Analysis
-
max time kernel
95s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:48
Static task
static1
Behavioral task
behavioral1
Sample
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe
Resource
win10v2004-20230221-en
General
-
Target
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe
-
Size
687KB
-
MD5
404b9ffe611f62d0fd6edc21c160d824
-
SHA1
f4d9f1a9a89fca3b1e7429f9658ed5b401217b93
-
SHA256
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454
-
SHA512
c5f99997566f34044a997c269665bd46ade13da21f615b42173205cca66184740c6e0a5c62f504706a61999f19d620e61f4f2b59ac344fa4b3bea86ea9ccf9eb
-
SSDEEP
12288:5MrGy90nJ5ZaP520Up5AaDCz5AigKrGQhOZOmEM9NtO2:fylKp5NQnrGQA902
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8956.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8956.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8956.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8956.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8956.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8956.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3936-190-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-193-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-195-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-197-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-199-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-201-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-203-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-205-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-207-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-209-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-211-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-216-0x0000000004E40000-0x0000000004E50000-memory.dmp family_redline behavioral1/memory/3936-219-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-215-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-221-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-223-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-225-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3936-227-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2748 un614477.exe 2836 pro8956.exe 3936 qu6602.exe 1884 si486833.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8956.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8956.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un614477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un614477.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3772 2836 WerFault.exe 84 3848 3936 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2836 pro8956.exe 2836 pro8956.exe 3936 qu6602.exe 3936 qu6602.exe 1884 si486833.exe 1884 si486833.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2836 pro8956.exe Token: SeDebugPrivilege 3936 qu6602.exe Token: SeDebugPrivilege 1884 si486833.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2748 2712 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe 83 PID 2712 wrote to memory of 2748 2712 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe 83 PID 2712 wrote to memory of 2748 2712 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe 83 PID 2748 wrote to memory of 2836 2748 un614477.exe 84 PID 2748 wrote to memory of 2836 2748 un614477.exe 84 PID 2748 wrote to memory of 2836 2748 un614477.exe 84 PID 2748 wrote to memory of 3936 2748 un614477.exe 93 PID 2748 wrote to memory of 3936 2748 un614477.exe 93 PID 2748 wrote to memory of 3936 2748 un614477.exe 93 PID 2712 wrote to memory of 1884 2712 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe 97 PID 2712 wrote to memory of 1884 2712 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe 97 PID 2712 wrote to memory of 1884 2712 62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe"C:\Users\Admin\AppData\Local\Temp\62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un614477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un614477.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8956.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8956.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 10804⤵
- Program crash
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6602.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 13564⤵
- Program crash
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si486833.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si486833.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2836 -ip 28361⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3936 -ip 39361⤵PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5061d419d6575d4683b19e8de3976ebd7
SHA168e4e5dfcfb019cab41eeb74e6ada79429eac307
SHA2561cd7ab435b032aa52efc187f091f8d516b3b6a49f2d91338e73a0c0ea658bbca
SHA512ae60621778eeb6630e8aea94c3161fbc1c32dc67a2e6d7789e5d93a20c2ab8c9dddbfbee0efb16846c03ba3a67fb60b20f6f59a9ff935619b331da8ffa4489d7
-
Filesize
175KB
MD5061d419d6575d4683b19e8de3976ebd7
SHA168e4e5dfcfb019cab41eeb74e6ada79429eac307
SHA2561cd7ab435b032aa52efc187f091f8d516b3b6a49f2d91338e73a0c0ea658bbca
SHA512ae60621778eeb6630e8aea94c3161fbc1c32dc67a2e6d7789e5d93a20c2ab8c9dddbfbee0efb16846c03ba3a67fb60b20f6f59a9ff935619b331da8ffa4489d7
-
Filesize
545KB
MD552b2e11d92f08c2a53205d4dce1944ac
SHA1a2b4797cf7e461c4bb1d7d4b483063eaceb8d425
SHA25615139a6cc7309a0bd590ad15dad94f240e92bc3f470dcd243fb1204697945c76
SHA5126247be615d061d572e0ccbd985bcb9f1fcfb78dfd9fc1b89fa02b349040465ba4c0e41ee4c83976daae2df5dd3ba0da64a64ed976cbeb4e6874a2cf1b8c72f49
-
Filesize
545KB
MD552b2e11d92f08c2a53205d4dce1944ac
SHA1a2b4797cf7e461c4bb1d7d4b483063eaceb8d425
SHA25615139a6cc7309a0bd590ad15dad94f240e92bc3f470dcd243fb1204697945c76
SHA5126247be615d061d572e0ccbd985bcb9f1fcfb78dfd9fc1b89fa02b349040465ba4c0e41ee4c83976daae2df5dd3ba0da64a64ed976cbeb4e6874a2cf1b8c72f49
-
Filesize
300KB
MD5240489ec43432ca75cef9c6c6a73d046
SHA1c84c5564bd31566e332ab60ae4bd8eea4cdfcdf8
SHA256baf61d15c855c299af3febd10a9d771e64c551fb421c3952df6ff8b06bed89e1
SHA51265f58c40370ea5a64015c6d983a911204d34685b5e797015b532876d5cf795de133c8ddcf798467b1977e55c7534a6b3b6f8cbabddad0561b930e9673b615f7a
-
Filesize
300KB
MD5240489ec43432ca75cef9c6c6a73d046
SHA1c84c5564bd31566e332ab60ae4bd8eea4cdfcdf8
SHA256baf61d15c855c299af3febd10a9d771e64c551fb421c3952df6ff8b06bed89e1
SHA51265f58c40370ea5a64015c6d983a911204d34685b5e797015b532876d5cf795de133c8ddcf798467b1977e55c7534a6b3b6f8cbabddad0561b930e9673b615f7a
-
Filesize
359KB
MD58b711e950726bf3500b217b3eba305bf
SHA1fc0e7d787c50f4955b690e73c054620abf706fea
SHA2567591fd6660ff391e17c47231904ef8b2c5296a1049a34fcd6612cd16b4cebde9
SHA5123ee6bb29a6e60faf0c2b485861cbe09b0e8157b5e26dd52e768581ae62b41e10921209b32fb3f2d1a2fddfdd409277fcbb8b8450d1fb79670c7e08220d0cc086
-
Filesize
359KB
MD58b711e950726bf3500b217b3eba305bf
SHA1fc0e7d787c50f4955b690e73c054620abf706fea
SHA2567591fd6660ff391e17c47231904ef8b2c5296a1049a34fcd6612cd16b4cebde9
SHA5123ee6bb29a6e60faf0c2b485861cbe09b0e8157b5e26dd52e768581ae62b41e10921209b32fb3f2d1a2fddfdd409277fcbb8b8450d1fb79670c7e08220d0cc086