Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 20:46
Static task
static1
Behavioral task
behavioral1
Sample
5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe
Resource
win10v2004-20230221-en
General
-
Target
5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe
-
Size
684KB
-
MD5
d3a19b6c70e3715ddc07dee96a9e61d0
-
SHA1
aff98cbf14f9ffef042427fb224e1f04e6cc1269
-
SHA256
5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb
-
SHA512
44dadcd619a0e68a9b5a77248f9bf2d2b191eb0ca07f8095e634f0d6d8f9ad2d1c23e21838f99264612df34d9fabe626da2bb870b7ed08d094117c8f92d45463
-
SSDEEP
12288:pMrsy90WD8gFwv62mHTSL0nP/jksBCwEeVUVBcv5XwR:lyjDGv5sSAnP/jBQ2v9wR
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1196.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1196.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/208-192-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-197-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-194-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-199-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-201-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-203-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-205-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-207-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-209-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-211-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-213-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-215-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-217-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-219-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-221-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-223-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-225-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/208-227-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2564 un657639.exe 5028 pro1196.exe 208 qu1206.exe 4588 si991417.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1196.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un657639.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un657639.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5028 pro1196.exe 5028 pro1196.exe 208 qu1206.exe 208 qu1206.exe 4588 si991417.exe 4588 si991417.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5028 pro1196.exe Token: SeDebugPrivilege 208 qu1206.exe Token: SeDebugPrivilege 4588 si991417.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2564 4700 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe 86 PID 4700 wrote to memory of 2564 4700 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe 86 PID 4700 wrote to memory of 2564 4700 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe 86 PID 2564 wrote to memory of 5028 2564 un657639.exe 87 PID 2564 wrote to memory of 5028 2564 un657639.exe 87 PID 2564 wrote to memory of 5028 2564 un657639.exe 87 PID 2564 wrote to memory of 208 2564 un657639.exe 88 PID 2564 wrote to memory of 208 2564 un657639.exe 88 PID 2564 wrote to memory of 208 2564 un657639.exe 88 PID 4700 wrote to memory of 4588 4700 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe 90 PID 4700 wrote to memory of 4588 4700 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe 90 PID 4700 wrote to memory of 4588 4700 5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe"C:\Users\Admin\AppData\Local\Temp\5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657639.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657639.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1196.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1206.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991417.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56365e9723c550859a7ce79a4d0b681ea
SHA191c2b3ad78b383319b8a53c79ab0b8d8bddfbb0c
SHA256535ebb9847a52a99d40f26f013ae1e6bd0f3a2753f45849e9e5c08b82bd1fe69
SHA512b7b61d9dfa43016ecb9f8bbb1f87b0805988cf2d9cc7d71227e8e10447c8afcd4970a681c18fddb85422f8859b8b5cbd88f4cacf3ee17b8efda70d759570b0bc
-
Filesize
175KB
MD56365e9723c550859a7ce79a4d0b681ea
SHA191c2b3ad78b383319b8a53c79ab0b8d8bddfbb0c
SHA256535ebb9847a52a99d40f26f013ae1e6bd0f3a2753f45849e9e5c08b82bd1fe69
SHA512b7b61d9dfa43016ecb9f8bbb1f87b0805988cf2d9cc7d71227e8e10447c8afcd4970a681c18fddb85422f8859b8b5cbd88f4cacf3ee17b8efda70d759570b0bc
-
Filesize
541KB
MD52311abd839f9521de66e9a503e6cd13e
SHA16acb64a244214cd5e8798a9bb064b574ae24a060
SHA256172007c25c93ed06b350029611a7c3a57f1cbe4bcd0294a9e5779ae859e1d61c
SHA512cd06c5e6f8bc6d8e708795e8bc3249ea9b5dee9ed7ef4438db07c7d4882cbefaa1abbf381dd7afb53e3803bb9db251363bd8192334496ba7f49df776581ae8ba
-
Filesize
541KB
MD52311abd839f9521de66e9a503e6cd13e
SHA16acb64a244214cd5e8798a9bb064b574ae24a060
SHA256172007c25c93ed06b350029611a7c3a57f1cbe4bcd0294a9e5779ae859e1d61c
SHA512cd06c5e6f8bc6d8e708795e8bc3249ea9b5dee9ed7ef4438db07c7d4882cbefaa1abbf381dd7afb53e3803bb9db251363bd8192334496ba7f49df776581ae8ba
-
Filesize
322KB
MD5f082b052a4f36d14110422480006485b
SHA16a6aae97d95e544f5ac625ffa5375c9978cc8ea6
SHA25604ad01cd9d41fd2dec1757182c76f5b354fc50b1dc2c5942c9645ae5c864f1c7
SHA51218776a2f08a3f609a3f4248143041b22f2db92fa6a4973ffd54eeb3c6a07fbed9254d3133a563534b28336b9b27ea93b1e0e7141219aefcfbdec68759bb4559e
-
Filesize
322KB
MD5f082b052a4f36d14110422480006485b
SHA16a6aae97d95e544f5ac625ffa5375c9978cc8ea6
SHA25604ad01cd9d41fd2dec1757182c76f5b354fc50b1dc2c5942c9645ae5c864f1c7
SHA51218776a2f08a3f609a3f4248143041b22f2db92fa6a4973ffd54eeb3c6a07fbed9254d3133a563534b28336b9b27ea93b1e0e7141219aefcfbdec68759bb4559e
-
Filesize
379KB
MD5df3b161acac5f07369851c8af1f83016
SHA1d732ea81a5ef282859d8d2dd713b602e08c00aa9
SHA25665494b1269ebdf8e1b07a6a4311e102c9dd6b782452b0008b5f7cc3d991877ba
SHA512cbe96ecaa05d253b0c69d1cdbdf2f143454c009e2ea6ee1e30b0d23a72464f17e0498e5291cb15b10922fa8af9e49b2d5c02b501840a021f02953d875c63ff5c
-
Filesize
379KB
MD5df3b161acac5f07369851c8af1f83016
SHA1d732ea81a5ef282859d8d2dd713b602e08c00aa9
SHA25665494b1269ebdf8e1b07a6a4311e102c9dd6b782452b0008b5f7cc3d991877ba
SHA512cbe96ecaa05d253b0c69d1cdbdf2f143454c009e2ea6ee1e30b0d23a72464f17e0498e5291cb15b10922fa8af9e49b2d5c02b501840a021f02953d875c63ff5c