Analysis
-
max time kernel
136s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:13
Static task
static1
Behavioral task
behavioral1
Sample
5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe
Resource
win10v2004-20230220-en
General
-
Target
5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe
-
Size
687KB
-
MD5
c6ec905ba1c71b977a22c3025e0842a2
-
SHA1
a71d870264009e8edba6e7f18b19c25c8e45ec72
-
SHA256
5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5
-
SHA512
895f297cb9d3ae8194b5480e9c43467414921ce73bd115e978512393e4df195a55ae681bd3e7b14e21c1d3f1c83b70fe8cb887703d3f26fad56a9b8b63f63b0c
-
SSDEEP
12288:hMrIy90KLv3e45mclNVtUmjO02m2bkc1YUxjIHh/1mzZpb4zMtQT0z:xyz3vrLVtLjO02m8kcU1k/beOQTe
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3084.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3084.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4404-188-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-189-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-192-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-196-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-215-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-217-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-219-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-223-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4404-225-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2940 un792463.exe 1308 pro3084.exe 4404 qu5630.exe 528 si428465.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3084.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un792463.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un792463.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3964 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3484 1308 WerFault.exe 85 4180 4404 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1308 pro3084.exe 1308 pro3084.exe 4404 qu5630.exe 4404 qu5630.exe 528 si428465.exe 528 si428465.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1308 pro3084.exe Token: SeDebugPrivilege 4404 qu5630.exe Token: SeDebugPrivilege 528 si428465.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5036 wrote to memory of 2940 5036 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe 84 PID 5036 wrote to memory of 2940 5036 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe 84 PID 5036 wrote to memory of 2940 5036 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe 84 PID 2940 wrote to memory of 1308 2940 un792463.exe 85 PID 2940 wrote to memory of 1308 2940 un792463.exe 85 PID 2940 wrote to memory of 1308 2940 un792463.exe 85 PID 2940 wrote to memory of 4404 2940 un792463.exe 92 PID 2940 wrote to memory of 4404 2940 un792463.exe 92 PID 2940 wrote to memory of 4404 2940 un792463.exe 92 PID 5036 wrote to memory of 528 5036 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe 96 PID 5036 wrote to memory of 528 5036 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe 96 PID 5036 wrote to memory of 528 5036 5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe"C:\Users\Admin\AppData\Local\Temp\5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792463.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792463.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3084.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 10844⤵
- Program crash
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 13364⤵
- Program crash
PID:4180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428465.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1308 -ip 13081⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4404 -ip 44041⤵PID:5112
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54f383965057d913fa85fe1ed6bee59b1
SHA114a7b43713cd9e25b266cb167ddc696114562358
SHA25634e4aaaed06ff40aa87e0c0bb3e447a0912d44fee9f73a30837bf18068f23d58
SHA5126f6203c4cd29d659164b6a999f57b0abea0707de59d2b61bcde9055d5e37ac4e9ea15a2edade3079c7d7a04540110cbd98d889e734cd53d0df4325699f82847d
-
Filesize
175KB
MD54f383965057d913fa85fe1ed6bee59b1
SHA114a7b43713cd9e25b266cb167ddc696114562358
SHA25634e4aaaed06ff40aa87e0c0bb3e447a0912d44fee9f73a30837bf18068f23d58
SHA5126f6203c4cd29d659164b6a999f57b0abea0707de59d2b61bcde9055d5e37ac4e9ea15a2edade3079c7d7a04540110cbd98d889e734cd53d0df4325699f82847d
-
Filesize
545KB
MD51331f7933741c53c66a3af5257dda1a2
SHA1eeab97f5d12848d08c28154c94fd6e80ba0f9ab4
SHA256e26e8686690facd86b274bfceb701f064b19152efdba9a8ebb18f8d7aa9785c5
SHA512989e567ee75f780e7fdd996250317928a1d69b8125922e1d5dfb7d0c08615ec8af4bfce281bdc0fe2fc45c067d8a82eb5c098e74c2b60e395026e9d320a196fe
-
Filesize
545KB
MD51331f7933741c53c66a3af5257dda1a2
SHA1eeab97f5d12848d08c28154c94fd6e80ba0f9ab4
SHA256e26e8686690facd86b274bfceb701f064b19152efdba9a8ebb18f8d7aa9785c5
SHA512989e567ee75f780e7fdd996250317928a1d69b8125922e1d5dfb7d0c08615ec8af4bfce281bdc0fe2fc45c067d8a82eb5c098e74c2b60e395026e9d320a196fe
-
Filesize
300KB
MD5d9e4391f970fa8a9293833a94956feaf
SHA1953cd0c39d84b0ae9c2a88153d9b374621396f35
SHA256183b66e6052acdbf565eef355c792c9c86f8cad428f6a545ef2f63cdb369622c
SHA5124064a2a39aa00d5ec268a996250c7c34efbc840f457e053c445c10ba7bcf85df440609427d641f1fc67772bbb268e8b66e8e46c7b3f01501fc72db072de9620e
-
Filesize
300KB
MD5d9e4391f970fa8a9293833a94956feaf
SHA1953cd0c39d84b0ae9c2a88153d9b374621396f35
SHA256183b66e6052acdbf565eef355c792c9c86f8cad428f6a545ef2f63cdb369622c
SHA5124064a2a39aa00d5ec268a996250c7c34efbc840f457e053c445c10ba7bcf85df440609427d641f1fc67772bbb268e8b66e8e46c7b3f01501fc72db072de9620e
-
Filesize
359KB
MD541912b623250263dab61236307e8acd1
SHA1808b288533c185b5a68f4b9340b36dbc85d28310
SHA256d44f5a596635d73456e1812c9ffdd518d7b562736bbc1087fca073f9e53b5106
SHA51287325d19a96a3b80decec6584ff37638187465c15cf5ca8c16a42a420d925ef532941a3fc276b545d80069ea5b84284e1f366818828467bdff08a6eda55ab2b5
-
Filesize
359KB
MD541912b623250263dab61236307e8acd1
SHA1808b288533c185b5a68f4b9340b36dbc85d28310
SHA256d44f5a596635d73456e1812c9ffdd518d7b562736bbc1087fca073f9e53b5106
SHA51287325d19a96a3b80decec6584ff37638187465c15cf5ca8c16a42a420d925ef532941a3fc276b545d80069ea5b84284e1f366818828467bdff08a6eda55ab2b5