Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe
Resource
win10v2004-20230220-en
General
-
Target
a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe
-
Size
727KB
-
MD5
088672234b989853ef7a3cfc9932357a
-
SHA1
a9bf4dfdf72300ff9c9d7e5b191a6c339416bcc4
-
SHA256
a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed
-
SHA512
79ede8e9a38b52e665c080b0d9f0ca996f9dcfec3b1fd5e7314a9bae976d9f556ab9111724376bf52a9084be3a68058aeea1203e3387713c94bfff4fc16cf5b9
-
SSDEEP
12288:SMriy90jNt+uQNTaeYpf3bpN1A8MKlUkdBzZThJP4G1RYU4gps9jfd6vHCwdH:EyeNt+X5YdbBA8MKlUoVjXL4gyFFiH5
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8366.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/404-190-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-193-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-195-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-197-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-217-0x0000000004D20000-0x0000000004D30000-memory.dmp family_redline behavioral1/memory/404-218-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-223-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-225-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/404-227-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3248 un302419.exe 1120 pro8366.exe 404 qu0529.exe 3448 si549069.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8366.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un302419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un302419.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 536 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1120 pro8366.exe 1120 pro8366.exe 404 qu0529.exe 404 qu0529.exe 3448 si549069.exe 3448 si549069.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1120 pro8366.exe Token: SeDebugPrivilege 404 qu0529.exe Token: SeDebugPrivilege 3448 si549069.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4076 wrote to memory of 3248 4076 a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe 79 PID 4076 wrote to memory of 3248 4076 a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe 79 PID 4076 wrote to memory of 3248 4076 a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe 79 PID 3248 wrote to memory of 1120 3248 un302419.exe 80 PID 3248 wrote to memory of 1120 3248 un302419.exe 80 PID 3248 wrote to memory of 1120 3248 un302419.exe 80 PID 3248 wrote to memory of 404 3248 un302419.exe 86 PID 3248 wrote to memory of 404 3248 un302419.exe 86 PID 3248 wrote to memory of 404 3248 un302419.exe 86 PID 4076 wrote to memory of 3448 4076 a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe 88 PID 4076 wrote to memory of 3448 4076 a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe 88 PID 4076 wrote to memory of 3448 4076 a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe"C:\Users\Admin\AppData\Local\Temp\a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302419.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0529.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0529.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si549069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si549069.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58c99e8ba20065d7dfe454da1b5a3af7b
SHA1d64901943893fa7adb733c76e7c317994efab839
SHA256d35bf92f5dff6d13e0cc92222b117d17eace42f46dd0988bfed5af06ccb54e78
SHA5121550029ac6871ebd381cf2ec3ac4ca4b32fe552f663eeb943842860eb55f088583692a5002c7bed1fed3abf8dc4e2a3017a30748500fc733faa65b5af63c4936
-
Filesize
175KB
MD58c99e8ba20065d7dfe454da1b5a3af7b
SHA1d64901943893fa7adb733c76e7c317994efab839
SHA256d35bf92f5dff6d13e0cc92222b117d17eace42f46dd0988bfed5af06ccb54e78
SHA5121550029ac6871ebd381cf2ec3ac4ca4b32fe552f663eeb943842860eb55f088583692a5002c7bed1fed3abf8dc4e2a3017a30748500fc733faa65b5af63c4936
-
Filesize
585KB
MD59fe0062bacda7444206e99bf048f478b
SHA11e317e9599514d7c8943427b9a232ab8523b1094
SHA256d3a338a876374944ed90fed20a8551112a13a81978bcb2d58b1f0a60d4687f12
SHA512a0f46ba9161eca988b25bb916592c896480409529b07b51f2bedb05db27847bd41740e1b785d3381b92633e52df9a6d8845bd49ff827ca0ba32abb53988e9a3d
-
Filesize
585KB
MD59fe0062bacda7444206e99bf048f478b
SHA11e317e9599514d7c8943427b9a232ab8523b1094
SHA256d3a338a876374944ed90fed20a8551112a13a81978bcb2d58b1f0a60d4687f12
SHA512a0f46ba9161eca988b25bb916592c896480409529b07b51f2bedb05db27847bd41740e1b785d3381b92633e52df9a6d8845bd49ff827ca0ba32abb53988e9a3d
-
Filesize
322KB
MD5e456b28633b4de3a902a77cb55f7394a
SHA1f71cc74ed6af2048cf1b186b057a7f5ab01fe855
SHA256db6e7ac6f21c5a7334c4acdc07f4631f7aea7dda117342dbe2293c8222c62881
SHA5121c99c53134a68be14e46aacc3237659bf2f8cf4da6b7d541fcba4eb2d7105f49981fdf6617e7aebd8d6e313d87b7b2602e822d76058fda5f3f1a2281898fa439
-
Filesize
322KB
MD5e456b28633b4de3a902a77cb55f7394a
SHA1f71cc74ed6af2048cf1b186b057a7f5ab01fe855
SHA256db6e7ac6f21c5a7334c4acdc07f4631f7aea7dda117342dbe2293c8222c62881
SHA5121c99c53134a68be14e46aacc3237659bf2f8cf4da6b7d541fcba4eb2d7105f49981fdf6617e7aebd8d6e313d87b7b2602e822d76058fda5f3f1a2281898fa439
-
Filesize
359KB
MD523a3fc51acc8eb0b92a83e8dd66fff63
SHA138935f2a2fbdb808377a1580a5a185c82ef466aa
SHA256d8e91d97ea4dd04b972bcef0ef9bb9b108faeed7849df13459a0f4bcb203d6b8
SHA5129e70f34b8ef9641c9e33b2013fdea719076f9e98ce8fb1afd887f7bde7564973539c6ea8f8aed62bb9bc4956ce5f583dbb59f083e046c681e6f0de7e22ccc84a
-
Filesize
359KB
MD523a3fc51acc8eb0b92a83e8dd66fff63
SHA138935f2a2fbdb808377a1580a5a185c82ef466aa
SHA256d8e91d97ea4dd04b972bcef0ef9bb9b108faeed7849df13459a0f4bcb203d6b8
SHA5129e70f34b8ef9641c9e33b2013fdea719076f9e98ce8fb1afd887f7bde7564973539c6ea8f8aed62bb9bc4956ce5f583dbb59f083e046c681e6f0de7e22ccc84a