Analysis
-
max time kernel
61s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:46
Static task
static1
Behavioral task
behavioral1
Sample
b1b9edba3110d3f6e1d37249f7c69ea5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b1b9edba3110d3f6e1d37249f7c69ea5.exe
Resource
win10v2004-20230220-en
General
-
Target
b1b9edba3110d3f6e1d37249f7c69ea5.exe
-
Size
675KB
-
MD5
b1b9edba3110d3f6e1d37249f7c69ea5
-
SHA1
805be968dd146cb68492d9a6759ba6551f555008
-
SHA256
63b4f86f6e094ed68e2da3ecf003605e743105d3fab1f1992d3896bc9bf0c3eb
-
SHA512
f4701376b91264b777db007ffe8dcbc0ce206765f0126487e2f944450687e48524d1edf1d7eca60231379f31ee4e20bc201e67552b2f594df6f41a2742cf1331
-
SSDEEP
12288:uMrsy90rGERgVYhFUUuG38kMcXBkFzW3WzNVNbo8kYZ0rWwaEJU46/BP:GyuiuBPRMcWFzbzTpJkvrWnb/5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0378.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0378.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral2/memory/4072-191-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-192-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-194-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-196-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-198-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-200-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-202-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-204-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-206-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-208-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-210-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-212-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-214-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-216-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-218-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-220-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-222-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-224-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral2/memory/4072-1111-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline behavioral2/memory/4072-1112-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3480 un841637.exe 892 pro0378.exe 4072 qu9649.exe 4880 si336700.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0378.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1b9edba3110d3f6e1d37249f7c69ea5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1b9edba3110d3f6e1d37249f7c69ea5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un841637.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un841637.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5052 892 WerFault.exe 84 2768 4072 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 892 pro0378.exe 892 pro0378.exe 4072 qu9649.exe 4072 qu9649.exe 4880 si336700.exe 4880 si336700.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 892 pro0378.exe Token: SeDebugPrivilege 4072 qu9649.exe Token: SeDebugPrivilege 4880 si336700.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3480 4444 b1b9edba3110d3f6e1d37249f7c69ea5.exe 83 PID 4444 wrote to memory of 3480 4444 b1b9edba3110d3f6e1d37249f7c69ea5.exe 83 PID 4444 wrote to memory of 3480 4444 b1b9edba3110d3f6e1d37249f7c69ea5.exe 83 PID 3480 wrote to memory of 892 3480 un841637.exe 84 PID 3480 wrote to memory of 892 3480 un841637.exe 84 PID 3480 wrote to memory of 892 3480 un841637.exe 84 PID 3480 wrote to memory of 4072 3480 un841637.exe 90 PID 3480 wrote to memory of 4072 3480 un841637.exe 90 PID 3480 wrote to memory of 4072 3480 un841637.exe 90 PID 4444 wrote to memory of 4880 4444 b1b9edba3110d3f6e1d37249f7c69ea5.exe 94 PID 4444 wrote to memory of 4880 4444 b1b9edba3110d3f6e1d37249f7c69ea5.exe 94 PID 4444 wrote to memory of 4880 4444 b1b9edba3110d3f6e1d37249f7c69ea5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b9edba3110d3f6e1d37249f7c69ea5.exe"C:\Users\Admin\AppData\Local\Temp\b1b9edba3110d3f6e1d37249f7c69ea5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 10884⤵
- Program crash
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 17564⤵
- Program crash
PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 892 -ip 8921⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4072 -ip 40721⤵PID:4276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD520a5a004d0bb6486fb4eae3e4684126e
SHA1842ff9af58c557ad1e30039543f03d2a7e6e8e50
SHA25643a7e505c2f158df7c50412f8b9382e8fcc6e457a047d18cadbb5ad0f0de788d
SHA51239857ce727db56ba8799bfa444a1a6183b02d0315c732e5fc716e15fd9c5be6a5be811a60c37cd4e8d2b2653f095d7f29fbc3ecc15d1045d05109007a8428cac
-
Filesize
175KB
MD520a5a004d0bb6486fb4eae3e4684126e
SHA1842ff9af58c557ad1e30039543f03d2a7e6e8e50
SHA25643a7e505c2f158df7c50412f8b9382e8fcc6e457a047d18cadbb5ad0f0de788d
SHA51239857ce727db56ba8799bfa444a1a6183b02d0315c732e5fc716e15fd9c5be6a5be811a60c37cd4e8d2b2653f095d7f29fbc3ecc15d1045d05109007a8428cac
-
Filesize
533KB
MD5003d6947d9bda4b0a4c6646e227e93dc
SHA13f57e87737c902d4d4c06a5c9c9ea327d8a9c83e
SHA256503bec83c85e294ed8eb814e50696e4b74c050c8b248e3c775ba4122030b75fe
SHA5129321e3822c84b9449e6746d699e2cbbe3e82e2f5e966b706dcdf8ea799e29cba25ec7972c777de6ae4ddeab539907926ad30df317b3f6b759cf02a44dd17eca2
-
Filesize
533KB
MD5003d6947d9bda4b0a4c6646e227e93dc
SHA13f57e87737c902d4d4c06a5c9c9ea327d8a9c83e
SHA256503bec83c85e294ed8eb814e50696e4b74c050c8b248e3c775ba4122030b75fe
SHA5129321e3822c84b9449e6746d699e2cbbe3e82e2f5e966b706dcdf8ea799e29cba25ec7972c777de6ae4ddeab539907926ad30df317b3f6b759cf02a44dd17eca2
-
Filesize
272KB
MD5ae964d4a5a332d4a89018bdcbeeb6f5b
SHA117555a475d322a056e37fa129ca53cdb0f173936
SHA256df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8
SHA5122c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225
-
Filesize
272KB
MD5ae964d4a5a332d4a89018bdcbeeb6f5b
SHA117555a475d322a056e37fa129ca53cdb0f173936
SHA256df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8
SHA5122c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225
-
Filesize
331KB
MD55a86bdae19d5d3d4d7d9d910e25040cd
SHA1fe38880773db726ff80cb609a4bce3ce60422393
SHA2561645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64
SHA512b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248
-
Filesize
331KB
MD55a86bdae19d5d3d4d7d9d910e25040cd
SHA1fe38880773db726ff80cb609a4bce3ce60422393
SHA2561645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64
SHA512b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248