Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 11:13
Static task
static1
Behavioral task
behavioral1
Sample
48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe
Resource
win10v2004-20230220-en
General
-
Target
48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe
-
Size
687KB
-
MD5
a844ff8b435e3b2a29ea43b689eaa3e2
-
SHA1
5f435a4b850bc86cbe1acf8a40098e54fe32d688
-
SHA256
48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9
-
SHA512
2fb75123c1f187314334ffe3fa5dff52ec27404ece2b2adeea33bd04631b0c389fdb37bcfddd04f09bf12455ec9d972b907ccdcb3592a2ed309c47c73108a5df
-
SSDEEP
12288:qMrry90ML3UyfwsP5DL+XwHJsJVoOS6WBsgJQdHZDgPwFO6ZcGdrg89aTnamv:9yh3wNXwpDXeg65ZDPnK8o+w
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8514.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8514.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2152-191-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-192-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-194-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-196-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-198-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-200-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-202-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-204-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-206-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-208-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-210-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-212-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-214-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-216-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-218-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-220-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-222-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-224-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/2152-1113-0x0000000004DF0000-0x0000000004E00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3380 un135928.exe 4104 pro8514.exe 2152 qu2162.exe 2684 si742316.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8514.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un135928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un135928.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3136 4104 WerFault.exe 84 3848 2152 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4104 pro8514.exe 4104 pro8514.exe 2152 qu2162.exe 2152 qu2162.exe 2684 si742316.exe 2684 si742316.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4104 pro8514.exe Token: SeDebugPrivilege 2152 qu2162.exe Token: SeDebugPrivilege 2684 si742316.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3380 1592 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe 83 PID 1592 wrote to memory of 3380 1592 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe 83 PID 1592 wrote to memory of 3380 1592 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe 83 PID 3380 wrote to memory of 4104 3380 un135928.exe 84 PID 3380 wrote to memory of 4104 3380 un135928.exe 84 PID 3380 wrote to memory of 4104 3380 un135928.exe 84 PID 3380 wrote to memory of 2152 3380 un135928.exe 90 PID 3380 wrote to memory of 2152 3380 un135928.exe 90 PID 3380 wrote to memory of 2152 3380 un135928.exe 90 PID 1592 wrote to memory of 2684 1592 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe 94 PID 1592 wrote to memory of 2684 1592 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe 94 PID 1592 wrote to memory of 2684 1592 48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe"C:\Users\Admin\AppData\Local\Temp\48d759c0fb7edef2c502b1f93a9960ee290e8355dbd30b4a3ffd6ff8f74110b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un135928.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un135928.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8514.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 10844⤵
- Program crash
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2162.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2162.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 13284⤵
- Program crash
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742316.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4104 -ip 41041⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2152 -ip 21521⤵PID:3564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b79af76120ba88b73f9ae5765b0ee08a
SHA1702e60c2a61a606a6a236caf62496019bba6b720
SHA256353762b43e9f0f2f02beb41ca523462676750a7a74d702a0f8654724268e7ae7
SHA512450140f7bd738538d4ad46e47909e04e5e41b0de12a256033c2036797b4ea84b60c68427216314cdf5f388e1afcd4604e9b2a48a0b9bacd8087ba998f176047c
-
Filesize
175KB
MD5b79af76120ba88b73f9ae5765b0ee08a
SHA1702e60c2a61a606a6a236caf62496019bba6b720
SHA256353762b43e9f0f2f02beb41ca523462676750a7a74d702a0f8654724268e7ae7
SHA512450140f7bd738538d4ad46e47909e04e5e41b0de12a256033c2036797b4ea84b60c68427216314cdf5f388e1afcd4604e9b2a48a0b9bacd8087ba998f176047c
-
Filesize
545KB
MD52187e5ded591b20333c5120fe1bd6c26
SHA187e965a21c7abf8271a31bc394cd948b71467d80
SHA2564b851252b461029932420f95c49663e36a3f6aa4449b4a2ade81d93828441f9d
SHA512d9dd7447b8bcfcb1f36d379cc47c0774c3d1e44530ef29cafd81d23d4e96372ce2ceaf549f052651ff85e41e17ca995c06897b4d6faf600ca1dfc57052b4b6b5
-
Filesize
545KB
MD52187e5ded591b20333c5120fe1bd6c26
SHA187e965a21c7abf8271a31bc394cd948b71467d80
SHA2564b851252b461029932420f95c49663e36a3f6aa4449b4a2ade81d93828441f9d
SHA512d9dd7447b8bcfcb1f36d379cc47c0774c3d1e44530ef29cafd81d23d4e96372ce2ceaf549f052651ff85e41e17ca995c06897b4d6faf600ca1dfc57052b4b6b5
-
Filesize
300KB
MD5f82d98f7782f933dd034b2a35febc8e1
SHA17cca89148b3f85531df91cc8c72eac75df19334f
SHA2562c9d5f12de4bdf895bd840ef5225ac833df838061da020160d59c0a15b8ede82
SHA5120ac7b8ab540c7a2683dbcabe13bcc04e0b4abf43fd4906c214f84672d5d64a7f3e4febcbdd64148452c7aaed23b4b02c234abf05768729f5cd4e960b8fbe30ab
-
Filesize
300KB
MD5f82d98f7782f933dd034b2a35febc8e1
SHA17cca89148b3f85531df91cc8c72eac75df19334f
SHA2562c9d5f12de4bdf895bd840ef5225ac833df838061da020160d59c0a15b8ede82
SHA5120ac7b8ab540c7a2683dbcabe13bcc04e0b4abf43fd4906c214f84672d5d64a7f3e4febcbdd64148452c7aaed23b4b02c234abf05768729f5cd4e960b8fbe30ab
-
Filesize
359KB
MD5676a266cdfe598ea3b388a4bc32ae631
SHA191b1de0eddfa697ec306bc7c5a53defe01fe63d9
SHA256dca6d19cda9bbcb0247e4e9ba5c49f094242225dfea2d1ee23af2040c0dc6fd3
SHA512ff48e418865a26a30f4b3e29577e31a9fcdf2b49ec763717f976d9f77e0245ce48f758a59b7e327737ba5650203d412729cee071d3eb9c5c2208324f483d801d
-
Filesize
359KB
MD5676a266cdfe598ea3b388a4bc32ae631
SHA191b1de0eddfa697ec306bc7c5a53defe01fe63d9
SHA256dca6d19cda9bbcb0247e4e9ba5c49f094242225dfea2d1ee23af2040c0dc6fd3
SHA512ff48e418865a26a30f4b3e29577e31a9fcdf2b49ec763717f976d9f77e0245ce48f758a59b7e327737ba5650203d412729cee071d3eb9c5c2208324f483d801d