Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe
Resource
win10v2004-20230220-en
General
-
Target
e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe
-
Size
686KB
-
MD5
399ea99d76b6641eadf2746c24b549e7
-
SHA1
1d01e346e2f3167b113b8fcf7005fa066d0c551b
-
SHA256
e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7
-
SHA512
3294a6a62628c2fefa750e430e362d755bab2bb9fda342ab8d728092b64cc5d5ccaa4ff5e8b02cc8655da6ae57a0cd70aa8e7aab015ce2e61b6759b3f380d0fb
-
SSDEEP
12288:4Mrvy90r/qeF0vFlKifTO/SPk0SkNwY4kAPz76suK+wYtR:ny8FWvqifoSMdzYnAPKC+wYtR
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8921.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4368-189-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-190-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-192-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-194-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-196-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-198-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-200-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-202-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-204-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-206-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-208-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-210-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-212-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-214-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-216-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-218-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-220-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-223-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4368-1109-0x0000000007140000-0x0000000007150000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1612 un874868.exe 1644 pro8921.exe 4368 qu0463.exe 4060 si104343.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8921.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8921.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un874868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un874868.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4024 1644 WerFault.exe 84 3688 4368 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1644 pro8921.exe 1644 pro8921.exe 4368 qu0463.exe 4368 qu0463.exe 4060 si104343.exe 4060 si104343.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1644 pro8921.exe Token: SeDebugPrivilege 4368 qu0463.exe Token: SeDebugPrivilege 4060 si104343.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4124 wrote to memory of 1612 4124 e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe 83 PID 4124 wrote to memory of 1612 4124 e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe 83 PID 4124 wrote to memory of 1612 4124 e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe 83 PID 1612 wrote to memory of 1644 1612 un874868.exe 84 PID 1612 wrote to memory of 1644 1612 un874868.exe 84 PID 1612 wrote to memory of 1644 1612 un874868.exe 84 PID 1612 wrote to memory of 4368 1612 un874868.exe 90 PID 1612 wrote to memory of 4368 1612 un874868.exe 90 PID 1612 wrote to memory of 4368 1612 un874868.exe 90 PID 4124 wrote to memory of 4060 4124 e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe 94 PID 4124 wrote to memory of 4060 4124 e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe 94 PID 4124 wrote to memory of 4060 4124 e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe"C:\Users\Admin\AppData\Local\Temp\e060022d703e53eae162a83d69f7c56dfb0d3c99a9fef22dbcd6eed0579b59b7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un874868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un874868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8921.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 10804⤵
- Program crash
PID:4024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0463.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 19004⤵
- Program crash
PID:3688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104343.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1644 -ip 16441⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4368 -ip 43681⤵PID:2768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5487c2bb8112218152e3d4dc89963c68d
SHA118341a5d1053cbf81e9f01e495183b7df7e1bb7b
SHA2566d7b4039fb742a6cf69ba4fb57b62177e6daf6ebe19f60d5b1c7ac7dd4f1eb08
SHA51258b984bec6053510287410e4d7c2eadca07ae1e2233ff4267ad65de7bb8e48a5087dead69460e3645884fb205240fb7d2ade4bb41ff6ca0b4a00e3898a8b01dd
-
Filesize
175KB
MD5487c2bb8112218152e3d4dc89963c68d
SHA118341a5d1053cbf81e9f01e495183b7df7e1bb7b
SHA2566d7b4039fb742a6cf69ba4fb57b62177e6daf6ebe19f60d5b1c7ac7dd4f1eb08
SHA51258b984bec6053510287410e4d7c2eadca07ae1e2233ff4267ad65de7bb8e48a5087dead69460e3645884fb205240fb7d2ade4bb41ff6ca0b4a00e3898a8b01dd
-
Filesize
544KB
MD5f17c2f7e2b3c80fb83cccd257648445d
SHA159bb03d09873a021888b0e3598f59a69124733cd
SHA256456e9c6bf74ad42ffdebe30270d636d328748cf79e0c19de29e1cd49d831040e
SHA512dcd9e7f070f7b2cbd8e60d028701f2c6eda9b7697069dcb1881b3d77c5bda36ada550d93896d0014a852df5cfdd6252073cc19b1c06febca8b6b2ff4b5be5a6d
-
Filesize
544KB
MD5f17c2f7e2b3c80fb83cccd257648445d
SHA159bb03d09873a021888b0e3598f59a69124733cd
SHA256456e9c6bf74ad42ffdebe30270d636d328748cf79e0c19de29e1cd49d831040e
SHA512dcd9e7f070f7b2cbd8e60d028701f2c6eda9b7697069dcb1881b3d77c5bda36ada550d93896d0014a852df5cfdd6252073cc19b1c06febca8b6b2ff4b5be5a6d
-
Filesize
325KB
MD5a8356e07f1316503e5d098d8f493c972
SHA19fe785f886352ceadb62c29cd28d310fcf3e9f73
SHA256b0096fe389f4abdd076e192031ff19f3c5322cf102bba2fd744b8d54679ac929
SHA512c0c54133d27de5b87b3d256ef6cab5f07af85c199e7f510810a82f3a09ca9e0a2ff89255ff36d11d0dd0da5cbe3d855e7407c948907dc6691e32b248e2cd87cd
-
Filesize
325KB
MD5a8356e07f1316503e5d098d8f493c972
SHA19fe785f886352ceadb62c29cd28d310fcf3e9f73
SHA256b0096fe389f4abdd076e192031ff19f3c5322cf102bba2fd744b8d54679ac929
SHA512c0c54133d27de5b87b3d256ef6cab5f07af85c199e7f510810a82f3a09ca9e0a2ff89255ff36d11d0dd0da5cbe3d855e7407c948907dc6691e32b248e2cd87cd
-
Filesize
384KB
MD54c25ccf8a1e2bbef230a5364a63e18af
SHA1efc5c18817c99b897f69f9b47f45f519b895f0aa
SHA25684e4ac5bca1b32984016d522aa2bd21b5b86530169e3a4a8b3a424d8f9308f91
SHA512f224320aa9cdd175992fa77b68a6cdf57dc8d7520957d773e350920ef4067c83ab5d5850228f97c9c6ebe7b8460c8ea1b395440ecfd62995fe6565a7a7fd5698
-
Filesize
384KB
MD54c25ccf8a1e2bbef230a5364a63e18af
SHA1efc5c18817c99b897f69f9b47f45f519b895f0aa
SHA25684e4ac5bca1b32984016d522aa2bd21b5b86530169e3a4a8b3a424d8f9308f91
SHA512f224320aa9cdd175992fa77b68a6cdf57dc8d7520957d773e350920ef4067c83ab5d5850228f97c9c6ebe7b8460c8ea1b395440ecfd62995fe6565a7a7fd5698