Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 10:56
Static task
static1
Behavioral task
behavioral1
Sample
0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe
Resource
win10v2004-20230220-en
General
-
Target
0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe
-
Size
687KB
-
MD5
a8a01653256c9fe828c01d656078bed5
-
SHA1
c4ebd66b5773a53d6cf11c3e05b93d80e6c612a9
-
SHA256
0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57
-
SHA512
109c77ee4d123cb24f26a0632f2832948f929d36db702cf20dd0de7da1c22dbfd830c50e0dc1f5e7e9368b12b74f3c4bd4bc6b66716193141dba444ec4e0f623
-
SSDEEP
12288:0Mray90FxdoXpDuSnJlEAVE9mA2j165RS/nFKmZ4/XYx/YiR:myq+XpDLnTBAM16XSTa/Yx/YiR
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3546.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1752-190-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-191-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-193-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-197-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-200-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-203-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-205-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-207-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-209-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-211-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-213-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-215-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-217-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-219-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-221-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-223-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-225-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/1752-227-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4268 un836844.exe 456 pro3546.exe 1752 qu3384.exe 4940 si020121.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3546.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3546.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un836844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un836844.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3316 456 WerFault.exe 86 4936 1752 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 456 pro3546.exe 456 pro3546.exe 1752 qu3384.exe 1752 qu3384.exe 4940 si020121.exe 4940 si020121.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 456 pro3546.exe Token: SeDebugPrivilege 1752 qu3384.exe Token: SeDebugPrivilege 4940 si020121.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4268 3944 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe 85 PID 3944 wrote to memory of 4268 3944 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe 85 PID 3944 wrote to memory of 4268 3944 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe 85 PID 4268 wrote to memory of 456 4268 un836844.exe 86 PID 4268 wrote to memory of 456 4268 un836844.exe 86 PID 4268 wrote to memory of 456 4268 un836844.exe 86 PID 4268 wrote to memory of 1752 4268 un836844.exe 92 PID 4268 wrote to memory of 1752 4268 un836844.exe 92 PID 4268 wrote to memory of 1752 4268 un836844.exe 92 PID 3944 wrote to memory of 4940 3944 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe 96 PID 3944 wrote to memory of 4940 3944 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe 96 PID 3944 wrote to memory of 4940 3944 0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe"C:\Users\Admin\AppData\Local\Temp\0dd4fbd2815eafb47349f5e035a10c7fa191c711eedd1255193d834dbcee5e57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un836844.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un836844.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3546.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 10844⤵
- Program crash
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3384.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3384.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 18924⤵
- Program crash
PID:4936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020121.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020121.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 456 -ip 4561⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1752 -ip 17521⤵PID:1244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b3ab3edd9ebe89e3246d31f0db1ce0e3
SHA12c19ca27a413da7c12c0597bf95399a25553d4a3
SHA256dd82ba015b59d3cda2fddac6f33edff1a40d0f8809c0353942d9a15a09900d0b
SHA5122b89061a758e4bf3bdc2b35f00c0d07177c91b2215b90408defc252828f3dddc1c2125684ccd616f883a0f3f54ee018766a2226b994b9a4443e0f41ae62034de
-
Filesize
175KB
MD5b3ab3edd9ebe89e3246d31f0db1ce0e3
SHA12c19ca27a413da7c12c0597bf95399a25553d4a3
SHA256dd82ba015b59d3cda2fddac6f33edff1a40d0f8809c0353942d9a15a09900d0b
SHA5122b89061a758e4bf3bdc2b35f00c0d07177c91b2215b90408defc252828f3dddc1c2125684ccd616f883a0f3f54ee018766a2226b994b9a4443e0f41ae62034de
-
Filesize
545KB
MD51d713b3927a86eb3243156bd931065e7
SHA1f79c87ae8a876e7313123780e3b415e4d7066b43
SHA2569fa700dbd5f40fed78fdc1ca1dae6aaa19deab9f4ec71ede2ebda22356e760ae
SHA512df8c6d017389fa65e8359e2241f101bb72aa11ab6eb08ff91419309503c1081e5eb679868100e72de7a097d8df13aff5eca3cddb339d0196addaeb8b980ad6bf
-
Filesize
545KB
MD51d713b3927a86eb3243156bd931065e7
SHA1f79c87ae8a876e7313123780e3b415e4d7066b43
SHA2569fa700dbd5f40fed78fdc1ca1dae6aaa19deab9f4ec71ede2ebda22356e760ae
SHA512df8c6d017389fa65e8359e2241f101bb72aa11ab6eb08ff91419309503c1081e5eb679868100e72de7a097d8df13aff5eca3cddb339d0196addaeb8b980ad6bf
-
Filesize
300KB
MD5bcf4339343eb34495e8dd6ca36724a89
SHA14edaf67f5cda16933a80b417d8d82698e38d2b05
SHA2567e5f6c20e15e91c8674052074bc386efcf29fd4b2fdf02b3c7d2fd7077e0a911
SHA512fce488bc5cb8f36196adbab4418cd42c2e24f0369907e82068373c25637a61c67e0f1f8c588f50e9ebf16c99b4fd5f99883f067ec4181d50d4156443e6d80776
-
Filesize
300KB
MD5bcf4339343eb34495e8dd6ca36724a89
SHA14edaf67f5cda16933a80b417d8d82698e38d2b05
SHA2567e5f6c20e15e91c8674052074bc386efcf29fd4b2fdf02b3c7d2fd7077e0a911
SHA512fce488bc5cb8f36196adbab4418cd42c2e24f0369907e82068373c25637a61c67e0f1f8c588f50e9ebf16c99b4fd5f99883f067ec4181d50d4156443e6d80776
-
Filesize
359KB
MD57e9e55d0517f8bffd32fabe106a11287
SHA17d1c2dffa0363653865b31d2467e39a36ca23b95
SHA256752267cebe3f6b68a182abb0d2341a48b5c8f3b82f8226e8af33661c96fe207a
SHA51220852ceb280d77f1c05f01d51bbed3241277ffa02e607e8acaec04738c70bae991f9d70aa85df5b250569e654a518a89028b62b366457b33baece9cbadf40dd3
-
Filesize
359KB
MD57e9e55d0517f8bffd32fabe106a11287
SHA17d1c2dffa0363653865b31d2467e39a36ca23b95
SHA256752267cebe3f6b68a182abb0d2341a48b5c8f3b82f8226e8af33661c96fe207a
SHA51220852ceb280d77f1c05f01d51bbed3241277ffa02e607e8acaec04738c70bae991f9d70aa85df5b250569e654a518a89028b62b366457b33baece9cbadf40dd3