Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe
Resource
win10v2004-20230221-en
General
-
Target
8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe
-
Size
682KB
-
MD5
1e19421ac9a9e3f2a027d269f20ca2f0
-
SHA1
bee64ba8271038d8a77e0ca14135fe530d95b12f
-
SHA256
8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57
-
SHA512
a57694ceecd4f8274710161c374b8869395e025c6e5af192c42f36c9ef837a77a5b61ba7f9ed0808c38adb2cf61f9d19bb8ad239890a9688b94a3f8ce1b683be
-
SSDEEP
12288:bMrWy90TcyPG9UgMYN1r1E9Xyslsk/B/icQcJqAdqjnYiUL:NysxPG9Ugf6XyslsW/LJqAdqjnYiUL
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2056.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4956-191-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-192-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-194-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-196-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-198-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-206-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-203-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-208-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-210-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-212-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-214-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-216-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-218-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-220-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-222-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-224-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-226-0x0000000007730000-0x000000000776E000-memory.dmp family_redline behavioral1/memory/4956-228-0x0000000007730000-0x000000000776E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2452 un526171.exe 2852 pro2056.exe 4956 qu5225.exe 5076 si476069.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2056.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un526171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un526171.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2852 pro2056.exe 2852 pro2056.exe 4956 qu5225.exe 4956 qu5225.exe 5076 si476069.exe 5076 si476069.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2852 pro2056.exe Token: SeDebugPrivilege 4956 qu5225.exe Token: SeDebugPrivilege 5076 si476069.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2452 4980 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe 84 PID 4980 wrote to memory of 2452 4980 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe 84 PID 4980 wrote to memory of 2452 4980 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe 84 PID 2452 wrote to memory of 2852 2452 un526171.exe 85 PID 2452 wrote to memory of 2852 2452 un526171.exe 85 PID 2452 wrote to memory of 2852 2452 un526171.exe 85 PID 2452 wrote to memory of 4956 2452 un526171.exe 89 PID 2452 wrote to memory of 4956 2452 un526171.exe 89 PID 2452 wrote to memory of 4956 2452 un526171.exe 89 PID 4980 wrote to memory of 5076 4980 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe 91 PID 4980 wrote to memory of 5076 4980 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe 91 PID 4980 wrote to memory of 5076 4980 8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe"C:\Users\Admin\AppData\Local\Temp\8fcc80e1e67ce8d66c774d1f56a08e19e2dbf608fc7afed4916c4655a9533d57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un526171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un526171.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2056.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2056.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5225.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476069.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a01d465b6d4e7722637767b402f9a915
SHA1cdc1deee3f246a1a2a7d02be2517c1b8af2116df
SHA25657a00870844349cea161c54cf9e329b9e26cf0e33468504793446a4436bd4b27
SHA512a9458a377215cb9101c635bfe32e3b74607d8c7ff23e48622bd56c6ade38bd3bf4fe34eb7b171d0f182245b22133784dba693d6d6839912454ba32ac6f8889aa
-
Filesize
175KB
MD5a01d465b6d4e7722637767b402f9a915
SHA1cdc1deee3f246a1a2a7d02be2517c1b8af2116df
SHA25657a00870844349cea161c54cf9e329b9e26cf0e33468504793446a4436bd4b27
SHA512a9458a377215cb9101c635bfe32e3b74607d8c7ff23e48622bd56c6ade38bd3bf4fe34eb7b171d0f182245b22133784dba693d6d6839912454ba32ac6f8889aa
-
Filesize
540KB
MD543d191e67278a13b77c3fcdc5abcd319
SHA129eb26884d98ce432051c73fb0e14ca335b9e37e
SHA25601643bed4337129ea24c2c103fedf52fbb8c0867e41cda3eb851602f9466af9e
SHA512322f94bbdce47310853e143df12dced2738a785e6d4a6aa2707303b27aaaf3fdad0f632f749806db2ed6aefc010ed3606f0aa1f79b985b57ae64cfc60cc8801c
-
Filesize
540KB
MD543d191e67278a13b77c3fcdc5abcd319
SHA129eb26884d98ce432051c73fb0e14ca335b9e37e
SHA25601643bed4337129ea24c2c103fedf52fbb8c0867e41cda3eb851602f9466af9e
SHA512322f94bbdce47310853e143df12dced2738a785e6d4a6aa2707303b27aaaf3fdad0f632f749806db2ed6aefc010ed3606f0aa1f79b985b57ae64cfc60cc8801c
-
Filesize
322KB
MD516ce46e179f4dd2534ccabce8aac34d4
SHA1fc38339a8b8c7daab424ff890395caacfabb86ab
SHA256905dba7b516ab2f56fab9bb5955db451e1963e96e5fbe9b7994eab9d56eeb5bf
SHA512f9bcf49fb4658d0b19dea98a9e96cda1ad7ce99d3a1defeb503bd8cb034eff7b9d2d7cb4880300924e8e886473cc6a9da56c5226500335792f40d80d35d66bbe
-
Filesize
322KB
MD516ce46e179f4dd2534ccabce8aac34d4
SHA1fc38339a8b8c7daab424ff890395caacfabb86ab
SHA256905dba7b516ab2f56fab9bb5955db451e1963e96e5fbe9b7994eab9d56eeb5bf
SHA512f9bcf49fb4658d0b19dea98a9e96cda1ad7ce99d3a1defeb503bd8cb034eff7b9d2d7cb4880300924e8e886473cc6a9da56c5226500335792f40d80d35d66bbe
-
Filesize
379KB
MD519348b2f0480a4c0923b79a4844f3291
SHA1a8e01ec6fbdfd783db103e4753c0b713c00b7d13
SHA2561f83368285fda9e931c8e309a698cb000354afc2991bb2ab030403337d35de66
SHA51298ac345df392902234454d6b3764f43323702b44878873179a5cd00be5a56a702ed0def0f9923f938a10d1614df44921b427f35b824a1df59c84907bc25cc4ab
-
Filesize
379KB
MD519348b2f0480a4c0923b79a4844f3291
SHA1a8e01ec6fbdfd783db103e4753c0b713c00b7d13
SHA2561f83368285fda9e931c8e309a698cb000354afc2991bb2ab030403337d35de66
SHA51298ac345df392902234454d6b3764f43323702b44878873179a5cd00be5a56a702ed0def0f9923f938a10d1614df44921b427f35b824a1df59c84907bc25cc4ab