Analysis
-
max time kernel
53s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe
Resource
win10-20230220-en
General
-
Target
572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe
-
Size
685KB
-
MD5
0f033874839920b9926df9279dc9b127
-
SHA1
c41557973e921e3ad41499ab60d4d1d0e5e13c08
-
SHA256
572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b
-
SHA512
855b599d6e078c3f1a80d347e7785064a6ec6c833221c548cd76bc5476456cf5cbb672e2ce96e2e8c98ba9391baa039a84c5287b6e8400922705f347a3d2caca
-
SSDEEP
12288:zMr7y90GFPxEriPnAAdRT68Hd3ZmDLf45kN1oXUrE1Uclw8AkYwsj7/:Ay9tBPRT6MRZmDlN1fcUffkK
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3235.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3612-180-0x0000000004980000-0x00000000049C6000-memory.dmp family_redline behavioral1/memory/3612-181-0x0000000004A20000-0x0000000004A64000-memory.dmp family_redline behavioral1/memory/3612-182-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-183-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-185-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-189-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-191-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-187-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-193-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-195-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-197-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-199-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-203-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-207-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-209-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-211-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-213-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-215-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-217-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline behavioral1/memory/3612-219-0x0000000004A20000-0x0000000004A5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2332 un167325.exe 2548 pro3235.exe 3612 qu1884.exe 4864 si056230.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3235.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3235.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un167325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un167325.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2548 pro3235.exe 2548 pro3235.exe 3612 qu1884.exe 3612 qu1884.exe 4864 si056230.exe 4864 si056230.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2548 pro3235.exe Token: SeDebugPrivilege 3612 qu1884.exe Token: SeDebugPrivilege 4864 si056230.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2332 2088 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe 66 PID 2088 wrote to memory of 2332 2088 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe 66 PID 2088 wrote to memory of 2332 2088 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe 66 PID 2332 wrote to memory of 2548 2332 un167325.exe 67 PID 2332 wrote to memory of 2548 2332 un167325.exe 67 PID 2332 wrote to memory of 2548 2332 un167325.exe 67 PID 2332 wrote to memory of 3612 2332 un167325.exe 68 PID 2332 wrote to memory of 3612 2332 un167325.exe 68 PID 2332 wrote to memory of 3612 2332 un167325.exe 68 PID 2088 wrote to memory of 4864 2088 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe 70 PID 2088 wrote to memory of 4864 2088 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe 70 PID 2088 wrote to memory of 4864 2088 572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe"C:\Users\Admin\AppData\Local\Temp\572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un167325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un167325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3235.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1884.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056230.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056230.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58d25d0d01c0978e9fcec18b523044619
SHA18fe9fbd6ef3085f43c5ea0ce8b9ad8712848e094
SHA256ffddabed94b5a17eff21d9450e34e141994ac9db27bc2c1531f01ae88bb22d6c
SHA51251ef4b626d2f4ddce9ffe2585e3afd53fa50bf2f7a3173a638da56ec292f04a6a7122440fffdc57e851a9175ea5a4320eab91073f71497900e9552e1e25e62e5
-
Filesize
175KB
MD58d25d0d01c0978e9fcec18b523044619
SHA18fe9fbd6ef3085f43c5ea0ce8b9ad8712848e094
SHA256ffddabed94b5a17eff21d9450e34e141994ac9db27bc2c1531f01ae88bb22d6c
SHA51251ef4b626d2f4ddce9ffe2585e3afd53fa50bf2f7a3173a638da56ec292f04a6a7122440fffdc57e851a9175ea5a4320eab91073f71497900e9552e1e25e62e5
-
Filesize
544KB
MD5243fdf7536b48ec81671f913e8d92677
SHA12426421ab0a0bd3e6c21d31e3091a13cb36c92da
SHA256921e5ae1596a1175b6bb05c9fdb650712814d5c8841b0d8c522af74bb9c46888
SHA512903c2c890fc115f1077e1681f2d4f2219bf01913022c2995a33b3e78d2d02a973f5b51150785a7ad5421fff908b1d92157fe034ce73d1e00477ad3c68e87d9d6
-
Filesize
544KB
MD5243fdf7536b48ec81671f913e8d92677
SHA12426421ab0a0bd3e6c21d31e3091a13cb36c92da
SHA256921e5ae1596a1175b6bb05c9fdb650712814d5c8841b0d8c522af74bb9c46888
SHA512903c2c890fc115f1077e1681f2d4f2219bf01913022c2995a33b3e78d2d02a973f5b51150785a7ad5421fff908b1d92157fe034ce73d1e00477ad3c68e87d9d6
-
Filesize
322KB
MD5d470f04e688a84b4d50d6249dca1fb23
SHA1d85aeea12ad8527d3e121525e41d2a533b99dee2
SHA256775171afc44a5ee722a1f6aab3fd7124f46ce9920b9227b269d0f9035d5b5d39
SHA512eeb41287a39c8f1163fc5d7aedb7a0c4349995fa76f13ad23c680afa0b5909111f86ce2cda8bb5ff5afa58f9cdf87712f82df099624bcc15f2b08d6acce21ddb
-
Filesize
322KB
MD5d470f04e688a84b4d50d6249dca1fb23
SHA1d85aeea12ad8527d3e121525e41d2a533b99dee2
SHA256775171afc44a5ee722a1f6aab3fd7124f46ce9920b9227b269d0f9035d5b5d39
SHA512eeb41287a39c8f1163fc5d7aedb7a0c4349995fa76f13ad23c680afa0b5909111f86ce2cda8bb5ff5afa58f9cdf87712f82df099624bcc15f2b08d6acce21ddb
-
Filesize
379KB
MD5a35c6b8b25fa2f45664fa08a27aa27b3
SHA1b7c292ea4ac1166e0a2a759d6a894ab3c9ec3703
SHA256526841afeee9be80830c98d6cb66bb6f02bc5bfa63fa83618161378f21a465ae
SHA512aef79634a949b3ce0fe808f917480366e8bf16c2699b8029ca0aa058d6f5c3f27c218445d0cad03379149cad05ddd38510b0620fe68c179f04b7cd332de5efdf
-
Filesize
379KB
MD5a35c6b8b25fa2f45664fa08a27aa27b3
SHA1b7c292ea4ac1166e0a2a759d6a894ab3c9ec3703
SHA256526841afeee9be80830c98d6cb66bb6f02bc5bfa63fa83618161378f21a465ae
SHA512aef79634a949b3ce0fe808f917480366e8bf16c2699b8029ca0aa058d6f5c3f27c218445d0cad03379149cad05ddd38510b0620fe68c179f04b7cd332de5efdf