Analysis
-
max time kernel
87s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 12:16
Static task
static1
Behavioral task
behavioral1
Sample
b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe
Resource
win10-20230220-en
General
-
Target
b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe
-
Size
686KB
-
MD5
f7c0c65882bc4882472f910a9a868f7d
-
SHA1
60e9855e71230733192c6a0692405431fdc56000
-
SHA256
b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2
-
SHA512
9c8d7d0915f24606aae580b4c7b9c2145ec54adbb744b66c4aa6206ca3126682522b3da5520287cad03cecb8da46a1ca3dfb6a66233a5c4ee6b22f417fd3a7e9
-
SSDEEP
12288:dMrBy905hN1qSFu7pCCnXA+eWqTdDcfwFtqZObxmEMqRGXQs:kyeNkRCCnQ5zo9K2B
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4257.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4724-178-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/4724-179-0x0000000002840000-0x0000000002884000-memory.dmp family_redline behavioral1/memory/4724-180-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-181-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-183-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-185-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-187-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-189-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-191-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-193-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-195-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-197-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-199-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-201-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-203-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-207-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-205-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-209-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-211-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-213-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/4724-1099-0x0000000002820000-0x0000000002830000-memory.dmp family_redline behavioral1/memory/4724-1100-0x0000000002820000-0x0000000002830000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2512 un369699.exe 3172 pro4257.exe 4724 qu8994.exe 3868 si301408.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4257.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un369699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un369699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3172 pro4257.exe 3172 pro4257.exe 4724 qu8994.exe 4724 qu8994.exe 3868 si301408.exe 3868 si301408.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3172 pro4257.exe Token: SeDebugPrivilege 4724 qu8994.exe Token: SeDebugPrivilege 3868 si301408.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2512 2456 b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe 66 PID 2456 wrote to memory of 2512 2456 b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe 66 PID 2456 wrote to memory of 2512 2456 b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe 66 PID 2512 wrote to memory of 3172 2512 un369699.exe 67 PID 2512 wrote to memory of 3172 2512 un369699.exe 67 PID 2512 wrote to memory of 3172 2512 un369699.exe 67 PID 2512 wrote to memory of 4724 2512 un369699.exe 68 PID 2512 wrote to memory of 4724 2512 un369699.exe 68 PID 2512 wrote to memory of 4724 2512 un369699.exe 68 PID 2456 wrote to memory of 3868 2456 b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe 70 PID 2456 wrote to memory of 3868 2456 b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe 70 PID 2456 wrote to memory of 3868 2456 b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe"C:\Users\Admin\AppData\Local\Temp\b1b211f15932778da3d44e00936a2a55c87f0ed7f6444dc2a3cee3e6f84dd9a2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4257.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8994.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si301408.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si301408.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f0cfe533c766893c50a7b5ea74711511
SHA1c9bc7a745dd2cc14a721f23ad76215458a269fc8
SHA256169c017e4f8eefdff10e99dd801cec27172b7ae05d13e94b669986e56f29de3f
SHA5124d10a7d05ac0381a232a0383e5f0de4f048b0297db52ea36fa8a055abc5653649b0d62fb3eb9bc04466bd6f7cea04595288bf31fbfc55329b64907217b774fbc
-
Filesize
175KB
MD5f0cfe533c766893c50a7b5ea74711511
SHA1c9bc7a745dd2cc14a721f23ad76215458a269fc8
SHA256169c017e4f8eefdff10e99dd801cec27172b7ae05d13e94b669986e56f29de3f
SHA5124d10a7d05ac0381a232a0383e5f0de4f048b0297db52ea36fa8a055abc5653649b0d62fb3eb9bc04466bd6f7cea04595288bf31fbfc55329b64907217b774fbc
-
Filesize
545KB
MD57e1c04e7b892745c74621e2f413f6b75
SHA174cc442b1cd3fe7bfa3359b422a683440c87220c
SHA256a7fcc63aff73bb45284ad628386fb8322aaa37e7c9611f0318a1001c6c966211
SHA5128a622e4c2ab5a1972167ef558feb66b69d603c2cfbe69ebdadbd7854d2853a4693e104edbf7e683cb37d91ab0288b92a3a1b16f896ef2c1b2b8c19fae0ab68df
-
Filesize
545KB
MD57e1c04e7b892745c74621e2f413f6b75
SHA174cc442b1cd3fe7bfa3359b422a683440c87220c
SHA256a7fcc63aff73bb45284ad628386fb8322aaa37e7c9611f0318a1001c6c966211
SHA5128a622e4c2ab5a1972167ef558feb66b69d603c2cfbe69ebdadbd7854d2853a4693e104edbf7e683cb37d91ab0288b92a3a1b16f896ef2c1b2b8c19fae0ab68df
-
Filesize
300KB
MD59468092f72e7514dc5e8da193a0a2eab
SHA14b5c8f358f817b3c2f782b58aa6f55952e728812
SHA2567807259e71b054c6f876e47643aae92e125297d3fded54253748db465ab59017
SHA512a133fd9c7d41c037e68f8e3bcd6670c5739f9a142fb0673d2a915a8d234708c55c605f047fefc26f055989aec98faf7d1979861a110c9eea24de999d451e6fac
-
Filesize
300KB
MD59468092f72e7514dc5e8da193a0a2eab
SHA14b5c8f358f817b3c2f782b58aa6f55952e728812
SHA2567807259e71b054c6f876e47643aae92e125297d3fded54253748db465ab59017
SHA512a133fd9c7d41c037e68f8e3bcd6670c5739f9a142fb0673d2a915a8d234708c55c605f047fefc26f055989aec98faf7d1979861a110c9eea24de999d451e6fac
-
Filesize
359KB
MD529ba0d5060a36a7a5211f47537bdeed3
SHA166f014bdd3c1ff5cb97a0ce8d0f652f3cfd7295e
SHA256f416c9a807d12fa742b75ba4680fcc51bbb1b9573c23604d533163696e3f92b1
SHA512559261256be849ecd67f60254b645c945d655f2c6c71bba429d07bac71799717c7c84be1e58a111577cc32bf29758cb714f0c93305438bf5eb4613d6fcb45627
-
Filesize
359KB
MD529ba0d5060a36a7a5211f47537bdeed3
SHA166f014bdd3c1ff5cb97a0ce8d0f652f3cfd7295e
SHA256f416c9a807d12fa742b75ba4680fcc51bbb1b9573c23604d533163696e3f92b1
SHA512559261256be849ecd67f60254b645c945d655f2c6c71bba429d07bac71799717c7c84be1e58a111577cc32bf29758cb714f0c93305438bf5eb4613d6fcb45627