Analysis
-
max time kernel
57s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/03/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe
Resource
win10-20230220-en
General
-
Target
4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe
-
Size
688KB
-
MD5
7bee4ec98caa72521a943d4a8bc11b97
-
SHA1
1a1902a00ac8bcc04f540bdb21b93e0ad0a330d8
-
SHA256
4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb
-
SHA512
94728afe4694ef54719a5856875bfa412cd01feaa090cb5129de7d325d80c691ca61c123e241e723bb820ac5fadecab8d27133e18b757a7f66c2eb107a58d795
-
SSDEEP
12288:6MrUy90kML59cXPl3ABLA2/YTD06e1GnWDgmOcf55Ur:6yyLUOJgW1GnWycB5Ur
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8900.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1060-172-0x0000000004B10000-0x0000000004B56000-memory.dmp family_redline behavioral1/memory/1060-173-0x0000000004CC0000-0x0000000004D04000-memory.dmp family_redline behavioral1/memory/1060-174-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-175-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-177-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-179-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-181-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-185-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-202-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline behavioral1/memory/1060-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1060-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4884 un859046.exe 2064 pro8900.exe 1060 qu4561.exe 4396 si311390.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8900.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un859046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un859046.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2064 pro8900.exe 2064 pro8900.exe 1060 qu4561.exe 1060 qu4561.exe 4396 si311390.exe 4396 si311390.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2064 pro8900.exe Token: SeDebugPrivilege 1060 qu4561.exe Token: SeDebugPrivilege 4396 si311390.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4884 4616 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe 66 PID 4616 wrote to memory of 4884 4616 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe 66 PID 4616 wrote to memory of 4884 4616 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe 66 PID 4884 wrote to memory of 2064 4884 un859046.exe 67 PID 4884 wrote to memory of 2064 4884 un859046.exe 67 PID 4884 wrote to memory of 2064 4884 un859046.exe 67 PID 4884 wrote to memory of 1060 4884 un859046.exe 68 PID 4884 wrote to memory of 1060 4884 un859046.exe 68 PID 4884 wrote to memory of 1060 4884 un859046.exe 68 PID 4616 wrote to memory of 4396 4616 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe 70 PID 4616 wrote to memory of 4396 4616 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe 70 PID 4616 wrote to memory of 4396 4616 4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe"C:\Users\Admin\AppData\Local\Temp\4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859046.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859046.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8900.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8900.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4561.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4561.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311390.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD580669213916176a424e58de49380abcf
SHA146700c6415a21c420d4c3213f664addd3cb9afa3
SHA2566ffe58f010af828067bb1f59c1a0f8ad51aa99f42a00970d83db01d462fb152f
SHA512f89ed348c74014a37bb274851c86f9f44b057356400f920d96d34c84237ca0d9549c462c62e34a2a327694de3feab7bfc3415f0e6b371efa9ac1b2f83f03e7ff
-
Filesize
175KB
MD580669213916176a424e58de49380abcf
SHA146700c6415a21c420d4c3213f664addd3cb9afa3
SHA2566ffe58f010af828067bb1f59c1a0f8ad51aa99f42a00970d83db01d462fb152f
SHA512f89ed348c74014a37bb274851c86f9f44b057356400f920d96d34c84237ca0d9549c462c62e34a2a327694de3feab7bfc3415f0e6b371efa9ac1b2f83f03e7ff
-
Filesize
546KB
MD55db03564e1a98e16c68e64e9c7433502
SHA19906f54418d853642ccafaeca4cb3d823066afd5
SHA2566b967b93b698687f39dc62f55d95cf8bde54becf53245dfed589bf6846f660ab
SHA51297833f1680381b61f6f869255d12eb04b9d2ce2124ca2651f21a406bdef56a80debaab2243e97603c17b4e7c8aaca4af132cf0abdd9dc7eb728d78424d49827e
-
Filesize
546KB
MD55db03564e1a98e16c68e64e9c7433502
SHA19906f54418d853642ccafaeca4cb3d823066afd5
SHA2566b967b93b698687f39dc62f55d95cf8bde54becf53245dfed589bf6846f660ab
SHA51297833f1680381b61f6f869255d12eb04b9d2ce2124ca2651f21a406bdef56a80debaab2243e97603c17b4e7c8aaca4af132cf0abdd9dc7eb728d78424d49827e
-
Filesize
325KB
MD5f868a91a3074f6811bf8e6d3ebf88c7b
SHA150818d945faa647f96037c3241aea0ba27c759ea
SHA256bb6e5133570676db27697681dbe943826490657c398e523bc4d5f81f2660fce8
SHA512233e86fa85e69fcd3268eb71d3abf3b9e565267e294d5f0616bea7e950a88eaf50c4fc733cf92f803349b2dd5fc161980725511fd5b1d57bfb4ab1477172fbbf
-
Filesize
325KB
MD5f868a91a3074f6811bf8e6d3ebf88c7b
SHA150818d945faa647f96037c3241aea0ba27c759ea
SHA256bb6e5133570676db27697681dbe943826490657c398e523bc4d5f81f2660fce8
SHA512233e86fa85e69fcd3268eb71d3abf3b9e565267e294d5f0616bea7e950a88eaf50c4fc733cf92f803349b2dd5fc161980725511fd5b1d57bfb4ab1477172fbbf
-
Filesize
384KB
MD5b95fbd16fd9189c917f139b8a8c9d3b0
SHA189b824f0be13f090bf5a0099bcf3c352fc799709
SHA25683378518fe07a15ea294531b147cb4a2449c961ee6a6ade06e4879f2ce4d8863
SHA512efb4ab22766a4a1961946a08f3482931a2313afab2995a1df07a8f16e26c5942bdc9f63a18ddaa600f391d022332543f2bed3814c52ceb9ba01c07e8c8e12806
-
Filesize
384KB
MD5b95fbd16fd9189c917f139b8a8c9d3b0
SHA189b824f0be13f090bf5a0099bcf3c352fc799709
SHA25683378518fe07a15ea294531b147cb4a2449c961ee6a6ade06e4879f2ce4d8863
SHA512efb4ab22766a4a1961946a08f3482931a2313afab2995a1df07a8f16e26c5942bdc9f63a18ddaa600f391d022332543f2bed3814c52ceb9ba01c07e8c8e12806