Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 00:56
Static task
static1
Behavioral task
behavioral1
Sample
1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe
Resource
win10-20230220-en
General
-
Target
1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe
-
Size
682KB
-
MD5
0c052812804829404a96096c86951272
-
SHA1
067236e5d9d93fcd146802fc1a364db714461bf3
-
SHA256
1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784
-
SHA512
871ebf9e570cf17c9ec2cc196d0f37b155df1986742ed3fbb06c7fa7be66447db62342c6f1a610318c0727c00994ee4ef8468706638ac1897ff57478238c3cb7
-
SSDEEP
12288:DMr2y90GMxFlyoLZan6JWQrExk3BNZpp0D0b1qmaCcSip:hyjElHZJTrExeve0b1qmaC1ip
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1607.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3104-179-0x0000000004B70000-0x0000000004BB6000-memory.dmp family_redline behavioral1/memory/3104-180-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/3104-188-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-190-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-186-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-192-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-194-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-184-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-196-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-198-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-200-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-202-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-204-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-206-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-208-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-210-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-212-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-214-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-216-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/3104-218-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2472 un356873.exe 4652 pro1607.exe 3104 qu5854.exe 1216 si515619.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1607.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un356873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un356873.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4652 pro1607.exe 4652 pro1607.exe 3104 qu5854.exe 3104 qu5854.exe 1216 si515619.exe 1216 si515619.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4652 pro1607.exe Token: SeDebugPrivilege 3104 qu5854.exe Token: SeDebugPrivilege 1216 si515619.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3260 wrote to memory of 2472 3260 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe 66 PID 3260 wrote to memory of 2472 3260 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe 66 PID 3260 wrote to memory of 2472 3260 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe 66 PID 2472 wrote to memory of 4652 2472 un356873.exe 67 PID 2472 wrote to memory of 4652 2472 un356873.exe 67 PID 2472 wrote to memory of 4652 2472 un356873.exe 67 PID 2472 wrote to memory of 3104 2472 un356873.exe 68 PID 2472 wrote to memory of 3104 2472 un356873.exe 68 PID 2472 wrote to memory of 3104 2472 un356873.exe 68 PID 3260 wrote to memory of 1216 3260 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe 70 PID 3260 wrote to memory of 1216 3260 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe 70 PID 3260 wrote to memory of 1216 3260 1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe"C:\Users\Admin\AppData\Local\Temp\1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356873.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1607.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5854.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515619.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f1e978e090d03a0d00266079c0c865c9
SHA1ac7f5c841d0781dde3267a2e85298c4177fb32fd
SHA2561a7250d50c5433749fe5df40af2fe071119e4c959072732ca794621db673fc45
SHA512af59c76711716199ac4feb21da19ba055400007f016fd5afb4c732b22ad1bb729f666f77ece3f34ec3c8cf8c0a90268a7ee3704cebbe68e2384f1a68f0e8c76a
-
Filesize
175KB
MD5f1e978e090d03a0d00266079c0c865c9
SHA1ac7f5c841d0781dde3267a2e85298c4177fb32fd
SHA2561a7250d50c5433749fe5df40af2fe071119e4c959072732ca794621db673fc45
SHA512af59c76711716199ac4feb21da19ba055400007f016fd5afb4c732b22ad1bb729f666f77ece3f34ec3c8cf8c0a90268a7ee3704cebbe68e2384f1a68f0e8c76a
-
Filesize
540KB
MD54d21f4f8b7bb5145356a893254e1c12e
SHA1d14d9903dcf0a6ca0f1bd8b3d1fd89c638aeaca0
SHA256a4de8d0112ed9bc343f7c4acb2ae071476aaf12154537487173889aae5d014d3
SHA5124dba01ff76666d15a87e093a8f0ef86bb65ff84bd30fadd4daf0ee47c3691c1a638ac342a86eb9af8c0b1e2322aafe9786d7d88d8bbbb9451fd2c8ed1c2ab56b
-
Filesize
540KB
MD54d21f4f8b7bb5145356a893254e1c12e
SHA1d14d9903dcf0a6ca0f1bd8b3d1fd89c638aeaca0
SHA256a4de8d0112ed9bc343f7c4acb2ae071476aaf12154537487173889aae5d014d3
SHA5124dba01ff76666d15a87e093a8f0ef86bb65ff84bd30fadd4daf0ee47c3691c1a638ac342a86eb9af8c0b1e2322aafe9786d7d88d8bbbb9451fd2c8ed1c2ab56b
-
Filesize
322KB
MD564a713a71160c618cf52daea38cf05cd
SHA16d2b69b032039141537eb19a3e8862106c4bc6b3
SHA256679410f2363c5c52cc941edbcda123cbc3661fe4616c214f455ce71db32df5d7
SHA512cd11106515c1d72b04d4c35cdda724bacd62987e3739de272f8a5ce28f3973b1a2a02a9b61feb9f68bbd30da02363be30c84a6d28b3e0e7eb1eb990690233eee
-
Filesize
322KB
MD564a713a71160c618cf52daea38cf05cd
SHA16d2b69b032039141537eb19a3e8862106c4bc6b3
SHA256679410f2363c5c52cc941edbcda123cbc3661fe4616c214f455ce71db32df5d7
SHA512cd11106515c1d72b04d4c35cdda724bacd62987e3739de272f8a5ce28f3973b1a2a02a9b61feb9f68bbd30da02363be30c84a6d28b3e0e7eb1eb990690233eee
-
Filesize
379KB
MD5a82c0a3d5980a9dc439ee5dd032f72d1
SHA153d26901a1a5d557e64bea55c44137b2b436af47
SHA256e481b592640b9811df5c51debd260ed8b826edc160e7efd8653562353e15abdb
SHA512d46197e3af93b062fe49d397abfb9e265296db49789ce66aba3129a0b1a8c8676a4f7079c6f41169a9e8b89edf800d1a770b9d666c14bd524358aec16db4443f
-
Filesize
379KB
MD5a82c0a3d5980a9dc439ee5dd032f72d1
SHA153d26901a1a5d557e64bea55c44137b2b436af47
SHA256e481b592640b9811df5c51debd260ed8b826edc160e7efd8653562353e15abdb
SHA512d46197e3af93b062fe49d397abfb9e265296db49789ce66aba3129a0b1a8c8676a4f7079c6f41169a9e8b89edf800d1a770b9d666c14bd524358aec16db4443f