Analysis
-
max time kernel
130s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe
Resource
win10v2004-20230220-en
General
-
Target
f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe
-
Size
686KB
-
MD5
03feebe09c9e3c67c4614c181b9c8222
-
SHA1
6b17f62455b80ed3690f93a0b198952893a3a0b6
-
SHA256
f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660
-
SHA512
ba3d5654a23c0b131fa88d8a3dd0b934aee80ff2d1e3c943ea2b33fc462438f6652bd21f67bd0cfec9c8b7625a5d9c3e30e349f0c322a079ed30f50a53c8b8dc
-
SSDEEP
12288:4Mrfy909K/DHdgpI1Ha4RZSPJ2jmVzv0gWKHh2643xNARbO+X:HynrdPBRZSPJgmFv0gWeA688pX
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6796.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6796.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4428-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4428-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1860 un479441.exe 5108 pro6796.exe 4428 qu6453.exe 4576 si899502.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6796.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un479441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un479441.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3908 sc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5108 pro6796.exe 5108 pro6796.exe 4428 qu6453.exe 4428 qu6453.exe 4576 si899502.exe 4576 si899502.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5108 pro6796.exe Token: SeDebugPrivilege 4428 qu6453.exe Token: SeDebugPrivilege 4576 si899502.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1860 1608 f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe 83 PID 1608 wrote to memory of 1860 1608 f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe 83 PID 1608 wrote to memory of 1860 1608 f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe 83 PID 1860 wrote to memory of 5108 1860 un479441.exe 84 PID 1860 wrote to memory of 5108 1860 un479441.exe 84 PID 1860 wrote to memory of 5108 1860 un479441.exe 84 PID 1860 wrote to memory of 4428 1860 un479441.exe 88 PID 1860 wrote to memory of 4428 1860 un479441.exe 88 PID 1860 wrote to memory of 4428 1860 un479441.exe 88 PID 1608 wrote to memory of 4576 1608 f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe 89 PID 1608 wrote to memory of 4576 1608 f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe 89 PID 1608 wrote to memory of 4576 1608 f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe"C:\Users\Admin\AppData\Local\Temp\f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479441.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6796.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6453.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899502.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57b114d23d2071753dd2fd9fb33afe7e1
SHA12d05622d7a804fce1bbd1054bc3e7fc9ffcb0f99
SHA25648628bf9ee8b5e93a0b1539f23e2608576adddef97e5b2cedc85d2d0121319ec
SHA512f9d37999397fd975da3ef023921cfd58490970bdef10708da56fdad4db4e9b6e7eb0bc42e3aa231340a65b22731b2aa09bd0b7314d2e38b2b515be2f1a54a050
-
Filesize
175KB
MD57b114d23d2071753dd2fd9fb33afe7e1
SHA12d05622d7a804fce1bbd1054bc3e7fc9ffcb0f99
SHA25648628bf9ee8b5e93a0b1539f23e2608576adddef97e5b2cedc85d2d0121319ec
SHA512f9d37999397fd975da3ef023921cfd58490970bdef10708da56fdad4db4e9b6e7eb0bc42e3aa231340a65b22731b2aa09bd0b7314d2e38b2b515be2f1a54a050
-
Filesize
544KB
MD5e5d8ff8c89f1e76cca707b9a9b71f60d
SHA1b5d38915560a9e3f265a5d15b9cf0bc02f48f757
SHA2565ea90000a1fd3afe182638b4fc70d5fe67117a18c96343cf2a4c90d2983944f8
SHA5127bfcdae06159afb127e66dacad706ef54f410e290ffb2d521c1170740e9d7a9ee308949836799b7d765e1292aabcc800438b3f0f4f780083f7215abe3f674380
-
Filesize
544KB
MD5e5d8ff8c89f1e76cca707b9a9b71f60d
SHA1b5d38915560a9e3f265a5d15b9cf0bc02f48f757
SHA2565ea90000a1fd3afe182638b4fc70d5fe67117a18c96343cf2a4c90d2983944f8
SHA5127bfcdae06159afb127e66dacad706ef54f410e290ffb2d521c1170740e9d7a9ee308949836799b7d765e1292aabcc800438b3f0f4f780083f7215abe3f674380
-
Filesize
300KB
MD50fd1cc0a6cfa36a878e3c5a9f41b76a1
SHA1ac0ed5d89c9ffc50a06cc6ab027e7a2fe3f57126
SHA256404369f5f067ce409144d6d2ca787860439343371a0f4478c461a7e930446b54
SHA5125221471e7d4e39c4df91774f8499079b4f268568ba87706ac675f01df5b44deaf83400eddaa5bfd23666d4173d7fe7be3d0fd3ca9048354c48a584106ea50fb8
-
Filesize
300KB
MD50fd1cc0a6cfa36a878e3c5a9f41b76a1
SHA1ac0ed5d89c9ffc50a06cc6ab027e7a2fe3f57126
SHA256404369f5f067ce409144d6d2ca787860439343371a0f4478c461a7e930446b54
SHA5125221471e7d4e39c4df91774f8499079b4f268568ba87706ac675f01df5b44deaf83400eddaa5bfd23666d4173d7fe7be3d0fd3ca9048354c48a584106ea50fb8
-
Filesize
359KB
MD5c4e47e3740dde85cc04f567b4105b136
SHA160e924a92af8cf99cc7088f200629d1318b09747
SHA25697a7b8ccebb9c041fa829f0d0ec2074af976d83511f7f79e5a8241acc0010fa2
SHA512ed7b0f4bf7d7b6b96862939c0fcb5d3fc7dbe9e507a6b05493981529a2429229f9f8a10a064af8f1512e5bfe77199c8f1151994ff17b81f899ebe322e5aa370d
-
Filesize
359KB
MD5c4e47e3740dde85cc04f567b4105b136
SHA160e924a92af8cf99cc7088f200629d1318b09747
SHA25697a7b8ccebb9c041fa829f0d0ec2074af976d83511f7f79e5a8241acc0010fa2
SHA512ed7b0f4bf7d7b6b96862939c0fcb5d3fc7dbe9e507a6b05493981529a2429229f9f8a10a064af8f1512e5bfe77199c8f1151994ff17b81f899ebe322e5aa370d