Analysis
-
max time kernel
81s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe
Resource
win10v2004-20230221-en
General
-
Target
0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe
-
Size
553KB
-
MD5
54bc7f656b4bb3239efee92c8a728b91
-
SHA1
ed519bc66dd1bb0f42ee2d4555a67fad0d4df091
-
SHA256
0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc
-
SHA512
0ee25b0050ac0b2e85ec53897337a25fa4f3ac103fca58758a1a41aaf6c9a14b65f65edafa57de9c8d45e44e4f745f00693b76ee4808f547d7e7ed3d31b838c1
-
SSDEEP
12288:DMrpy90egtnVLgj/SL1UgI55bKyPzJsoCXI+Zl:2ydgnLKKLKg23Ctf
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
gena
193.233.20.32:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro1360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1360.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/432-158-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-159-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-161-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-163-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-165-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-167-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-169-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-171-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-173-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-175-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-177-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-179-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-181-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-183-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-185-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-187-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-189-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-191-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-193-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-195-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-197-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-199-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-201-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-203-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-205-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-207-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-209-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-211-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-213-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-215-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-217-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-219-0x0000000007840000-0x000000000787F000-memory.dmp family_redline behavioral1/memory/432-221-0x0000000007840000-0x000000000787F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3660 unio9317.exe 1460 pro1360.exe 432 qu8512.exe 1192 si906098.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1360.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9317.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2140 432 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1460 pro1360.exe 1460 pro1360.exe 432 qu8512.exe 432 qu8512.exe 1192 si906098.exe 1192 si906098.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1460 pro1360.exe Token: SeDebugPrivilege 432 qu8512.exe Token: SeDebugPrivilege 1192 si906098.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3660 2360 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe 85 PID 2360 wrote to memory of 3660 2360 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe 85 PID 2360 wrote to memory of 3660 2360 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe 85 PID 3660 wrote to memory of 1460 3660 unio9317.exe 86 PID 3660 wrote to memory of 1460 3660 unio9317.exe 86 PID 3660 wrote to memory of 432 3660 unio9317.exe 90 PID 3660 wrote to memory of 432 3660 unio9317.exe 90 PID 3660 wrote to memory of 432 3660 unio9317.exe 90 PID 2360 wrote to memory of 1192 2360 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe 94 PID 2360 wrote to memory of 1192 2360 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe 94 PID 2360 wrote to memory of 1192 2360 0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe"C:\Users\Admin\AppData\Local\Temp\0b647bfbb3ab99912c46640abf82df0856c51767c748f49fe65c757f8d61e2dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9317.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1360.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8512.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8512.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 13484⤵
- Program crash
PID:2140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906098.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906098.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 432 -ip 4321⤵PID:1476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f50023c2c4bad1bbf51efde95c575b28
SHA19e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1
SHA256a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb
SHA512d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57
-
Filesize
175KB
MD5f50023c2c4bad1bbf51efde95c575b28
SHA19e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1
SHA256a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb
SHA512d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57
-
Filesize
411KB
MD5857622087b92306d0500e62341ba53c5
SHA1763e4972b43a3975e55cad4e2a902895771df07a
SHA256fdcc63f3c6234eaa9c6bcbfa286bd6d98bf30d7aa067c0c29026edb7bc81f5bf
SHA512e63d9536a6fcb453992f938bc70234ac5a019d87a4bb0007c826ad5b8b60de6b29bb2c05dcd8e754bf66e802eea1bb3d793fe7d9d4d40405a081738394d8fb3c
-
Filesize
411KB
MD5857622087b92306d0500e62341ba53c5
SHA1763e4972b43a3975e55cad4e2a902895771df07a
SHA256fdcc63f3c6234eaa9c6bcbfa286bd6d98bf30d7aa067c0c29026edb7bc81f5bf
SHA512e63d9536a6fcb453992f938bc70234ac5a019d87a4bb0007c826ad5b8b60de6b29bb2c05dcd8e754bf66e802eea1bb3d793fe7d9d4d40405a081738394d8fb3c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
386KB
MD557a5d8ba1a69746c961563da0cb0e65a
SHA18299d8b58e758c0c17dadb6bd73e4c49f06f31f6
SHA256b878ee31461526c737304d0e021a5fb71aab0fb5668207d164240044ac6e5466
SHA512917b09e1769cd435c73e0a814402323a28d36f529a7c7590be46b94e3ca5093dbbfb0e0bf12a2d4a42d6301c68c50d1bfeb73427e751dc85ac21248f066aeb39
-
Filesize
386KB
MD557a5d8ba1a69746c961563da0cb0e65a
SHA18299d8b58e758c0c17dadb6bd73e4c49f06f31f6
SHA256b878ee31461526c737304d0e021a5fb71aab0fb5668207d164240044ac6e5466
SHA512917b09e1769cd435c73e0a814402323a28d36f529a7c7590be46b94e3ca5093dbbfb0e0bf12a2d4a42d6301c68c50d1bfeb73427e751dc85ac21248f066aeb39