Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:00
Static task
static1
Behavioral task
behavioral1
Sample
7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe
Resource
win10v2004-20230220-en
General
-
Target
7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe
-
Size
686KB
-
MD5
f0ccee12b50404dcd2100c5cc058af85
-
SHA1
c7058da805b56b194f5f5261ac2f4ff28f031270
-
SHA256
7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025
-
SHA512
52cb6778e83e8dde3330799263d94104a286099eee2b19f7706c24aea59eedf4a0724feacc6ce56884edb007934270b7325a997ff599d5b0a3ea22144dfaeaee
-
SSDEEP
12288:WMrGy90Y/GCBVBZGDke80P0n3Ewx8npkJAvIbfdwTCKSIKl1IvuH/xL:8y7+CHBZkke80PUEweIbiXi+KxL
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9978.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4928-192-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-194-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-191-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-196-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-198-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-200-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-202-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-206-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-204-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-208-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-210-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-212-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-219-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-222-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-215-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-221-0x0000000002530000-0x0000000002540000-memory.dmp family_redline behavioral1/memory/4928-224-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-226-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-228-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4928-1111-0x0000000002530000-0x0000000002540000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1188 un595465.exe 880 pro9978.exe 4928 qu0169.exe 4608 si310845.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9978.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9978.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un595465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un595465.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 452 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3028 880 WerFault.exe 85 972 4928 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 880 pro9978.exe 880 pro9978.exe 4928 qu0169.exe 4928 qu0169.exe 4608 si310845.exe 4608 si310845.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 880 pro9978.exe Token: SeDebugPrivilege 4928 qu0169.exe Token: SeDebugPrivilege 4608 si310845.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1188 1264 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe 84 PID 1264 wrote to memory of 1188 1264 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe 84 PID 1264 wrote to memory of 1188 1264 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe 84 PID 1188 wrote to memory of 880 1188 un595465.exe 85 PID 1188 wrote to memory of 880 1188 un595465.exe 85 PID 1188 wrote to memory of 880 1188 un595465.exe 85 PID 1188 wrote to memory of 4928 1188 un595465.exe 91 PID 1188 wrote to memory of 4928 1188 un595465.exe 91 PID 1188 wrote to memory of 4928 1188 un595465.exe 91 PID 1264 wrote to memory of 4608 1264 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe 95 PID 1264 wrote to memory of 4608 1264 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe 95 PID 1264 wrote to memory of 4608 1264 7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe"C:\Users\Admin\AppData\Local\Temp\7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595465.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9978.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9978.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 10524⤵
- Program crash
PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0169.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0169.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 13284⤵
- Program crash
PID:972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310845.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 880 -ip 8801⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4928 -ip 49281⤵PID:4476
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55c24eb9d8b78d752b6347fb2d8b1c624
SHA1dfd6e595815fe207556fe6116b2cfff64e986148
SHA2563081ae9eeabb12c1550d1830f780ed4f4c9a159dd2988e26d084c3662f48d4fb
SHA512e1a65ec72d48a2128b48f02e8fd76adc8d82863c1d59986a2bd897d63aee1be940818c5e35ac5bf50d64c3ad622dbe23bf0934d5758e5337aa7810301b7111f0
-
Filesize
175KB
MD55c24eb9d8b78d752b6347fb2d8b1c624
SHA1dfd6e595815fe207556fe6116b2cfff64e986148
SHA2563081ae9eeabb12c1550d1830f780ed4f4c9a159dd2988e26d084c3662f48d4fb
SHA512e1a65ec72d48a2128b48f02e8fd76adc8d82863c1d59986a2bd897d63aee1be940818c5e35ac5bf50d64c3ad622dbe23bf0934d5758e5337aa7810301b7111f0
-
Filesize
544KB
MD5917ac50a568432db0de46d462f9030c0
SHA1aa48eaed6b536dfce28212bfa1e8b378872f93e2
SHA256d75f6918e8c1acb3e07978f098007bb16488dd64e6616dcf67a45e57b69b6b24
SHA512da6cd0ac58ba1017108b3475bf391303bd2eb84c343de69473bdaf829a6f302504f631f133198c09aa42e2f679fa85794bd134f7a459053737fe5b653cfc50e9
-
Filesize
544KB
MD5917ac50a568432db0de46d462f9030c0
SHA1aa48eaed6b536dfce28212bfa1e8b378872f93e2
SHA256d75f6918e8c1acb3e07978f098007bb16488dd64e6616dcf67a45e57b69b6b24
SHA512da6cd0ac58ba1017108b3475bf391303bd2eb84c343de69473bdaf829a6f302504f631f133198c09aa42e2f679fa85794bd134f7a459053737fe5b653cfc50e9
-
Filesize
292KB
MD5aa1471d97ca29e7fb4ca19dd5c218443
SHA113329c7580a4e493d8b82a40a1d7142aac40c76a
SHA256ed4b0120eeaed5f32668fc3f5ceebed8b6dac020c33e21699dd91e78313abab4
SHA512aa8e77c5b2f2dd7e15aa1b7cf212ab16c6f024e55f5bdff3dad19d8850eadd9a86b713d4a36134493982a69fabff41dbe25f2cf68ca1829fe245f71a5f3aa805
-
Filesize
292KB
MD5aa1471d97ca29e7fb4ca19dd5c218443
SHA113329c7580a4e493d8b82a40a1d7142aac40c76a
SHA256ed4b0120eeaed5f32668fc3f5ceebed8b6dac020c33e21699dd91e78313abab4
SHA512aa8e77c5b2f2dd7e15aa1b7cf212ab16c6f024e55f5bdff3dad19d8850eadd9a86b713d4a36134493982a69fabff41dbe25f2cf68ca1829fe245f71a5f3aa805
-
Filesize
350KB
MD517ed23da1d5d1c8ccd1b59c183e599b3
SHA177423416f9ed5ad2f93ca92107e98f73423084fa
SHA256c4273def4cd92fd28dbb4ca5739be2eadb66c94e7d447dd71d70564c71c8bfe4
SHA512bd1c09082cbd16bd9685364177e56d0eb754d4bcc2ecdfe30587594fccd478f247cedd7cc7508ebe16441938b29f72ed5f3aaa182143ead326027fc46c042df3
-
Filesize
350KB
MD517ed23da1d5d1c8ccd1b59c183e599b3
SHA177423416f9ed5ad2f93ca92107e98f73423084fa
SHA256c4273def4cd92fd28dbb4ca5739be2eadb66c94e7d447dd71d70564c71c8bfe4
SHA512bd1c09082cbd16bd9685364177e56d0eb754d4bcc2ecdfe30587594fccd478f247cedd7cc7508ebe16441938b29f72ed5f3aaa182143ead326027fc46c042df3