Analysis
-
max time kernel
101s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe
Resource
win10v2004-20230220-en
General
-
Target
b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe
-
Size
684KB
-
MD5
48adbd05c1c43d4c74a657ca559d8503
-
SHA1
473110f5adeb759b85cebe9fbbe80e0bd8a8fffb
-
SHA256
b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165
-
SHA512
39b1a88b701cfb13e967520e1a2644cab29c5b71e80eed0b6525c0c104118bbb7fab8b9323b74831dfe91a6ed5f482ad9b4c16adc8b0ed1401c17f43a033223b
-
SSDEEP
12288:xMr8y90EY4apXvk6vGv6yjCKHR5cMRbovU1bmVL3D0Wq0A5:5yB21GZjC+5cOyKmVLSn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1637.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1637.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1637.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/764-189-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-190-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-192-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-195-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-199-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-200-0x0000000007310000-0x0000000007320000-memory.dmp family_redline behavioral1/memory/764-202-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-204-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-206-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-208-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-210-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-212-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-214-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-216-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-218-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-220-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-222-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-224-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-226-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/764-1108-0x0000000007310000-0x0000000007320000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1172 un369471.exe 1420 pro1637.exe 764 qu6791.exe 396 si661553.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1637.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1637.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un369471.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un369471.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4556 1420 WerFault.exe 86 3868 764 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1420 pro1637.exe 1420 pro1637.exe 764 qu6791.exe 764 qu6791.exe 396 si661553.exe 396 si661553.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1420 pro1637.exe Token: SeDebugPrivilege 764 qu6791.exe Token: SeDebugPrivilege 396 si661553.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 436 wrote to memory of 1172 436 b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe 85 PID 436 wrote to memory of 1172 436 b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe 85 PID 436 wrote to memory of 1172 436 b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe 85 PID 1172 wrote to memory of 1420 1172 un369471.exe 86 PID 1172 wrote to memory of 1420 1172 un369471.exe 86 PID 1172 wrote to memory of 1420 1172 un369471.exe 86 PID 1172 wrote to memory of 764 1172 un369471.exe 93 PID 1172 wrote to memory of 764 1172 un369471.exe 93 PID 1172 wrote to memory of 764 1172 un369471.exe 93 PID 436 wrote to memory of 396 436 b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe 99 PID 436 wrote to memory of 396 436 b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe 99 PID 436 wrote to memory of 396 436 b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe"C:\Users\Admin\AppData\Local\Temp\b5bcabafe456aae98ab0a900756fbe7fec1549f2d508ff4785888201732dc165.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369471.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369471.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1637.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1637.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 10804⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6791.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 17364⤵
- Program crash
PID:3868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661553.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661553.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1420 -ip 14201⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 764 -ip 7641⤵PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD557907253057cdc8dc51c211eea2ac842
SHA14b216ca795aa3fd74c08a2bdbe42c76ff0d41d2b
SHA2564a50da74867e2ea9eed9983236b413aa13b24e94f8f9b966be6b86911b411d2a
SHA5127db6f0ad85cd6ff92061b5e8c5a238d44190c017fa957f18b52cda092d0cb922f208c9d6eb82640e01d3797b22bd743d451d669884f52ed3e8ca6fecec1e3be2
-
Filesize
175KB
MD557907253057cdc8dc51c211eea2ac842
SHA14b216ca795aa3fd74c08a2bdbe42c76ff0d41d2b
SHA2564a50da74867e2ea9eed9983236b413aa13b24e94f8f9b966be6b86911b411d2a
SHA5127db6f0ad85cd6ff92061b5e8c5a238d44190c017fa957f18b52cda092d0cb922f208c9d6eb82640e01d3797b22bd743d451d669884f52ed3e8ca6fecec1e3be2
-
Filesize
542KB
MD5a59a3905ee24897658999a6c6fd62d27
SHA148b7fc678b81728644a43b1202ae243d6bef5745
SHA256c4aaf675230b6d089220d7a252113759496072ae23c8ccd31df298772385bfdd
SHA5126b5f547c4e4d3fa0e4bf0ec9f5663e81d9ceecf4b61b2210f390390bd9b72720dda5041b965a3d5d5770ca150214060eaaaba5d9478d87f2782d5fe62fc3aca7
-
Filesize
542KB
MD5a59a3905ee24897658999a6c6fd62d27
SHA148b7fc678b81728644a43b1202ae243d6bef5745
SHA256c4aaf675230b6d089220d7a252113759496072ae23c8ccd31df298772385bfdd
SHA5126b5f547c4e4d3fa0e4bf0ec9f5663e81d9ceecf4b61b2210f390390bd9b72720dda5041b965a3d5d5770ca150214060eaaaba5d9478d87f2782d5fe62fc3aca7
-
Filesize
321KB
MD54f648ea68eedd16d8f907d5a934db37b
SHA1cd5a8a7fbd2a62b7b0d758055b012222dd64aa65
SHA256ef88e43e111692abb5f8ac336a5087f618eb9c392e80fc0bd29309e41ebc489c
SHA512982c2f997b14e43ab57c106cd688492be0648cd62bb2fe35b5ec3a261fa493aa7bf714071349ec0e37361c4748532f42e875fcc7a9f2cf14e59d7046cf5566db
-
Filesize
321KB
MD54f648ea68eedd16d8f907d5a934db37b
SHA1cd5a8a7fbd2a62b7b0d758055b012222dd64aa65
SHA256ef88e43e111692abb5f8ac336a5087f618eb9c392e80fc0bd29309e41ebc489c
SHA512982c2f997b14e43ab57c106cd688492be0648cd62bb2fe35b5ec3a261fa493aa7bf714071349ec0e37361c4748532f42e875fcc7a9f2cf14e59d7046cf5566db
-
Filesize
380KB
MD52e30e5e9e8e47345d57caf50aad9b817
SHA14ddef4b53f69b6b262b053cd332887d7b06b2185
SHA2561d62487e67f7397f3c2a83b609ae754823e2e216ee1732e97f3f46ef5a129310
SHA512e868037a83ac41772dfad7e05f179b70487e6545208388626705a690d4abb7e14cb3765b2334f118de7a313f5e65c6c7d1ee60568d27658f9c28c593573e3d46
-
Filesize
380KB
MD52e30e5e9e8e47345d57caf50aad9b817
SHA14ddef4b53f69b6b262b053cd332887d7b06b2185
SHA2561d62487e67f7397f3c2a83b609ae754823e2e216ee1732e97f3f46ef5a129310
SHA512e868037a83ac41772dfad7e05f179b70487e6545208388626705a690d4abb7e14cb3765b2334f118de7a313f5e65c6c7d1ee60568d27658f9c28c593573e3d46