Analysis
-
max time kernel
52s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 00:07
Static task
static1
Behavioral task
behavioral1
Sample
55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe
Resource
win10-20230220-en
General
-
Target
55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe
-
Size
682KB
-
MD5
879dc01c8789f17d701d4862b2b7a4a0
-
SHA1
b09306e8abd43834d7f538b8266eadf8862e731a
-
SHA256
55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f
-
SHA512
e33a10a88830731916a6a0f29c5259813f53dccbc6672a120b78d9b405fcbad153af62abee6fcf46d9dd259e81f88ad59dc1abd8bfdb170b0bc4a53246006659
-
SSDEEP
12288:YMrny90ZOqjRRth2Y0gBuG/ls1bvu/rjP7gl48ZTkXpeypU4:vyiOqjRR32Y9BRyhG8l48ZTkYYd
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9895.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3784-175-0x0000000004930000-0x0000000004976000-memory.dmp family_redline behavioral1/memory/3784-176-0x0000000006FF0000-0x0000000007034000-memory.dmp family_redline behavioral1/memory/3784-177-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-178-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-181-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-185-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-187-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-189-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-191-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-193-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-195-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-197-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-199-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-201-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-203-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-205-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-207-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-209-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-211-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline behavioral1/memory/3784-213-0x0000000006FF0000-0x000000000702E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5032 un832736.exe 2080 pro9895.exe 3784 qu5208.exe 4820 si552781.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9895.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un832736.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un832736.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2080 pro9895.exe 2080 pro9895.exe 3784 qu5208.exe 3784 qu5208.exe 4820 si552781.exe 4820 si552781.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 pro9895.exe Token: SeDebugPrivilege 3784 qu5208.exe Token: SeDebugPrivilege 4820 si552781.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2148 wrote to memory of 5032 2148 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe 66 PID 2148 wrote to memory of 5032 2148 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe 66 PID 2148 wrote to memory of 5032 2148 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe 66 PID 5032 wrote to memory of 2080 5032 un832736.exe 67 PID 5032 wrote to memory of 2080 5032 un832736.exe 67 PID 5032 wrote to memory of 2080 5032 un832736.exe 67 PID 5032 wrote to memory of 3784 5032 un832736.exe 68 PID 5032 wrote to memory of 3784 5032 un832736.exe 68 PID 5032 wrote to memory of 3784 5032 un832736.exe 68 PID 2148 wrote to memory of 4820 2148 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe 70 PID 2148 wrote to memory of 4820 2148 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe 70 PID 2148 wrote to memory of 4820 2148 55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe"C:\Users\Admin\AppData\Local\Temp\55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832736.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832736.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9895.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9895.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5208.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552781.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bdb7a8a688af45d403194453893d842b
SHA1055ccc82c33ee6dbaa3e9ce9e257b6040b71f7ab
SHA2567779ee7b1e731a81fdbba79af9a872ad9779b2b1e2a9eb62d09160c622affbaa
SHA5123e2a9a5dd06453a275c25f20b7bb299a7b0a7de868445d9a71e769f47b7b154008b1e13106e2635d866cf60f73ede36cdd230879ea6da780ff73f6fb8a689e93
-
Filesize
175KB
MD5bdb7a8a688af45d403194453893d842b
SHA1055ccc82c33ee6dbaa3e9ce9e257b6040b71f7ab
SHA2567779ee7b1e731a81fdbba79af9a872ad9779b2b1e2a9eb62d09160c622affbaa
SHA5123e2a9a5dd06453a275c25f20b7bb299a7b0a7de868445d9a71e769f47b7b154008b1e13106e2635d866cf60f73ede36cdd230879ea6da780ff73f6fb8a689e93
-
Filesize
540KB
MD54c1a10c50ae4ac19ef0a18d2a83c3881
SHA13ffd8db20182961041cdefff4561f9297c0ad5d6
SHA2567810ba9ad6366813ff7f9270e5599171e58e2702c796953adf3f049e7ddc2e49
SHA5124e97289a43396ea35509938d44bb2a9f4bde40516a9119b943e79ba0d33ea8b17cb3ef9c38757569384980874f02118dcfe5f6ffae0ab923d0f55ac57394184d
-
Filesize
540KB
MD54c1a10c50ae4ac19ef0a18d2a83c3881
SHA13ffd8db20182961041cdefff4561f9297c0ad5d6
SHA2567810ba9ad6366813ff7f9270e5599171e58e2702c796953adf3f049e7ddc2e49
SHA5124e97289a43396ea35509938d44bb2a9f4bde40516a9119b943e79ba0d33ea8b17cb3ef9c38757569384980874f02118dcfe5f6ffae0ab923d0f55ac57394184d
-
Filesize
322KB
MD5e6273e2d059ff5c363acbb2adfbd1086
SHA15ea60c04acb16056ac61ec64acbdf7cb3c16d75b
SHA2562529e0e9224491a34b5f79e9a9800a767e8764f676a4c6fc72a7e946d36d38a5
SHA5123e04eb5f93e06a5e88f7421ec3c74c8cdc19101f5b18e6efa7397c9b70dcf60ea182e8b855d4d4c1ed4f51561007a81ae3f22fe9256486093becee48e6ad292a
-
Filesize
322KB
MD5e6273e2d059ff5c363acbb2adfbd1086
SHA15ea60c04acb16056ac61ec64acbdf7cb3c16d75b
SHA2562529e0e9224491a34b5f79e9a9800a767e8764f676a4c6fc72a7e946d36d38a5
SHA5123e04eb5f93e06a5e88f7421ec3c74c8cdc19101f5b18e6efa7397c9b70dcf60ea182e8b855d4d4c1ed4f51561007a81ae3f22fe9256486093becee48e6ad292a
-
Filesize
379KB
MD53b68909db5363400505a311680a07d95
SHA1b335aa0850acec66ab03995f909f8c123f7972b0
SHA2568dec3d507b8843736e77a9b685b0dd8a06a689070347e03fc453ce95c4f54348
SHA51210a4abef9f99ce237f233ccd717370e73cabf29605765ac9e92738bdfd45ff78e1ccacf7835474293ff8e5bfaacb426ba0c8d46ff19eee838bb5b7249359a1b4
-
Filesize
379KB
MD53b68909db5363400505a311680a07d95
SHA1b335aa0850acec66ab03995f909f8c123f7972b0
SHA2568dec3d507b8843736e77a9b685b0dd8a06a689070347e03fc453ce95c4f54348
SHA51210a4abef9f99ce237f233ccd717370e73cabf29605765ac9e92738bdfd45ff78e1ccacf7835474293ff8e5bfaacb426ba0c8d46ff19eee838bb5b7249359a1b4