Analysis
-
max time kernel
105s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe
Resource
win10v2004-20230220-en
General
-
Target
9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe
-
Size
685KB
-
MD5
4aed380323be39efa99cf0031a23ee8f
-
SHA1
382e85ab3d1cc20029b3a9c83ce6a411141b3588
-
SHA256
9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3
-
SHA512
d638229563809109ad789f33e6c233de3640b3d6c08c5c33b6c2b02040c3418a66eca301e484523c5e4001e094f6d5f25af64d3bac7208e92926580a3db58b43
-
SSDEEP
12288:/Mrhy90sS/qD7X6TprZxtkOXrX4eXHhXE435qAebCld+lnMt:6yNEZE8rDXNEMqnSdl
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5028.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5028.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4104-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-210-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-214-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-218-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-220-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-222-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-224-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4104-336-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1364 un442313.exe 4060 pro5028.exe 4104 qu8924.exe 3300 si300859.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5028.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un442313.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un442313.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4060 pro5028.exe 4060 pro5028.exe 4104 qu8924.exe 4104 qu8924.exe 3300 si300859.exe 3300 si300859.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4060 pro5028.exe Token: SeDebugPrivilege 4104 qu8924.exe Token: SeDebugPrivilege 3300 si300859.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1364 1244 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe 86 PID 1244 wrote to memory of 1364 1244 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe 86 PID 1244 wrote to memory of 1364 1244 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe 86 PID 1364 wrote to memory of 4060 1364 un442313.exe 87 PID 1364 wrote to memory of 4060 1364 un442313.exe 87 PID 1364 wrote to memory of 4060 1364 un442313.exe 87 PID 1364 wrote to memory of 4104 1364 un442313.exe 93 PID 1364 wrote to memory of 4104 1364 un442313.exe 93 PID 1364 wrote to memory of 4104 1364 un442313.exe 93 PID 1244 wrote to memory of 3300 1244 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe 94 PID 1244 wrote to memory of 3300 1244 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe 94 PID 1244 wrote to memory of 3300 1244 9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe"C:\Users\Admin\AppData\Local\Temp\9286a51986f01ddc51ae9a22faf44fd9cae9ac51729128eebaf6bc88aa61b9d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un442313.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un442313.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5028.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8924.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si300859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si300859.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD551ce9ee19e4e4423084b3a96b6bf84ed
SHA18f2de3f147e3f35e9d9e8ce9f48333f2e2e15255
SHA256635f58ace49ab5963e58bd88300a208c118304ac42beb2c061bb2cab5b045d03
SHA512da430eb3f960348a9d5f142cc464818d726eed9fb2125574ec77e8829d46a021cc460b9eaeabc2211bb3e0f5e0beba481e2be76587a20c76a5c1f09e729a5e1b
-
Filesize
175KB
MD551ce9ee19e4e4423084b3a96b6bf84ed
SHA18f2de3f147e3f35e9d9e8ce9f48333f2e2e15255
SHA256635f58ace49ab5963e58bd88300a208c118304ac42beb2c061bb2cab5b045d03
SHA512da430eb3f960348a9d5f142cc464818d726eed9fb2125574ec77e8829d46a021cc460b9eaeabc2211bb3e0f5e0beba481e2be76587a20c76a5c1f09e729a5e1b
-
Filesize
544KB
MD59036e34b5c55b8f10387a1b66d3832a2
SHA1aaeb27d2aa96b855261710a4634630c6d5d27ecd
SHA25608f940e67a0b88cc98afa35319b90089f7b28f643211a24d860d13f250d7370d
SHA51225999eb4aca431b9ff8e6518fd1b39c9e096c76fd9259018cf7c062913a4204f8f4b9b1b39181b9c3a87f8567cf6d80430d23b5f7323c97037e13e542e02aa3b
-
Filesize
544KB
MD59036e34b5c55b8f10387a1b66d3832a2
SHA1aaeb27d2aa96b855261710a4634630c6d5d27ecd
SHA25608f940e67a0b88cc98afa35319b90089f7b28f643211a24d860d13f250d7370d
SHA51225999eb4aca431b9ff8e6518fd1b39c9e096c76fd9259018cf7c062913a4204f8f4b9b1b39181b9c3a87f8567cf6d80430d23b5f7323c97037e13e542e02aa3b
-
Filesize
300KB
MD52b3d34e6e2ed758e5dddbadf0fb7f179
SHA124697e392b81e1af84dfaaa1da2a870dce2f3eb2
SHA256c98344d2802ea100279c5e49ea7d98f9292543536c6e5154be6a8a541fbcd719
SHA512cea577fe9a23d9e6aad45605b2d07ce5467b7cc36257876cbae2984ef99434df92a4fb926f37d92c20f117a1a0fdd5f8dc44b2c07987746644d00fec02d524eb
-
Filesize
300KB
MD52b3d34e6e2ed758e5dddbadf0fb7f179
SHA124697e392b81e1af84dfaaa1da2a870dce2f3eb2
SHA256c98344d2802ea100279c5e49ea7d98f9292543536c6e5154be6a8a541fbcd719
SHA512cea577fe9a23d9e6aad45605b2d07ce5467b7cc36257876cbae2984ef99434df92a4fb926f37d92c20f117a1a0fdd5f8dc44b2c07987746644d00fec02d524eb
-
Filesize
359KB
MD5e56795b91375f868e5223a6e841008f5
SHA1e777495f92409dfe90ae7732a24a87e4b3fc5c7f
SHA2565f2df13b743a7c843d8aec052eedaa848912cb14259f229aae841208c15723a6
SHA512f73d16690f66b5da16680196deb9ffda804ae4c925c3b20e90d8e273627e87ff52e18f3c609edd02d075565fe94dcaa59984309d2899f6f407243a667d19e4df
-
Filesize
359KB
MD5e56795b91375f868e5223a6e841008f5
SHA1e777495f92409dfe90ae7732a24a87e4b3fc5c7f
SHA2565f2df13b743a7c843d8aec052eedaa848912cb14259f229aae841208c15723a6
SHA512f73d16690f66b5da16680196deb9ffda804ae4c925c3b20e90d8e273627e87ff52e18f3c609edd02d075565fe94dcaa59984309d2899f6f407243a667d19e4df