 91 PID 2636 wrote to memory of 1476 2636 pdf-readers565.exe 91 PID 2636 wrote to memory of 1476 2636 pdf-readers565.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\pdf-readers565.exe"C:\Users\Admin\AppData\Local\Temp\pdf-readers565.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8641376.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8641376.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0196661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0196661.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0954287.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0954287.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5507194.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5507194.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe4⤵
- Executes dropped EXE
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 125⤵
- Program crash
PID:3848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2230385.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2230385.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2284 -ip 22841⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD56cdd8da4a29cb566f5627e70ec54ed77
SHA1f31685199678d95c1409d878c02d9ec567a7a225
SHA2564e02ef164ca6c374d665d15963c1370632678945ec40d927f0515f0e08341e02
SHA51267802cad6bddfc0911bb1fa8fdac24f537ed4a5970025af01cdf881e11988031de1109a1eb69d737c9614a7af3166b32a6f1cb14ebd5dba868f0796a625a8045
-
Filesize
285KB
MD56cdd8da4a29cb566f5627e70ec54ed77
SHA1f31685199678d95c1409d878c02d9ec567a7a225
SHA2564e02ef164ca6c374d665d15963c1370632678945ec40d927f0515f0e08341e02
SHA51267802cad6bddfc0911bb1fa8fdac24f537ed4a5970025af01cdf881e11988031de1109a1eb69d737c9614a7af3166b32a6f1cb14ebd5dba868f0796a625a8045
-
Filesize
751KB
MD5cb09cb55e0913eed9d66a259087cd0f5
SHA14308f523eff6bf4f09e35c436edbac139d3a75a1
SHA256fb56ab84ed92e17be0e73a0ddb380ebbd4cfb9f119ea7e4d324b92d554243bd5
SHA512ef3be05890c9a1430ac4d2bd982cb6ead0eb84735dd66665aa338fe7c9157a01fa628d15dcef86776c338cea0714f9b2775438ffd65cb164f02f24ce4fcd5a33
-
Filesize
751KB
MD5cb09cb55e0913eed9d66a259087cd0f5
SHA14308f523eff6bf4f09e35c436edbac139d3a75a1
SHA256fb56ab84ed92e17be0e73a0ddb380ebbd4cfb9f119ea7e4d324b92d554243bd5
SHA512ef3be05890c9a1430ac4d2bd982cb6ead0eb84735dd66665aa338fe7c9157a01fa628d15dcef86776c338cea0714f9b2775438ffd65cb164f02f24ce4fcd5a33
-
Filesize
965KB
MD57893a3ea3c445d5d0e20944ec4b44bba
SHA1e60d9e47a9bda98039ad55672b8cb2111be4d469
SHA256f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f
SHA5129e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28
-
Filesize
965KB
MD57893a3ea3c445d5d0e20944ec4b44bba
SHA1e60d9e47a9bda98039ad55672b8cb2111be4d469
SHA256f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f
SHA5129e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28
-
Filesize
965KB
MD57893a3ea3c445d5d0e20944ec4b44bba
SHA1e60d9e47a9bda98039ad55672b8cb2111be4d469
SHA256f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f
SHA5129e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28
-
Filesize
965KB
MD57893a3ea3c445d5d0e20944ec4b44bba
SHA1e60d9e47a9bda98039ad55672b8cb2111be4d469
SHA256f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f
SHA5129e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28
-
Filesize
306KB
MD5887b05646c1e38bf5aa538027f566988
SHA14b83f120ebc863c2c551a0d0d22f4be8aa7e70bf
SHA256c65bb171affbd824b2c1dbde8c10c385e27e243b466e8913603d06aa7bd26e19
SHA51219cb8c3d5979ee37fd87e70c9d0af7b96f6b90dcfee45d9ab5fcb546e7ae0455724c3cddb4d29fff5283d0877df24585a7c2e5829aef764b3214ac39d28b4675
-
Filesize
306KB
MD5887b05646c1e38bf5aa538027f566988
SHA14b83f120ebc863c2c551a0d0d22f4be8aa7e70bf
SHA256c65bb171affbd824b2c1dbde8c10c385e27e243b466e8913603d06aa7bd26e19
SHA51219cb8c3d5979ee37fd87e70c9d0af7b96f6b90dcfee45d9ab5fcb546e7ae0455724c3cddb4d29fff5283d0877df24585a7c2e5829aef764b3214ac39d28b4675
-
Filesize
185KB
MD510b31473f0e9d752c01bbb62dac18690
SHA12c70dfcf25f56dd366d3bdb77a8220a9b237743b
SHA2566611273426b6e12ce8ef36ec0151d342fe7230a13a167bd7bb11ac842d392255
SHA512562f3b76ea47a45cbaa02bdf3c7a280710263ef3aff3235d6b70b841c9de9bbbf216af955a31b0f4e25b8e81912da4094a5987b7212c0e3ff0381293781aaf78
-
Filesize
185KB
MD510b31473f0e9d752c01bbb62dac18690
SHA12c70dfcf25f56dd366d3bdb77a8220a9b237743b
SHA2566611273426b6e12ce8ef36ec0151d342fe7230a13a167bd7bb11ac842d392255
SHA512562f3b76ea47a45cbaa02bdf3c7a280710263ef3aff3235d6b70b841c9de9bbbf216af955a31b0f4e25b8e81912da4094a5987b7212c0e3ff0381293781aaf78
-
Filesize
145KB
MD56aa7aaadc0385eddab4e750e9a6f5796
SHA12bab8c2cf900d9d1d9ce07d83b0fec461c1f4a44
SHA2564caa561174355ea7865e4126cb12d202786647509550c8715dde5d422cb6cf1e
SHA512b8df3a97c3d7b026b3366f7a3b6421d7a6b85cc615ec3ee03bcaedd8f79948ab5342a2721dbd41a02626094d253aba4ea31e24d2d1a9306a7276142dc50451fc
-
Filesize
145KB
MD56aa7aaadc0385eddab4e750e9a6f5796
SHA12bab8c2cf900d9d1d9ce07d83b0fec461c1f4a44
SHA2564caa561174355ea7865e4126cb12d202786647509550c8715dde5d422cb6cf1e
SHA512b8df3a97c3d7b026b3366f7a3b6421d7a6b85cc615ec3ee03bcaedd8f79948ab5342a2721dbd41a02626094d253aba4ea31e24d2d1a9306a7276142dc50451fc