Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2023, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe
Resource
win10v2004-20230220-en
General
-
Target
b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe
-
Size
536KB
-
MD5
710d92e7ba8a761457ac239d3dc8081f
-
SHA1
472481658c139881cfc47f3c1bfd6b69c239b8f2
-
SHA256
b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3
-
SHA512
207a2251b79543511c664283113c876bdb89c094eaec138f68c8b90975f8818d4b60f3308bd50548d6ab05e3969ad27d39646b97552cacd189a949c975755ff6
-
SSDEEP
6144:Kiy+bnr+Ap0yN90QEOdI+Ix/V1FI2eGtnq4ZBDkCT4QqyT/O7O4lvRg5dz2bU7pi:uMrAy90YI9PI2eSZBDkCTHrOROz9n4
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0522.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro0522.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4528-158-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-159-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-161-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-163-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-165-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-167-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-169-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-171-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-173-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-175-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-177-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-179-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-181-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-183-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-185-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-187-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-189-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-191-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-193-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-195-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-197-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-199-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-201-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-203-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-205-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-207-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-209-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-211-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-213-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-215-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-217-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-219-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline behavioral1/memory/4528-221-0x00000000026A0000-0x00000000026DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4876 unio7279.exe 1232 pro0522.exe 4528 qu0612.exe 1752 si594932.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0522.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio7279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio7279.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4216 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1808 4528 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1232 pro0522.exe 1232 pro0522.exe 4528 qu0612.exe 4528 qu0612.exe 1752 si594932.exe 1752 si594932.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1232 pro0522.exe Token: SeDebugPrivilege 4528 qu0612.exe Token: SeDebugPrivilege 1752 si594932.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4876 4852 b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe 87 PID 4852 wrote to memory of 4876 4852 b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe 87 PID 4852 wrote to memory of 4876 4852 b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe 87 PID 4876 wrote to memory of 1232 4876 unio7279.exe 88 PID 4876 wrote to memory of 1232 4876 unio7279.exe 88 PID 4876 wrote to memory of 4528 4876 unio7279.exe 92 PID 4876 wrote to memory of 4528 4876 unio7279.exe 92 PID 4876 wrote to memory of 4528 4876 unio7279.exe 92 PID 4852 wrote to memory of 1752 4852 b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe 95 PID 4852 wrote to memory of 1752 4852 b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe 95 PID 4852 wrote to memory of 1752 4852 b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe"C:\Users\Admin\AppData\Local\Temp\b0b8c16b31ce764fa95ea15d6c93c9199360ab16e1aae740353a095036dfe9b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7279.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7279.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0522.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0612.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 15764⤵
- Program crash
PID:1808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si594932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si594932.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4528 -ip 45281⤵PID:4396
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
395KB
MD53bcb168b8defb7f71a84baf9e07cc49f
SHA18b0b52a1221a4a9b1be1e0257331b6059c3ea825
SHA256abc411822746e800c31ec3f0ed95de00a6cf8a26555c3f292ef977d7c5f9e61a
SHA5126b8d578ce7fe07769ce81d7e0d28b1faf00bf4a0c6b8f723e3d5c64dda13da211ab42755de8d48c28c8e74265cf608de3b6778265d957fff7aa1383866f9291a
-
Filesize
395KB
MD53bcb168b8defb7f71a84baf9e07cc49f
SHA18b0b52a1221a4a9b1be1e0257331b6059c3ea825
SHA256abc411822746e800c31ec3f0ed95de00a6cf8a26555c3f292ef977d7c5f9e61a
SHA5126b8d578ce7fe07769ce81d7e0d28b1faf00bf4a0c6b8f723e3d5c64dda13da211ab42755de8d48c28c8e74265cf608de3b6778265d957fff7aa1383866f9291a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
470KB
MD5ff8e4113e70879393f62915a01f02e5c
SHA1a725de86a9098b0ad918beb5a1d884a421d53cd5
SHA256d9cc73da27b63a1c18c937ff39db5e0812b41d6026d98eaeabe6bbb239b2aedd
SHA5127a80e3462d948e6d4c2ebd2ef9d856fca6ab8f50c3e2effc620b42260d453a79fee3e60e399da2c027add740cb6bee88c6840cb19cca77f095902cd72f99fa6c
-
Filesize
470KB
MD5ff8e4113e70879393f62915a01f02e5c
SHA1a725de86a9098b0ad918beb5a1d884a421d53cd5
SHA256d9cc73da27b63a1c18c937ff39db5e0812b41d6026d98eaeabe6bbb239b2aedd
SHA5127a80e3462d948e6d4c2ebd2ef9d856fca6ab8f50c3e2effc620b42260d453a79fee3e60e399da2c027add740cb6bee88c6840cb19cca77f095902cd72f99fa6c