Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:10
Static task
static1
Behavioral task
behavioral1
Sample
60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe
Resource
win10v2004-20230220-en
General
-
Target
60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe
-
Size
686KB
-
MD5
f9c1d31447ab86ccee167fed18f59f47
-
SHA1
6fc3e641453ef21be6b1b45eaa5637b5eb650022
-
SHA256
60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef
-
SHA512
61d6fe77ffda97e307c626e13137a6c1f886ca75db102bca399897b319e0c0b7680de136f59324f1ee4417101e244e77e7148f653567120cc7ea6d262eff9107
-
SSDEEP
12288:/Mr3y90DJOVNaqQgKScO8VSJpYTWGlq8SV7FC3ZIE5Xe+1diij:wyoJOVNaxgTcOGaKTWWqZGZp1di0
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3989.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3989.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1976-191-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-192-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-194-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-196-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-198-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-200-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-202-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-204-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-206-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-208-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-210-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-212-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-214-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-216-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-218-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-220-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-222-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/1976-224-0x0000000002630000-0x000000000266E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4964 un280087.exe 1936 pro3989.exe 1976 qu0070.exe 2416 si890732.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3989.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un280087.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un280087.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 724 1936 WerFault.exe 85 3336 1976 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1936 pro3989.exe 1936 pro3989.exe 1976 qu0070.exe 1976 qu0070.exe 2416 si890732.exe 2416 si890732.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1936 pro3989.exe Token: SeDebugPrivilege 1976 qu0070.exe Token: SeDebugPrivilege 2416 si890732.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4964 4936 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe 84 PID 4936 wrote to memory of 4964 4936 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe 84 PID 4936 wrote to memory of 4964 4936 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe 84 PID 4964 wrote to memory of 1936 4964 un280087.exe 85 PID 4964 wrote to memory of 1936 4964 un280087.exe 85 PID 4964 wrote to memory of 1936 4964 un280087.exe 85 PID 4964 wrote to memory of 1976 4964 un280087.exe 94 PID 4964 wrote to memory of 1976 4964 un280087.exe 94 PID 4964 wrote to memory of 1976 4964 un280087.exe 94 PID 4936 wrote to memory of 2416 4936 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe 98 PID 4936 wrote to memory of 2416 4936 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe 98 PID 4936 wrote to memory of 2416 4936 60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe"C:\Users\Admin\AppData\Local\Temp\60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280087.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280087.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3989.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3989.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 10804⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0070.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 14764⤵
- Program crash
PID:3336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si890732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si890732.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1936 -ip 19361⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1976 -ip 19761⤵PID:3220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53a06bde945f200e7d5b877f3bf89e0f6
SHA173cd7ea05f0fd6eb72b79d9eabf4cc8dbf513b8b
SHA256aa11770acb511e387b80808a4a750fb0e9278cf5b99aca845cd16f4245863eed
SHA512b1e0dae8f5067bf36b2b2bc390c3c755b14112dad6a69b3e78c8f17c4103f0995813866527a99d2c18a49c7ff65d0c9fa235012f6241407bbaedd9ec470c04f8
-
Filesize
175KB
MD53a06bde945f200e7d5b877f3bf89e0f6
SHA173cd7ea05f0fd6eb72b79d9eabf4cc8dbf513b8b
SHA256aa11770acb511e387b80808a4a750fb0e9278cf5b99aca845cd16f4245863eed
SHA512b1e0dae8f5067bf36b2b2bc390c3c755b14112dad6a69b3e78c8f17c4103f0995813866527a99d2c18a49c7ff65d0c9fa235012f6241407bbaedd9ec470c04f8
-
Filesize
545KB
MD586ab47acae5e7a4365d0895884d1e5e4
SHA17dece10f74bf9bb62b2a810ad3084086f5e1aafb
SHA256a4933a5e61fcd9bfeefa6cf91b9efcc1f66631ba3c7d692b0e1399f2dd9c18cc
SHA51279b0bb2b63ac7238d830410f62c8771ef1f2682fcb07aeb4ac3ec949c89ede5c170347ef50aac25f76a9161683db5993c4e8d37542494305606186677d4d5f49
-
Filesize
545KB
MD586ab47acae5e7a4365d0895884d1e5e4
SHA17dece10f74bf9bb62b2a810ad3084086f5e1aafb
SHA256a4933a5e61fcd9bfeefa6cf91b9efcc1f66631ba3c7d692b0e1399f2dd9c18cc
SHA51279b0bb2b63ac7238d830410f62c8771ef1f2682fcb07aeb4ac3ec949c89ede5c170347ef50aac25f76a9161683db5993c4e8d37542494305606186677d4d5f49
-
Filesize
300KB
MD53f38f584378fc80b43ace82694cb153f
SHA16c4b94872c4b0172a0c3d15c76de977c59d767b4
SHA2567d21c338443cdc2f13b9bf0fc1554b83d92a254779171384237017b1298a78ec
SHA5124d6240991c87442216bba73c425dbb787bcebd93b9e6657973e552a5f89dc6ee15a3734349c5b3780af70e402d5ec91a7c5ce89a69b6428ea50a1899da1688a8
-
Filesize
300KB
MD53f38f584378fc80b43ace82694cb153f
SHA16c4b94872c4b0172a0c3d15c76de977c59d767b4
SHA2567d21c338443cdc2f13b9bf0fc1554b83d92a254779171384237017b1298a78ec
SHA5124d6240991c87442216bba73c425dbb787bcebd93b9e6657973e552a5f89dc6ee15a3734349c5b3780af70e402d5ec91a7c5ce89a69b6428ea50a1899da1688a8
-
Filesize
359KB
MD58b546194a8249fb52348cbc9fb6c64a6
SHA1e629eeb1d811a64f44110fd58376c8c8e8452af0
SHA256a1d4083a15e584bdda9bfe385f38491ea8072104d7a3c0ea7c9b23df77bbc2ae
SHA51251902b9b3327489d329cacb74874cbc50b589a50de0cb84afb459ef84ca31124be463ec14a44a80904d1f807e550f4f53423b505ca8611d0946f0d3432983020
-
Filesize
359KB
MD58b546194a8249fb52348cbc9fb6c64a6
SHA1e629eeb1d811a64f44110fd58376c8c8e8452af0
SHA256a1d4083a15e584bdda9bfe385f38491ea8072104d7a3c0ea7c9b23df77bbc2ae
SHA51251902b9b3327489d329cacb74874cbc50b589a50de0cb84afb459ef84ca31124be463ec14a44a80904d1f807e550f4f53423b505ca8611d0946f0d3432983020