Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe
Resource
win10v2004-20230220-en
General
-
Target
b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe
-
Size
672KB
-
MD5
5e9501ed5b50a99cd6908fd7996f82a3
-
SHA1
1b4d691179998d89a046ab578d2b91b9f9678d7f
-
SHA256
b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6
-
SHA512
dc3bcb01734f1d787713c3d7073783a0e9e7743747b89ddfd6dd8bb4f27b136037eb5845947918c87d81156273ed9c15b9bd3ccc74bf88bc4b81c8f7c027413c
-
SSDEEP
12288:bMrDy90NFMQGNHTHtNnXIUT4jznp1GzT3Lq31QcNk4uB:IyoMd9THvYUTIznp1GzT3G36qk4E
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3204.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3204.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3656-192-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-191-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-194-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-196-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-198-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-200-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-202-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-204-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-206-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-208-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-210-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-214-0x0000000003A30000-0x0000000003A40000-memory.dmp family_redline behavioral1/memory/3656-215-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-217-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-219-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-221-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-223-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-225-0x0000000006660000-0x000000000669F000-memory.dmp family_redline behavioral1/memory/3656-227-0x0000000006660000-0x000000000669F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3360 un973763.exe 4756 pro3204.exe 3656 qu5382.exe 4208 si948091.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3204.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un973763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un973763.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 768 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4596 4756 WerFault.exe 84 4812 3656 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4756 pro3204.exe 4756 pro3204.exe 3656 qu5382.exe 3656 qu5382.exe 4208 si948091.exe 4208 si948091.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4756 pro3204.exe Token: SeDebugPrivilege 3656 qu5382.exe Token: SeDebugPrivilege 4208 si948091.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 984 wrote to memory of 3360 984 b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe 83 PID 984 wrote to memory of 3360 984 b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe 83 PID 984 wrote to memory of 3360 984 b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe 83 PID 3360 wrote to memory of 4756 3360 un973763.exe 84 PID 3360 wrote to memory of 4756 3360 un973763.exe 84 PID 3360 wrote to memory of 4756 3360 un973763.exe 84 PID 3360 wrote to memory of 3656 3360 un973763.exe 90 PID 3360 wrote to memory of 3656 3360 un973763.exe 90 PID 3360 wrote to memory of 3656 3360 un973763.exe 90 PID 984 wrote to memory of 4208 984 b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe 94 PID 984 wrote to memory of 4208 984 b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe 94 PID 984 wrote to memory of 4208 984 b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe"C:\Users\Admin\AppData\Local\Temp\b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 10804⤵
- Program crash
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5382.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5382.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 18044⤵
- Program crash
PID:4812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948091.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4756 -ip 47561⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3656 -ip 36561⤵PID:1840
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58ea8fbd3361ac12fc0a1325198de2c4c
SHA1793bd1ed426027f2806ad9c83425c1be5200fc8e
SHA2569f9e624b1252940cc16fb96d70ac8cfb7a56d47494c073a995548912385015aa
SHA512786cf752b22d922bea3e0765256ebfe20ec9106b3321a9e30e3d1ab9ff6fa8ef2966ccdbe4bc397c011064639cbecfd6c2d658762f217a8e18b6e00c1e40156b
-
Filesize
175KB
MD58ea8fbd3361ac12fc0a1325198de2c4c
SHA1793bd1ed426027f2806ad9c83425c1be5200fc8e
SHA2569f9e624b1252940cc16fb96d70ac8cfb7a56d47494c073a995548912385015aa
SHA512786cf752b22d922bea3e0765256ebfe20ec9106b3321a9e30e3d1ab9ff6fa8ef2966ccdbe4bc397c011064639cbecfd6c2d658762f217a8e18b6e00c1e40156b
-
Filesize
530KB
MD5edd221e1bf2a05cc0c45d214b00aea33
SHA19cc49bbfaeaab26499a0fcd0380469d6d824d682
SHA2560ddb2ba63cb426ec876c1b9ae88f05b96fdc09d73b1b9936b45b293727748824
SHA512fc0118977a2da264e17961acab8b1b3ada7281b3070dc99e3c04ec24e06833f74b2573cf8c664fe23f36a32df4e72ee38642217f930af29c92320e6e25e7db74
-
Filesize
530KB
MD5edd221e1bf2a05cc0c45d214b00aea33
SHA19cc49bbfaeaab26499a0fcd0380469d6d824d682
SHA2560ddb2ba63cb426ec876c1b9ae88f05b96fdc09d73b1b9936b45b293727748824
SHA512fc0118977a2da264e17961acab8b1b3ada7281b3070dc99e3c04ec24e06833f74b2573cf8c664fe23f36a32df4e72ee38642217f930af29c92320e6e25e7db74
-
Filesize
301KB
MD55aa5aeb1a27b561627972a298d895d9c
SHA13e743182cefa7cc8558f0a3e1c25ad1d8a487e75
SHA256a9e85a476f791985cb26fa8655844d05e2ff33575e8025cec49be667bbb98f62
SHA51202af0465aaf9aab74d9c814e7c286a720974dc8d144df0b4342dcc1c8558276a41ccf4f8b2094e4facd35cce8d7fd2a10c178de3a8e4b0b41396de06184f27fb
-
Filesize
301KB
MD55aa5aeb1a27b561627972a298d895d9c
SHA13e743182cefa7cc8558f0a3e1c25ad1d8a487e75
SHA256a9e85a476f791985cb26fa8655844d05e2ff33575e8025cec49be667bbb98f62
SHA51202af0465aaf9aab74d9c814e7c286a720974dc8d144df0b4342dcc1c8558276a41ccf4f8b2094e4facd35cce8d7fd2a10c178de3a8e4b0b41396de06184f27fb
-
Filesize
359KB
MD527de010e28626853a8358d50500c6e21
SHA1eefb3eab3db9aace3976e6815fff31941e25d648
SHA2569daef93220fd5376717f18e8d47b8a1bbad9098c949e2e1a93f3884303e5c834
SHA51250e341a52c09f5d2454842760baceee0611e306c1ba7885082c9af0ff7ccaf405e89963a5c9055369f333bbe9879872a24290075e8ae39edb05a904b962c8173
-
Filesize
359KB
MD527de010e28626853a8358d50500c6e21
SHA1eefb3eab3db9aace3976e6815fff31941e25d648
SHA2569daef93220fd5376717f18e8d47b8a1bbad9098c949e2e1a93f3884303e5c834
SHA51250e341a52c09f5d2454842760baceee0611e306c1ba7885082c9af0ff7ccaf405e89963a5c9055369f333bbe9879872a24290075e8ae39edb05a904b962c8173