Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:55
Static task
static1
Behavioral task
behavioral1
Sample
e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe
Resource
win10v2004-20230221-en
General
-
Target
e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe
-
Size
687KB
-
MD5
169f7ff06f1f36edb25bb8b53cca8df5
-
SHA1
d60ae6893be4625544c2e7ca5998a3d349bb3f02
-
SHA256
e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537
-
SHA512
ed58c93ce7ba7786b85be7b4647250d01432afb2121d82c2af2978de1dd4858c69bf5eee741e3ff8b5b665696dc73d4b9e4928bbd12859110ba79f441a99dda4
-
SSDEEP
12288:2MrOy90cHmmJGV7idUwEth04SeEaB57WgjrbQDhdZ0DYYgmxc+lm7:MyamJEsUNXpSeEaB5Cg3b8j+D8mxc+w7
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1971.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1971.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4940-191-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-192-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-194-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-196-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-198-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-200-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-202-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-204-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-206-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-208-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-210-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-212-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-214-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-216-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-218-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-220-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-222-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-224-0x00000000027F0000-0x000000000282E000-memory.dmp family_redline behavioral1/memory/4940-351-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline behavioral1/memory/4940-356-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2064 un323993.exe 4040 pro1971.exe 4940 qu2036.exe 2480 si726809.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1971.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un323993.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un323993.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 932 4040 WerFault.exe 77 1568 4940 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4040 pro1971.exe 4040 pro1971.exe 4940 qu2036.exe 4940 qu2036.exe 2480 si726809.exe 2480 si726809.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4040 pro1971.exe Token: SeDebugPrivilege 4940 qu2036.exe Token: SeDebugPrivilege 2480 si726809.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4508 wrote to memory of 2064 4508 e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe 76 PID 4508 wrote to memory of 2064 4508 e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe 76 PID 4508 wrote to memory of 2064 4508 e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe 76 PID 2064 wrote to memory of 4040 2064 un323993.exe 77 PID 2064 wrote to memory of 4040 2064 un323993.exe 77 PID 2064 wrote to memory of 4040 2064 un323993.exe 77 PID 2064 wrote to memory of 4940 2064 un323993.exe 81 PID 2064 wrote to memory of 4940 2064 un323993.exe 81 PID 2064 wrote to memory of 4940 2064 un323993.exe 81 PID 4508 wrote to memory of 2480 4508 e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe 86 PID 4508 wrote to memory of 2480 4508 e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe 86 PID 4508 wrote to memory of 2480 4508 e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe"C:\Users\Admin\AppData\Local\Temp\e8c38dc6c8db691bbad8f437b329621e180f1ee5f5064ed9e17397e35329e537.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un323993.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un323993.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1971.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1971.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 10844⤵
- Program crash
PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2036.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 17044⤵
- Program crash
PID:1568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726809.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726809.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4040 -ip 40401⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4940 -ip 49401⤵PID:3988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a38e497dbffbaf23b2ef49b3c7b35274
SHA19b6a60b41d7038aae18a30db86e0e6bcc93065d1
SHA256ada6a527f534d83b5d262890c43a16572f1b8bc47d7ddb3385608bd92a130615
SHA512d090df5ce15c15bb96b91857a39d9ccbca2a7afc5f116e915072465835c21de270b61ad1b08a9cd11044c95d3b0c8513c857f219cf1486c74b08fe54e92442c2
-
Filesize
175KB
MD5a38e497dbffbaf23b2ef49b3c7b35274
SHA19b6a60b41d7038aae18a30db86e0e6bcc93065d1
SHA256ada6a527f534d83b5d262890c43a16572f1b8bc47d7ddb3385608bd92a130615
SHA512d090df5ce15c15bb96b91857a39d9ccbca2a7afc5f116e915072465835c21de270b61ad1b08a9cd11044c95d3b0c8513c857f219cf1486c74b08fe54e92442c2
-
Filesize
545KB
MD53bb032c4ceb502ad18340a63c291e4b4
SHA153b87a5415947305a63d166311e21df07cfa49ee
SHA2565e2fb7dd65b535946926c875cadb3d2a21e9e1cc492f9960b5c80d81169eb48a
SHA512bda02b6e52babfd2c09b0d53521341829da9203f834ec1c272a363c68aee171824c629460e26df9cd343054dceee275c7da673c9bf3171acefb1e4c2f394da21
-
Filesize
545KB
MD53bb032c4ceb502ad18340a63c291e4b4
SHA153b87a5415947305a63d166311e21df07cfa49ee
SHA2565e2fb7dd65b535946926c875cadb3d2a21e9e1cc492f9960b5c80d81169eb48a
SHA512bda02b6e52babfd2c09b0d53521341829da9203f834ec1c272a363c68aee171824c629460e26df9cd343054dceee275c7da673c9bf3171acefb1e4c2f394da21
-
Filesize
300KB
MD57604d2a3c1801a1d74cb8845dfe3e37c
SHA176830b0e24b0d7c0db86e1f835d7c67f0b4ed291
SHA25669a4cefdb16dc9931ebd50dde2d0417ec1003fee16de2b37372aa8c818c93ed6
SHA512ca996ce008c4a1bd2a0d097d237f7d40e213b544602baad4a1999a34152afbb865f7a069446befaf8b88cbd93be395bd70f11553d0ae67df8b30bddec4a71273
-
Filesize
300KB
MD57604d2a3c1801a1d74cb8845dfe3e37c
SHA176830b0e24b0d7c0db86e1f835d7c67f0b4ed291
SHA25669a4cefdb16dc9931ebd50dde2d0417ec1003fee16de2b37372aa8c818c93ed6
SHA512ca996ce008c4a1bd2a0d097d237f7d40e213b544602baad4a1999a34152afbb865f7a069446befaf8b88cbd93be395bd70f11553d0ae67df8b30bddec4a71273
-
Filesize
359KB
MD5b6a4efecdb160d0a24b2c7dcb03ab3f5
SHA10107325d9260977c64c358db583d1abec6efe8f1
SHA2562f6716ed2a6897873a5cf9cece9308ebb469f9467dfbfc6dcfae57882d94ef17
SHA512fb400cb61c11c4d967ec2b74b339039218358c0f40c882bf158dedd29cd455073acc11a3473ab4e54ff5a97599ccb80374b0d179103be595562129741d0ae243
-
Filesize
359KB
MD5b6a4efecdb160d0a24b2c7dcb03ab3f5
SHA10107325d9260977c64c358db583d1abec6efe8f1
SHA2562f6716ed2a6897873a5cf9cece9308ebb469f9467dfbfc6dcfae57882d94ef17
SHA512fb400cb61c11c4d967ec2b74b339039218358c0f40c882bf158dedd29cd455073acc11a3473ab4e54ff5a97599ccb80374b0d179103be595562129741d0ae243