Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe
Resource
win10v2004-20230221-en
General
-
Target
d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe
-
Size
682KB
-
MD5
91a422c7bb93cb77534b50868e268bf9
-
SHA1
264cedd2ab98e820ca3650e0499e60d9bdd754e3
-
SHA256
d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666
-
SHA512
7d60c84d67247550814e3751eee8cbafc762c2276243e1df6f07f14b98a42845f6672c1ce2967e1ba69513f89cff57869743c0abd38c07ecbc7948d414b462ce
-
SSDEEP
12288:QMr5y90ONEsT4W8ZZhS2ceJ5CTrcb8kZBtpIdExsqi70z:5yTEsTXYhSJsb8AjIdExsqi7q
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9263.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9263.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/552-191-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-192-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-194-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-196-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-198-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-200-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-202-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-204-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-206-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-208-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-210-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-212-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-215-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-219-0x0000000004A00000-0x0000000004A10000-memory.dmp family_redline behavioral1/memory/552-218-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-222-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-224-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-226-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/552-228-0x0000000007720000-0x000000000775E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1948 un130036.exe 5008 pro9263.exe 552 qu1546.exe 2356 si405334.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9263.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un130036.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un130036.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5008 pro9263.exe 5008 pro9263.exe 552 qu1546.exe 552 qu1546.exe 2356 si405334.exe 2356 si405334.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5008 pro9263.exe Token: SeDebugPrivilege 552 qu1546.exe Token: SeDebugPrivilege 2356 si405334.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 868 wrote to memory of 1948 868 d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe 81 PID 868 wrote to memory of 1948 868 d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe 81 PID 868 wrote to memory of 1948 868 d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe 81 PID 1948 wrote to memory of 5008 1948 un130036.exe 82 PID 1948 wrote to memory of 5008 1948 un130036.exe 82 PID 1948 wrote to memory of 5008 1948 un130036.exe 82 PID 1948 wrote to memory of 552 1948 un130036.exe 86 PID 1948 wrote to memory of 552 1948 un130036.exe 86 PID 1948 wrote to memory of 552 1948 un130036.exe 86 PID 868 wrote to memory of 2356 868 d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe 88 PID 868 wrote to memory of 2356 868 d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe 88 PID 868 wrote to memory of 2356 868 d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe"C:\Users\Admin\AppData\Local\Temp\d4ae407a457af0c88771867037c85b67415896774db4f88f0ba7886e369b1666.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130036.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130036.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9263.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9263.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si405334.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si405334.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50d750830be75fcc340b37504c7f2d06a
SHA110676ff2382ef7c91739cfa1237fe3709f12b824
SHA256e53743c27d474a2c60717a86458af0ed465115bb57228cd46860edceda7529cb
SHA512f828c63ab3b06750eed486883b5151d9473db92cab575d7ad7469a9972992804be5f62a34c787a621e6406bc2d281d54fc0826d8d5569ecb47e7329a847f69a2
-
Filesize
175KB
MD50d750830be75fcc340b37504c7f2d06a
SHA110676ff2382ef7c91739cfa1237fe3709f12b824
SHA256e53743c27d474a2c60717a86458af0ed465115bb57228cd46860edceda7529cb
SHA512f828c63ab3b06750eed486883b5151d9473db92cab575d7ad7469a9972992804be5f62a34c787a621e6406bc2d281d54fc0826d8d5569ecb47e7329a847f69a2
-
Filesize
540KB
MD5b86d6760f7814a2f4a3b25a94a859348
SHA1d971a367426b554c577a8644941a92e67deecb1f
SHA256efbc8daaa8b261b2e0b739f3d6e4dc50de68673658aa11855b17bce5cfba9694
SHA5123f675b6ee5dfa39bf844ba404316400b984d7f4dcebebd4451c22b979b5de72094bdd9fa3400b2db67c00841a1c748cfdd49f7c1bdd24a0c38ef86ad3d235dc5
-
Filesize
540KB
MD5b86d6760f7814a2f4a3b25a94a859348
SHA1d971a367426b554c577a8644941a92e67deecb1f
SHA256efbc8daaa8b261b2e0b739f3d6e4dc50de68673658aa11855b17bce5cfba9694
SHA5123f675b6ee5dfa39bf844ba404316400b984d7f4dcebebd4451c22b979b5de72094bdd9fa3400b2db67c00841a1c748cfdd49f7c1bdd24a0c38ef86ad3d235dc5
-
Filesize
322KB
MD5266d6f4f526da9547ba115a560f379fc
SHA1b87818fdcc35c82e7162aa732fc47f11667ad4d2
SHA256b30586d6c121f2da09b0248a972d04d3a226eeb12f514de313bde5e80265ea2c
SHA5125016a66940deb79ed42be6251faec66a0aebef58d189241ddbd57ab21054d2162bf3a955d41ce5f9f8befc3c1bf24e7ea4094cc21ff8fcb71ee395e92a729a67
-
Filesize
322KB
MD5266d6f4f526da9547ba115a560f379fc
SHA1b87818fdcc35c82e7162aa732fc47f11667ad4d2
SHA256b30586d6c121f2da09b0248a972d04d3a226eeb12f514de313bde5e80265ea2c
SHA5125016a66940deb79ed42be6251faec66a0aebef58d189241ddbd57ab21054d2162bf3a955d41ce5f9f8befc3c1bf24e7ea4094cc21ff8fcb71ee395e92a729a67
-
Filesize
379KB
MD5cdb82ed296c311eaa77068b4451886e6
SHA18afc2adf486758d7b2f902ad45e6825a56051d27
SHA256b1c23c2edba80b17caa067967541ae62ef05c041415b808ec34143f532b37af0
SHA512c07a8d5de3d55e56563693fd32a0fbb916ab9f062fb2891941adfaa873fc20422311bd5483cd25d3c74d3bbb44dbbd720e6397b9d874f4ac25615bd66fcda795
-
Filesize
379KB
MD5cdb82ed296c311eaa77068b4451886e6
SHA18afc2adf486758d7b2f902ad45e6825a56051d27
SHA256b1c23c2edba80b17caa067967541ae62ef05c041415b808ec34143f532b37af0
SHA512c07a8d5de3d55e56563693fd32a0fbb916ab9f062fb2891941adfaa873fc20422311bd5483cd25d3c74d3bbb44dbbd720e6397b9d874f4ac25615bd66fcda795