Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 12:56
Static task
static1
Behavioral task
behavioral1
Sample
73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe
Resource
win10-20230220-en
General
-
Target
73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe
-
Size
686KB
-
MD5
feb27cf49245d248c02879fc946a4f19
-
SHA1
dc68c072e76e4769948aa3b1862ddf4f6b9fcb7c
-
SHA256
73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39
-
SHA512
b8074597e6992fd440ffd4e42efd84de78f1f1f5e6de60ea8b2b19a05da2318fe5055a061b6987e2cf04275f58e268be7c68d7e83b8c783869e43b20db52c64b
-
SSDEEP
12288:LMrQy90rGly54+Jw5Xg91sCCTXpEZB57W3mt3+7rsFFt+Z0QkAA/FYNhn:zy85BSXRCCTZEZB5C3mt3+0A+QkAyuNd
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1877.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 23 IoCs
resource yara_rule behavioral1/memory/3724-176-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/3724-177-0x0000000002720000-0x0000000002764000-memory.dmp family_redline behavioral1/memory/3724-179-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-178-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-181-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-183-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-185-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-187-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-189-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-191-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-193-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-195-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-197-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-199-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-202-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline behavioral1/memory/3724-204-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-207-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-209-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-211-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-213-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-215-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/3724-1097-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline behavioral1/memory/3724-1098-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1008 un612544.exe 4252 pro1877.exe 3724 qu0314.exe 4620 si981521.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1877.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1877.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un612544.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un612544.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4252 pro1877.exe 4252 pro1877.exe 3724 qu0314.exe 3724 qu0314.exe 4620 si981521.exe 4620 si981521.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4252 pro1877.exe Token: SeDebugPrivilege 3724 qu0314.exe Token: SeDebugPrivilege 4620 si981521.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1008 2272 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe 66 PID 2272 wrote to memory of 1008 2272 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe 66 PID 2272 wrote to memory of 1008 2272 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe 66 PID 1008 wrote to memory of 4252 1008 un612544.exe 67 PID 1008 wrote to memory of 4252 1008 un612544.exe 67 PID 1008 wrote to memory of 4252 1008 un612544.exe 67 PID 1008 wrote to memory of 3724 1008 un612544.exe 68 PID 1008 wrote to memory of 3724 1008 un612544.exe 68 PID 1008 wrote to memory of 3724 1008 un612544.exe 68 PID 2272 wrote to memory of 4620 2272 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe 70 PID 2272 wrote to memory of 4620 2272 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe 70 PID 2272 wrote to memory of 4620 2272 73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe"C:\Users\Admin\AppData\Local\Temp\73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612544.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612544.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1877.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0314.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0314.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981521.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981521.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bbc3fb1ca4b5adf92484cc69ecc02597
SHA1ef6dfb7da96327052ad13aa9c023ff2f4b3c55fc
SHA256f861e5635dd99b5a1a75ecefc26f0812f670f3c18396dc8e784cce4fedb1f7a7
SHA5121c8025cafc50cd8ff71ca226697f2f9e0a1fa14c514728240062f8bb3979595841a176ca7495b63607238250f7b799f02c8214fd698129d74ccc22676ccd7fa9
-
Filesize
175KB
MD5bbc3fb1ca4b5adf92484cc69ecc02597
SHA1ef6dfb7da96327052ad13aa9c023ff2f4b3c55fc
SHA256f861e5635dd99b5a1a75ecefc26f0812f670f3c18396dc8e784cce4fedb1f7a7
SHA5121c8025cafc50cd8ff71ca226697f2f9e0a1fa14c514728240062f8bb3979595841a176ca7495b63607238250f7b799f02c8214fd698129d74ccc22676ccd7fa9
-
Filesize
544KB
MD5993577e1c60514d4484ad11645e718b8
SHA1d958128dd484540d0030ec34078c254acd6b22d4
SHA2564bd7b37321440b5f13cafd5938ce1e1821b2fb87f78977097bfcc99472de0f3b
SHA5125c2b995da9a452bc8cdb7a5bdd1996c56a5a8ef535243b52c76532ba609b9a1e3dfb16ce8075c2ea58dd82633907a4004300359fc2b3991dcfaa1a63d01132f0
-
Filesize
544KB
MD5993577e1c60514d4484ad11645e718b8
SHA1d958128dd484540d0030ec34078c254acd6b22d4
SHA2564bd7b37321440b5f13cafd5938ce1e1821b2fb87f78977097bfcc99472de0f3b
SHA5125c2b995da9a452bc8cdb7a5bdd1996c56a5a8ef535243b52c76532ba609b9a1e3dfb16ce8075c2ea58dd82633907a4004300359fc2b3991dcfaa1a63d01132f0
-
Filesize
300KB
MD5e23ccbaf0bd92dc864fb009a7875842a
SHA16f02f70b000cdb68231c9a1e11f4186af8d691c8
SHA256343e5a2ba93ef14de3afcd6e260bf71a5fa8113f7461f9b1bbd2b76f885820a4
SHA51200988406a9641a52234b050389a9d6570824aa2306daa5e3895dafbe03bfec8a0c2d90b12d073b10cd6dbaeb9eb77c85bac6acf25f0fd6d21be0dc3bed5f608f
-
Filesize
300KB
MD5e23ccbaf0bd92dc864fb009a7875842a
SHA16f02f70b000cdb68231c9a1e11f4186af8d691c8
SHA256343e5a2ba93ef14de3afcd6e260bf71a5fa8113f7461f9b1bbd2b76f885820a4
SHA51200988406a9641a52234b050389a9d6570824aa2306daa5e3895dafbe03bfec8a0c2d90b12d073b10cd6dbaeb9eb77c85bac6acf25f0fd6d21be0dc3bed5f608f
-
Filesize
359KB
MD5269464ef78a2197800e1dd1cc2659599
SHA1d2b96fdd99cb6f022dff1b7be7bb2279eaea7067
SHA256a63a5db87e9bc20a4222340c1dfc74fed929ca538d52620b854bc79a64a46c97
SHA51242cd2516032cb4c7ceecf61e6615858fb6dc6b59bac074bf474492cea111f58fda49b7712b7ecfac55a12390f3c952500e5902f7074414ca10a8915de6da88fb
-
Filesize
359KB
MD5269464ef78a2197800e1dd1cc2659599
SHA1d2b96fdd99cb6f022dff1b7be7bb2279eaea7067
SHA256a63a5db87e9bc20a4222340c1dfc74fed929ca538d52620b854bc79a64a46c97
SHA51242cd2516032cb4c7ceecf61e6615858fb6dc6b59bac074bf474492cea111f58fda49b7712b7ecfac55a12390f3c952500e5902f7074414ca10a8915de6da88fb