Analysis
-
max time kernel
60s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe
Resource
win10v2004-20230220-en
General
-
Target
184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe
-
Size
682KB
-
MD5
aa0311f20c784cd4ea69bde6da7b79a2
-
SHA1
a8e73d8bd2ea31be179d9c75c90da2004c55bf92
-
SHA256
184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef
-
SHA512
a60668cbb00951363e49f3b155ce464666cce9253d871c3315c737808404fa053d2bcf1a360aa999358d5cc454f74d54706b652482ff08303afc3dc5ab129df4
-
SSDEEP
12288:6MrWy90i0tKuHV1VPkrUejSYFjSZyLkDBw/X4hHqEbg+GvYQ:oyReHLJUU7YhqyL2eX4hHqEbgBvYQ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1357.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2184-192-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-193-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-195-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-197-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-199-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-201-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-203-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-205-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-209-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-212-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-215-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-217-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-219-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-221-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-223-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-225-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-227-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-229-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/2184-1112-0x0000000004C70000-0x0000000004C80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4368 un059225.exe 1676 pro1357.exe 2184 qu4522.exe 4908 si256427.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1357.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1357.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un059225.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un059225.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1676 pro1357.exe 1676 pro1357.exe 2184 qu4522.exe 2184 qu4522.exe 4908 si256427.exe 4908 si256427.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1676 pro1357.exe Token: SeDebugPrivilege 2184 qu4522.exe Token: SeDebugPrivilege 4908 si256427.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4368 5104 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe 84 PID 5104 wrote to memory of 4368 5104 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe 84 PID 5104 wrote to memory of 4368 5104 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe 84 PID 4368 wrote to memory of 1676 4368 un059225.exe 85 PID 4368 wrote to memory of 1676 4368 un059225.exe 85 PID 4368 wrote to memory of 1676 4368 un059225.exe 85 PID 4368 wrote to memory of 2184 4368 un059225.exe 93 PID 4368 wrote to memory of 2184 4368 un059225.exe 93 PID 4368 wrote to memory of 2184 4368 un059225.exe 93 PID 5104 wrote to memory of 4908 5104 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe 95 PID 5104 wrote to memory of 4908 5104 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe 95 PID 5104 wrote to memory of 4908 5104 184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe"C:\Users\Admin\AppData\Local\Temp\184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059225.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059225.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1357.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4522.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256427.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256427.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b08dbe8503efbdfff0b87a6206f0c83d
SHA1916ebe6be8666cb15f9a033e8fb52384e3e93055
SHA256785fa88f3dfd43436f7f72693553b8757c043049454135d4aaacb239a524fe2a
SHA5124e4385fe4ea663831e7802b8036a1cef3f7c1d39b6086e204a6e8578c8eb961d346a21254761f5a4194c7c4f05d28e7f7f85aae2823f4d0ab4bdf5c7c0b222e3
-
Filesize
175KB
MD5b08dbe8503efbdfff0b87a6206f0c83d
SHA1916ebe6be8666cb15f9a033e8fb52384e3e93055
SHA256785fa88f3dfd43436f7f72693553b8757c043049454135d4aaacb239a524fe2a
SHA5124e4385fe4ea663831e7802b8036a1cef3f7c1d39b6086e204a6e8578c8eb961d346a21254761f5a4194c7c4f05d28e7f7f85aae2823f4d0ab4bdf5c7c0b222e3
-
Filesize
540KB
MD5b4393b69ecaefc691d9a888e98f5eea2
SHA1408d06dd2899db838509b3520a8a7b0ea15487af
SHA256162af17b5f326a28d8e7fc84504615c03d68cb4a7e76134f8d23c462fb9f7a97
SHA512d95eabf197ffeb7c99ecd88ec08ed6b7a72190a1111b910b259f2a72dee96f984238c4b90a6e65eaecddca527a573c15af396fff457016b92717f3c85fe06854
-
Filesize
540KB
MD5b4393b69ecaefc691d9a888e98f5eea2
SHA1408d06dd2899db838509b3520a8a7b0ea15487af
SHA256162af17b5f326a28d8e7fc84504615c03d68cb4a7e76134f8d23c462fb9f7a97
SHA512d95eabf197ffeb7c99ecd88ec08ed6b7a72190a1111b910b259f2a72dee96f984238c4b90a6e65eaecddca527a573c15af396fff457016b92717f3c85fe06854
-
Filesize
322KB
MD5c4aa77882568cbdc9cd654b7fe02128a
SHA15ba88a3e81731d3505bab2aa21063803155ecfbc
SHA2569708af5bb2fb114402fbd4ec70465eafc3ac16901ba458697be5e41ef1cc4604
SHA512ff59fd5fb25520a2dcf31690b040522f1663b17da05ab3df69aad5899bfd48c1fed4d3cb3a9c28072b64b25263b058924be025bbcc10d547ee9a1cfbcee8b7ab
-
Filesize
322KB
MD5c4aa77882568cbdc9cd654b7fe02128a
SHA15ba88a3e81731d3505bab2aa21063803155ecfbc
SHA2569708af5bb2fb114402fbd4ec70465eafc3ac16901ba458697be5e41ef1cc4604
SHA512ff59fd5fb25520a2dcf31690b040522f1663b17da05ab3df69aad5899bfd48c1fed4d3cb3a9c28072b64b25263b058924be025bbcc10d547ee9a1cfbcee8b7ab
-
Filesize
379KB
MD5533d0ad576cf36cb1f7f31d82856db69
SHA1948a43dc88573a27525422a224789d20e45f83b5
SHA256b0d5f22232ecc26c2b3ff40dfd6d0dc714cd45f8ebb86594925b379843bd47af
SHA5127ac9e4b29dba41928ba4152b04e8b58c6a33d396e83ce63c2be9e0bb357b84ba30e0bfd8e5298c8316cd9d0b8a63e6b46f4b556d4adb4bfac5da803e9996b597
-
Filesize
379KB
MD5533d0ad576cf36cb1f7f31d82856db69
SHA1948a43dc88573a27525422a224789d20e45f83b5
SHA256b0d5f22232ecc26c2b3ff40dfd6d0dc714cd45f8ebb86594925b379843bd47af
SHA5127ac9e4b29dba41928ba4152b04e8b58c6a33d396e83ce63c2be9e0bb357b84ba30e0bfd8e5298c8316cd9d0b8a63e6b46f4b556d4adb4bfac5da803e9996b597