Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:53
Static task
static1
Behavioral task
behavioral1
Sample
f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe
Resource
win10v2004-20230220-en
General
-
Target
f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe
-
Size
687KB
-
MD5
ca237bff7d10aab910b97e0fb5bf0ac8
-
SHA1
88679a982a27b50725668f15d654bad831cf7c9a
-
SHA256
f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f
-
SHA512
6c202c67e2128c0c912bbcd7eaa79718d21084b6c352c6d0c89c85607625be6b8d7cf5668c8f187c66c78e5528c4859452b20875dce5ba75bc3efeda8b3c18d8
-
SSDEEP
12288:/Mrgy90SWGEhnqWdwH9SiPRGSXPaMAXtIQ8APQTGnCZ1Xw3fVrFZqG:Py3WdmQiPRJXPlAyQ8AIT+Pb
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0067.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0067.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4460-191-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-192-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-194-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-196-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-198-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-200-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-202-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-204-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-206-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-208-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-212-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-210-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-214-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-216-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-218-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-220-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-222-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4460-224-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3804 un240807.exe 2236 pro0067.exe 4460 qu5189.exe 1956 si572422.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0067.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un240807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un240807.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2188 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 628 2236 WerFault.exe 87 4352 4460 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2236 pro0067.exe 2236 pro0067.exe 4460 qu5189.exe 4460 qu5189.exe 1956 si572422.exe 1956 si572422.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2236 pro0067.exe Token: SeDebugPrivilege 4460 qu5189.exe Token: SeDebugPrivilege 1956 si572422.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3804 2548 f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe 86 PID 2548 wrote to memory of 3804 2548 f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe 86 PID 2548 wrote to memory of 3804 2548 f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe 86 PID 3804 wrote to memory of 2236 3804 un240807.exe 87 PID 3804 wrote to memory of 2236 3804 un240807.exe 87 PID 3804 wrote to memory of 2236 3804 un240807.exe 87 PID 3804 wrote to memory of 4460 3804 un240807.exe 93 PID 3804 wrote to memory of 4460 3804 un240807.exe 93 PID 3804 wrote to memory of 4460 3804 un240807.exe 93 PID 2548 wrote to memory of 1956 2548 f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe 96 PID 2548 wrote to memory of 1956 2548 f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe 96 PID 2548 wrote to memory of 1956 2548 f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe"C:\Users\Admin\AppData\Local\Temp\f01b2106a5bcf2dd0dd5576715db8cbcd8aefbbec3f8a706c099cd35a83f8f7f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un240807.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un240807.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0067.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0067.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 10804⤵
- Program crash
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5189.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 13364⤵
- Program crash
PID:4352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si572422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si572422.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2236 -ip 22361⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4460 -ip 44601⤵PID:772
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD580581f2b38d83fe81b6d4a318d92894d
SHA15e8eeceec585644f915ea6329a36d2269b13e937
SHA256c8180a53de9f4f79254e0d3a4d734f1e474da23bfdc113160031228414b4baf3
SHA512c31283873d7d6aff74ba82a1f989e304b8571235b076f822ca7e8b67021aeda212e9579b7c8d8168cc59be928746a8c6ee1ef7ff662ccc77deb60e8316c4c6ed
-
Filesize
175KB
MD580581f2b38d83fe81b6d4a318d92894d
SHA15e8eeceec585644f915ea6329a36d2269b13e937
SHA256c8180a53de9f4f79254e0d3a4d734f1e474da23bfdc113160031228414b4baf3
SHA512c31283873d7d6aff74ba82a1f989e304b8571235b076f822ca7e8b67021aeda212e9579b7c8d8168cc59be928746a8c6ee1ef7ff662ccc77deb60e8316c4c6ed
-
Filesize
545KB
MD55672d9ec6560f1962eb8162067b35f44
SHA12771e55eb7e38bf860a3dcbb7916f8bcb804ba4e
SHA2567bc241abccaaa3bb6f3f56dc7e22d1c12990e00436fda93e862f474bd49125e9
SHA5123f17da31f7bef8eb4bce4e1b646f03e1fa949bd163831c8287c4b26dde8df638e92e384b24f0bfa89aeaae44d57f73794bc106e1d24fc8b2e4acaeaa4af0c20d
-
Filesize
545KB
MD55672d9ec6560f1962eb8162067b35f44
SHA12771e55eb7e38bf860a3dcbb7916f8bcb804ba4e
SHA2567bc241abccaaa3bb6f3f56dc7e22d1c12990e00436fda93e862f474bd49125e9
SHA5123f17da31f7bef8eb4bce4e1b646f03e1fa949bd163831c8287c4b26dde8df638e92e384b24f0bfa89aeaae44d57f73794bc106e1d24fc8b2e4acaeaa4af0c20d
-
Filesize
300KB
MD5c4bc318bcb9860bd2ff8d336ea1fcceb
SHA1b7b4780b509c1ba3745d0287d1ac8a273dcb3f4e
SHA256e7425b871ac33e643e25bcb702b3a1414a9440c5f549aa706ed2e57a435a0602
SHA5129ab4c609513b780de3931df26f2cfdf8acd402270bb77bb6dd121d7a57dc4682735f3fd71e16f7fbbbad6ecb259ff07516030e40222e30794a0e17c4c37a9ef8
-
Filesize
300KB
MD5c4bc318bcb9860bd2ff8d336ea1fcceb
SHA1b7b4780b509c1ba3745d0287d1ac8a273dcb3f4e
SHA256e7425b871ac33e643e25bcb702b3a1414a9440c5f549aa706ed2e57a435a0602
SHA5129ab4c609513b780de3931df26f2cfdf8acd402270bb77bb6dd121d7a57dc4682735f3fd71e16f7fbbbad6ecb259ff07516030e40222e30794a0e17c4c37a9ef8
-
Filesize
359KB
MD5f113dc4ad03a9ae58b37809e3a8aaf6d
SHA1f272d3fc4c2843c7d4b19095e4f16e41dcf6d920
SHA256c1e88a1708559abde2172b90ece0c6f9819c6eb82015b4a9c4c279388e41098a
SHA5126ac07ffd13606e222780ddc23f20a773de4af404c7e3665ec753e585932419bc7af8aabbd8e4126b9ec77efe3a3f4ea116e61f80ce1a8568b9734e574d9d2095
-
Filesize
359KB
MD5f113dc4ad03a9ae58b37809e3a8aaf6d
SHA1f272d3fc4c2843c7d4b19095e4f16e41dcf6d920
SHA256c1e88a1708559abde2172b90ece0c6f9819c6eb82015b4a9c4c279388e41098a
SHA5126ac07ffd13606e222780ddc23f20a773de4af404c7e3665ec753e585932419bc7af8aabbd8e4126b9ec77efe3a3f4ea116e61f80ce1a8568b9734e574d9d2095