Analysis
-
max time kernel
84s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe
Resource
win10v2004-20230220-en
General
-
Target
6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe
-
Size
686KB
-
MD5
a0245a89ddbe5c7414aa9051fa1e1061
-
SHA1
6e3120c5b55d27aae00a0f29b57fca04712bc736
-
SHA256
6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da
-
SHA512
e75d66158e1eb68aeaf92d9bbeaa6e341a7d4db31667d391c2476c780e4560c5eae15d7adbb000115fbf753bc55466e29249a133186c84a4f730b30375f9bfb3
-
SSDEEP
12288:pMr4y90Ywy1nwau2ZKD2llyI+WE5B57W3wFWsezNXfFx2Z05TBPMn:xyHq2ZDlyINE5B5C3qWsWa+5T9Mn
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1602.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1602.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1602.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1068-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/1068-503-0x0000000004D50000-0x0000000004D60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3468 un990862.exe 1496 pro1602.exe 1068 qu6972.exe 4368 si927776.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1602.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1602.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un990862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un990862.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3464 1496 WerFault.exe 89 4956 1068 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1496 pro1602.exe 1496 pro1602.exe 1068 qu6972.exe 1068 qu6972.exe 4368 si927776.exe 4368 si927776.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1496 pro1602.exe Token: SeDebugPrivilege 1068 qu6972.exe Token: SeDebugPrivilege 4368 si927776.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3468 4000 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe 88 PID 4000 wrote to memory of 3468 4000 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe 88 PID 4000 wrote to memory of 3468 4000 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe 88 PID 3468 wrote to memory of 1496 3468 un990862.exe 89 PID 3468 wrote to memory of 1496 3468 un990862.exe 89 PID 3468 wrote to memory of 1496 3468 un990862.exe 89 PID 3468 wrote to memory of 1068 3468 un990862.exe 96 PID 3468 wrote to memory of 1068 3468 un990862.exe 96 PID 3468 wrote to memory of 1068 3468 un990862.exe 96 PID 4000 wrote to memory of 4368 4000 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe 103 PID 4000 wrote to memory of 4368 4000 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe 103 PID 4000 wrote to memory of 4368 4000 6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe"C:\Users\Admin\AppData\Local\Temp\6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990862.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1602.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 10804⤵
- Program crash
PID:3464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6972.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 18524⤵
- Program crash
PID:4956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927776.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1496 -ip 14961⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1068 -ip 10681⤵PID:4348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c64863241514f75062e1a45a5e10640b
SHA1e9435ea48bdf6a2b3966cfca87614a9fcbf7f308
SHA256c32a2220385b6383a0de1b13594718255503e1fbddb84d6bc27749dc98252e14
SHA512989de4b03d33568a249d293c9dc60892d58486628a76c2caacfb2318e18ac5278468cf54b557fe75fa393249942e0826bee8cbce4ff449b9c3844d869c231cbf
-
Filesize
175KB
MD5c64863241514f75062e1a45a5e10640b
SHA1e9435ea48bdf6a2b3966cfca87614a9fcbf7f308
SHA256c32a2220385b6383a0de1b13594718255503e1fbddb84d6bc27749dc98252e14
SHA512989de4b03d33568a249d293c9dc60892d58486628a76c2caacfb2318e18ac5278468cf54b557fe75fa393249942e0826bee8cbce4ff449b9c3844d869c231cbf
-
Filesize
544KB
MD54ca88141b51f85329c3b290e92a5db6a
SHA185bbcad75667b63648c44d0064b741232f0a58e8
SHA256adcf89d9376ca41ccdd21303c8cb7fcc50d41fa2aa4d049d714919ccbb84ee5a
SHA5128f78bfffa9cffd1a13601e773cb0d4aeeab4d97dbf0c08a60ccbdb3a6634f5ada3d24ca608939c45c35395750f0ade02a28bf8cc292794a927bef4e6834abf36
-
Filesize
544KB
MD54ca88141b51f85329c3b290e92a5db6a
SHA185bbcad75667b63648c44d0064b741232f0a58e8
SHA256adcf89d9376ca41ccdd21303c8cb7fcc50d41fa2aa4d049d714919ccbb84ee5a
SHA5128f78bfffa9cffd1a13601e773cb0d4aeeab4d97dbf0c08a60ccbdb3a6634f5ada3d24ca608939c45c35395750f0ade02a28bf8cc292794a927bef4e6834abf36
-
Filesize
300KB
MD5e4f74eb30852a23e085640271322683f
SHA19dea471d5aa6ced757dff975fdcc0a66d75ce61d
SHA256ae11dec4e8435ac5a3b5d36275ef61ae42613d5f900c438f4b96bba51c955a66
SHA51221a2eb7b6ade722ec63d4c183ed3f7181e11cff6c87c71d857fd90e71217b4bade42160b45952cabff386c23d2ae8d7a2f9ecd6c4ecb299c7fede2d6b8e9ca0a
-
Filesize
300KB
MD5e4f74eb30852a23e085640271322683f
SHA19dea471d5aa6ced757dff975fdcc0a66d75ce61d
SHA256ae11dec4e8435ac5a3b5d36275ef61ae42613d5f900c438f4b96bba51c955a66
SHA51221a2eb7b6ade722ec63d4c183ed3f7181e11cff6c87c71d857fd90e71217b4bade42160b45952cabff386c23d2ae8d7a2f9ecd6c4ecb299c7fede2d6b8e9ca0a
-
Filesize
359KB
MD5ac6f0f303c7350c4f52b0bf9edd3aa2c
SHA1c71ac2cb93c3c36cb270edcb90710ba75be079d7
SHA256e6faa52c555a92d0d5003ed5260bb859076b689a1525818c9af1f4fb858f8520
SHA512f3ff13c64e505839aa6d2301e4d022476dd715df46d80a087d8867505205f19477693d7734f02ae6bac80e4e7971f48966b5ac5df5d28b871d535ce4dd993f60
-
Filesize
359KB
MD5ac6f0f303c7350c4f52b0bf9edd3aa2c
SHA1c71ac2cb93c3c36cb270edcb90710ba75be079d7
SHA256e6faa52c555a92d0d5003ed5260bb859076b689a1525818c9af1f4fb858f8520
SHA512f3ff13c64e505839aa6d2301e4d022476dd715df46d80a087d8867505205f19477693d7734f02ae6bac80e4e7971f48966b5ac5df5d28b871d535ce4dd993f60