Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 00:02
Static task
static1
Behavioral task
behavioral1
Sample
1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe
Resource
win10v2004-20230220-en
General
-
Target
1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe
-
Size
685KB
-
MD5
dae30ae283a803494b5fecd32baf0740
-
SHA1
0ebc72813ce2615910681487907e5b7590e4a72a
-
SHA256
1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1
-
SHA512
a9ed52206b9306781b677a21117a2b63f33f95d63892dcffe98eb2d533b5ed391620c0b17b0cf1994d21cbd066d402117ac571b7f68b57ad981952f51504316c
-
SSDEEP
12288:cMrby90OgMdhgmqt/8IY5UctXoE8dR4IkOXZ5Udd5h8vB:vyzrgt/cJu2IkOXkdpMB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2694.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2694.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3768-189-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-190-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-192-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-194-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-196-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-198-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-200-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-202-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-204-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-206-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-208-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-210-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-212-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-214-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-216-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-218-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-220-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral1/memory/3768-222-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4604 un731625.exe 816 pro2694.exe 3768 qu2407.exe 2044 si452507.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2694.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un731625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un731625.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 816 pro2694.exe 816 pro2694.exe 3768 qu2407.exe 3768 qu2407.exe 2044 si452507.exe 2044 si452507.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 816 pro2694.exe Token: SeDebugPrivilege 3768 qu2407.exe Token: SeDebugPrivilege 2044 si452507.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4604 3304 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe 84 PID 3304 wrote to memory of 4604 3304 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe 84 PID 3304 wrote to memory of 4604 3304 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe 84 PID 4604 wrote to memory of 816 4604 un731625.exe 85 PID 4604 wrote to memory of 816 4604 un731625.exe 85 PID 4604 wrote to memory of 816 4604 un731625.exe 85 PID 4604 wrote to memory of 3768 4604 un731625.exe 90 PID 4604 wrote to memory of 3768 4604 un731625.exe 90 PID 4604 wrote to memory of 3768 4604 un731625.exe 90 PID 3304 wrote to memory of 2044 3304 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe 93 PID 3304 wrote to memory of 2044 3304 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe 93 PID 3304 wrote to memory of 2044 3304 1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe"C:\Users\Admin\AppData\Local\Temp\1163c264e49f0b89b4bad1de4f56b70c8281c3917b077b15a8c07c3500b393a1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731625.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2694.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2694.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2407.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452507.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452507.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD524dbe11c697570e38ebb2df364537604
SHA12b71c2cc742bb9448d5713a24b8e5c9417be9194
SHA25605e5ef0a93ffafda0c3bd6586851828cb246aded161b50298466cc5f948ea69e
SHA5120cae2c9e613eab844750a84a5202754f49dc85937920e745f7b57876fb192d96deb8ae2f8888c5dab9c3a42d1faf9f44226897e9c05c7d332ef3e826809acb2a
-
Filesize
175KB
MD524dbe11c697570e38ebb2df364537604
SHA12b71c2cc742bb9448d5713a24b8e5c9417be9194
SHA25605e5ef0a93ffafda0c3bd6586851828cb246aded161b50298466cc5f948ea69e
SHA5120cae2c9e613eab844750a84a5202754f49dc85937920e745f7b57876fb192d96deb8ae2f8888c5dab9c3a42d1faf9f44226897e9c05c7d332ef3e826809acb2a
-
Filesize
543KB
MD5942cd649b976c7479cffa4d7e44d7631
SHA1838e564fc30de6b24c8e5fbca9b0b7a16a576977
SHA2565dca4be5b7e2e7a85dee6bd705dd2086cfc59ac5f9e0def708c8505bf83c5c29
SHA5124b8603c3b5c5d7a26587a45a63cc2ab589e162fabcc78d65b1777d9347593cd7c7a943cb6e0e312106cb5bc14b0b800ca0b981381d1aa4d4743372a40f0e59d2
-
Filesize
543KB
MD5942cd649b976c7479cffa4d7e44d7631
SHA1838e564fc30de6b24c8e5fbca9b0b7a16a576977
SHA2565dca4be5b7e2e7a85dee6bd705dd2086cfc59ac5f9e0def708c8505bf83c5c29
SHA5124b8603c3b5c5d7a26587a45a63cc2ab589e162fabcc78d65b1777d9347593cd7c7a943cb6e0e312106cb5bc14b0b800ca0b981381d1aa4d4743372a40f0e59d2
-
Filesize
322KB
MD50e647095aa5ae5ae3271423c99bd6a8b
SHA1ebf0ae4abd9c65da2a84ddee0ccbb0237d5a0db4
SHA256f46921ba96faf18e7d1a88cb52564beff34eba1fbb4a02406dbb735c980635b7
SHA512ae86cd2e9504f66101ddddf262d6dddea6d75aa6df61da92e19c94978d82b7f6481247dbb9c5741f6b5fb33067f240130607748f6b2518f1b03ce289088c4811
-
Filesize
322KB
MD50e647095aa5ae5ae3271423c99bd6a8b
SHA1ebf0ae4abd9c65da2a84ddee0ccbb0237d5a0db4
SHA256f46921ba96faf18e7d1a88cb52564beff34eba1fbb4a02406dbb735c980635b7
SHA512ae86cd2e9504f66101ddddf262d6dddea6d75aa6df61da92e19c94978d82b7f6481247dbb9c5741f6b5fb33067f240130607748f6b2518f1b03ce289088c4811
-
Filesize
379KB
MD5703968e3d395b49b4bda2defe11255d0
SHA1397739db786c67d82198016cce637d3cc22f152f
SHA25645f18b13188c31829ae59b6d672ee286891c50a2f12e38d012b9e1cde2898706
SHA512e8756f2f223099cfab9f34886deeb5fe7fa44c7761ac929e089ef38281e170416f296a8dc3241924a377fcd40e35a831ed73d2810252e5294808bc23ad8de572
-
Filesize
379KB
MD5703968e3d395b49b4bda2defe11255d0
SHA1397739db786c67d82198016cce637d3cc22f152f
SHA25645f18b13188c31829ae59b6d672ee286891c50a2f12e38d012b9e1cde2898706
SHA512e8756f2f223099cfab9f34886deeb5fe7fa44c7761ac929e089ef38281e170416f296a8dc3241924a377fcd40e35a831ed73d2810252e5294808bc23ad8de572