Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
cbd84c741e7ca361645c1542ea5c7131.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cbd84c741e7ca361645c1542ea5c7131.exe
Resource
win10v2004-20230221-en
General
-
Target
cbd84c741e7ca361645c1542ea5c7131.exe
-
Size
660KB
-
MD5
cbd84c741e7ca361645c1542ea5c7131
-
SHA1
d8c2438061d125824b228f68bd3406c8317b321a
-
SHA256
f5b3c296484c5e8aaf165b36f62f5bca75acd3c452603fb262ff334c8a65d390
-
SHA512
b663131a45fe12f7e196732b88f601a96eb393112ea50768a7edd7905758f14650eeade6a843d03a7909043d757503ce9600b5ddcfcfb886b7f55b6b9a34d19c
-
SSDEEP
12288:TZJAbAI7qpMP9chlQDrgyhSuEu3OXN/BPoqtEypPxUwyZkDiRpj6pz:tcADS9cHQPDhkzdhoqWypeZkap4
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr861184.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr861184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr861184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr861184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr861184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr861184.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/4512-157-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-158-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-160-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-162-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-167-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-170-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-172-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-174-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-176-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-178-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-180-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-182-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-184-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-186-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-188-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-190-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral2/memory/4512-1077-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4880 ziKx1693.exe 2184 jr861184.exe 4512 ku852284.exe 1604 lr048190.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr861184.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cbd84c741e7ca361645c1542ea5c7131.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbd84c741e7ca361645c1542ea5c7131.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziKx1693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKx1693.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3708 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4676 2672 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2184 jr861184.exe 2184 jr861184.exe 4512 ku852284.exe 4512 ku852284.exe 1604 lr048190.exe 1604 lr048190.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2184 jr861184.exe Token: SeDebugPrivilege 4512 ku852284.exe Token: SeDebugPrivilege 1604 lr048190.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4880 2672 cbd84c741e7ca361645c1542ea5c7131.exe 84 PID 2672 wrote to memory of 4880 2672 cbd84c741e7ca361645c1542ea5c7131.exe 84 PID 2672 wrote to memory of 4880 2672 cbd84c741e7ca361645c1542ea5c7131.exe 84 PID 4880 wrote to memory of 2184 4880 ziKx1693.exe 85 PID 4880 wrote to memory of 2184 4880 ziKx1693.exe 85 PID 4880 wrote to memory of 4512 4880 ziKx1693.exe 89 PID 4880 wrote to memory of 4512 4880 ziKx1693.exe 89 PID 4880 wrote to memory of 4512 4880 ziKx1693.exe 89 PID 2672 wrote to memory of 1604 2672 cbd84c741e7ca361645c1542ea5c7131.exe 90 PID 2672 wrote to memory of 1604 2672 cbd84c741e7ca361645c1542ea5c7131.exe 90 PID 2672 wrote to memory of 1604 2672 cbd84c741e7ca361645c1542ea5c7131.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd84c741e7ca361645c1542ea5c7131.exe"C:\Users\Admin\AppData\Local\Temp\cbd84c741e7ca361645c1542ea5c7131.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKx1693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKx1693.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr861184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr861184.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852284.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852284.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr048190.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr048190.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 4842⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2672 -ip 26721⤵PID:4964
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD519219b1cea9d3d7274683958a3379c04
SHA13473053331987aa7fe076d18f105d1e5fb331e1e
SHA25636755a2c11e51b0b5f34b6457cb548edae6cc83df489d4d676f6fe2bb87e2db6
SHA5121d5bbf61e0ce25c9708b347e95070a74c743a2008f6ee346173f21de96f3088192c1bf2d8d46ab53154d2fffb1b6c339aaaff76bb9b7531868f386d2c659ad51
-
Filesize
175KB
MD519219b1cea9d3d7274683958a3379c04
SHA13473053331987aa7fe076d18f105d1e5fb331e1e
SHA25636755a2c11e51b0b5f34b6457cb548edae6cc83df489d4d676f6fe2bb87e2db6
SHA5121d5bbf61e0ce25c9708b347e95070a74c743a2008f6ee346173f21de96f3088192c1bf2d8d46ab53154d2fffb1b6c339aaaff76bb9b7531868f386d2c659ad51
-
Filesize
404KB
MD5cda4eef5211c3f6e9b77d1b75f91c7fc
SHA178c16cdfbd0ecc679a8c9225907a6005f4de9f66
SHA256c9f275a02b1a1e430084e8749c62abd21892993cfde38e6e919a8b9628f5dede
SHA51219053673a23d1b65286e89d61894748dd863e0795070d0c7f2dd98e0e9bfdf41173ac6168132456b56ce6804498f6b991ef47d57996354c745513bf5c2bcc281
-
Filesize
404KB
MD5cda4eef5211c3f6e9b77d1b75f91c7fc
SHA178c16cdfbd0ecc679a8c9225907a6005f4de9f66
SHA256c9f275a02b1a1e430084e8749c62abd21892993cfde38e6e919a8b9628f5dede
SHA51219053673a23d1b65286e89d61894748dd863e0795070d0c7f2dd98e0e9bfdf41173ac6168132456b56ce6804498f6b991ef47d57996354c745513bf5c2bcc281
-
Filesize
12KB
MD52a1d4e8fa8635d36c5e1fd28c9be9763
SHA10dd0de78735b4590a81620a44c5840e5056e06d7
SHA256a9a15f1329ab6dffd504712262bc3052ad0f80998d0fe0439aee79f5fbb54468
SHA512ed8634d6c4c7bf32d2281e2a14912c436a5d4772a4029289c5608bcb2eb6fdefe6a0a06495d3e04dc1652b0d75a7bb4e49a22455e17c5e59087b1a370f5423e9
-
Filesize
12KB
MD52a1d4e8fa8635d36c5e1fd28c9be9763
SHA10dd0de78735b4590a81620a44c5840e5056e06d7
SHA256a9a15f1329ab6dffd504712262bc3052ad0f80998d0fe0439aee79f5fbb54468
SHA512ed8634d6c4c7bf32d2281e2a14912c436a5d4772a4029289c5608bcb2eb6fdefe6a0a06495d3e04dc1652b0d75a7bb4e49a22455e17c5e59087b1a370f5423e9
-
Filesize
359KB
MD54287ef62aa410ba04d46f47a369e1864
SHA163e60a51f2546dc81e0b11863fa1a694ae7033a5
SHA2562b35c97f6a24eba0f65413ed19b88c9db1cfb56fa136e29346cf14bb8a49f605
SHA5123edf39a2c2a251ffc5a244a13691da7ec66f46e39bd78838531942f76f9d4420daa44e54468ee9d9a8ee9d8ed96081fc116670e0d9089ff9380eb53c5f954a86
-
Filesize
359KB
MD54287ef62aa410ba04d46f47a369e1864
SHA163e60a51f2546dc81e0b11863fa1a694ae7033a5
SHA2562b35c97f6a24eba0f65413ed19b88c9db1cfb56fa136e29346cf14bb8a49f605
SHA5123edf39a2c2a251ffc5a244a13691da7ec66f46e39bd78838531942f76f9d4420daa44e54468ee9d9a8ee9d8ed96081fc116670e0d9089ff9380eb53c5f954a86