Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:22
Static task
static1
Behavioral task
behavioral1
Sample
68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe
Resource
win10v2004-20230220-en
General
-
Target
68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe
-
Size
687KB
-
MD5
01f3fbf96489d080c1be4b28cf82867e
-
SHA1
d26c07b1443e180ad973fd6cd07403fe80e4c7fc
-
SHA256
68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9
-
SHA512
165c60e013ab54de4ddcbc30a1caf0ccd70417d0c29ba9138c1d2c585e56c801e5af1b1d19b9434473fbcd0957f45d4cbaa6842991d2b237373250cad9186a9d
-
SSDEEP
12288:1MrWy90ibBOwoOYdVMkZZLk+t8o+b5JioJ00m0DZQAWFGQZ0lwcMqNO0:Xy5OOYdzZZjA7z0wZQv+lwo
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1643.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1643.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2352-191-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-192-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-194-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-196-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-198-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-200-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-202-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-204-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-206-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-208-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-210-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-212-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-214-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-216-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-218-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-220-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-222-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-224-0x0000000002970000-0x00000000029AE000-memory.dmp family_redline behavioral1/memory/2352-427-0x00000000029D0000-0x00000000029E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4156 un259647.exe 4368 pro1643.exe 2352 qu6588.exe 3800 si050100.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1643.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un259647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un259647.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4840 4368 WerFault.exe 86 2216 2352 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4368 pro1643.exe 4368 pro1643.exe 2352 qu6588.exe 2352 qu6588.exe 3800 si050100.exe 3800 si050100.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4368 pro1643.exe Token: SeDebugPrivilege 2352 qu6588.exe Token: SeDebugPrivilege 3800 si050100.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4156 1280 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe 85 PID 1280 wrote to memory of 4156 1280 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe 85 PID 1280 wrote to memory of 4156 1280 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe 85 PID 4156 wrote to memory of 4368 4156 un259647.exe 86 PID 4156 wrote to memory of 4368 4156 un259647.exe 86 PID 4156 wrote to memory of 4368 4156 un259647.exe 86 PID 4156 wrote to memory of 2352 4156 un259647.exe 92 PID 4156 wrote to memory of 2352 4156 un259647.exe 92 PID 4156 wrote to memory of 2352 4156 un259647.exe 92 PID 1280 wrote to memory of 3800 1280 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe 95 PID 1280 wrote to memory of 3800 1280 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe 95 PID 1280 wrote to memory of 3800 1280 68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe"C:\Users\Admin\AppData\Local\Temp\68d6269ccd4fbc1f24115001d9ce3623d04786a46a33c35ca13d47337807e2a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un259647.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un259647.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1643.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1643.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 10804⤵
- Program crash
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6588.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 19124⤵
- Program crash
PID:2216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si050100.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si050100.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4368 -ip 43681⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2352 -ip 23521⤵PID:4644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cd9ff65cf1843c5ba612c8361190bce3
SHA1d662115f943325a42b4018f6796b9ad0f07873e1
SHA25675979b231a7e2bde5b75c2d38380494c6669959713f06a916cc910d6353cd802
SHA512b4e530196f148e54c3feac971f1910b291deac3fdf8d4d68810579bab09c29910dfa9dd36f5e13bd8f3ee130aae03a16b92fda5a5439c190c3b8ab7610f14c29
-
Filesize
175KB
MD5cd9ff65cf1843c5ba612c8361190bce3
SHA1d662115f943325a42b4018f6796b9ad0f07873e1
SHA25675979b231a7e2bde5b75c2d38380494c6669959713f06a916cc910d6353cd802
SHA512b4e530196f148e54c3feac971f1910b291deac3fdf8d4d68810579bab09c29910dfa9dd36f5e13bd8f3ee130aae03a16b92fda5a5439c190c3b8ab7610f14c29
-
Filesize
545KB
MD5073a948ce7ac245ba3d5d8069460ec6f
SHA14ccbbed03a89f34555e8288b640bfefa08ef6ae8
SHA256b5b4681161d95cf280ab0b74b5700d185feb17d018cbf975172d9dea460b0918
SHA5121056a71c856c9470dfdb8b0d2a0485ba280fcf8c81be166c175d62fe9fc052c62228e3e9d1522061d3ac7d96046e64378d6ed29c371987eab9bad09f2638bbc3
-
Filesize
545KB
MD5073a948ce7ac245ba3d5d8069460ec6f
SHA14ccbbed03a89f34555e8288b640bfefa08ef6ae8
SHA256b5b4681161d95cf280ab0b74b5700d185feb17d018cbf975172d9dea460b0918
SHA5121056a71c856c9470dfdb8b0d2a0485ba280fcf8c81be166c175d62fe9fc052c62228e3e9d1522061d3ac7d96046e64378d6ed29c371987eab9bad09f2638bbc3
-
Filesize
300KB
MD5deb2d214f9eac14de812c4e2a62e168b
SHA107ecd1b3d339130445c239068887320a94892ea4
SHA256a3837e3bff0a8187c9e5421a0f08abcafa452e23b6f782429a69129371762d54
SHA512d16d0fa93b1a80defb22c848d5310105aa8bfeb3ba266c67943144177b2b3ba15e9ee403a0ddad3a280afeff434d649dd180cb91cf6515dee56ee7bb6a36a8a2
-
Filesize
300KB
MD5deb2d214f9eac14de812c4e2a62e168b
SHA107ecd1b3d339130445c239068887320a94892ea4
SHA256a3837e3bff0a8187c9e5421a0f08abcafa452e23b6f782429a69129371762d54
SHA512d16d0fa93b1a80defb22c848d5310105aa8bfeb3ba266c67943144177b2b3ba15e9ee403a0ddad3a280afeff434d649dd180cb91cf6515dee56ee7bb6a36a8a2
-
Filesize
359KB
MD58d8b9dd3675e3421b208d716d609b587
SHA14599f8cb218a5d4f83225f829b592dcd835d8c17
SHA2562b47643d15a22271d7f944e18f91eb415802d275733190c586c4206407db95f6
SHA5129235a818af4959f872e49227f4193ebd5c7adbb9b75538bca1fb8aab1dd776faa951cf831789f0f179df5ad056737b12e25e6576dffcefae27afbd58a4a20a58
-
Filesize
359KB
MD58d8b9dd3675e3421b208d716d609b587
SHA14599f8cb218a5d4f83225f829b592dcd835d8c17
SHA2562b47643d15a22271d7f944e18f91eb415802d275733190c586c4206407db95f6
SHA5129235a818af4959f872e49227f4193ebd5c7adbb9b75538bca1fb8aab1dd776faa951cf831789f0f179df5ad056737b12e25e6576dffcefae27afbd58a4a20a58