Analysis
-
max time kernel
68s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 12:24
Static task
static1
Behavioral task
behavioral1
Sample
f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe
Resource
win10-20230220-en
General
-
Target
f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe
-
Size
687KB
-
MD5
a2ab38f4605d255a20041b5faec7117e
-
SHA1
d7081177a288ed81fd6d2b86e3450a343b63694d
-
SHA256
f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5
-
SHA512
5ca776358fe57f3fe5d199d72b7c3725376124c0bebd11b67485be9ad2f5b794eef183410ae20acf620cbc58811000a01a4845796cb64dc557200dbeec29ccb4
-
SSDEEP
12288:EMrOy90IagEL1XKhxOJYoI+KZ0a80bgxaIy7:yyqL1XKhxOJYo0+a8I2BK
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7095.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2540-180-0x0000000004C20000-0x0000000004C66000-memory.dmp family_redline behavioral1/memory/2540-181-0x00000000051B0000-0x00000000051F4000-memory.dmp family_redline behavioral1/memory/2540-182-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-183-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-185-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-187-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-191-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-195-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-197-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-199-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-201-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-203-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-205-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-207-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-209-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-211-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-213-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-215-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-217-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline behavioral1/memory/2540-219-0x00000000051B0000-0x00000000051EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2272 un165951.exe 2624 pro7095.exe 2540 qu2058.exe 3736 si410725.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7095.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un165951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un165951.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2624 pro7095.exe 2624 pro7095.exe 2540 qu2058.exe 2540 qu2058.exe 3736 si410725.exe 3736 si410725.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2624 pro7095.exe Token: SeDebugPrivilege 2540 qu2058.exe Token: SeDebugPrivilege 3736 si410725.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2272 1560 f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe 66 PID 1560 wrote to memory of 2272 1560 f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe 66 PID 1560 wrote to memory of 2272 1560 f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe 66 PID 2272 wrote to memory of 2624 2272 un165951.exe 67 PID 2272 wrote to memory of 2624 2272 un165951.exe 67 PID 2272 wrote to memory of 2624 2272 un165951.exe 67 PID 2272 wrote to memory of 2540 2272 un165951.exe 68 PID 2272 wrote to memory of 2540 2272 un165951.exe 68 PID 2272 wrote to memory of 2540 2272 un165951.exe 68 PID 1560 wrote to memory of 3736 1560 f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe 70 PID 1560 wrote to memory of 3736 1560 f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe 70 PID 1560 wrote to memory of 3736 1560 f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe"C:\Users\Admin\AppData\Local\Temp\f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165951.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7095.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2058.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2058.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410725.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410725.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e4626d75594951a61300a5791ba4b3f6
SHA1ad4ed854ba801a3a47db2186c719e526ddaf3ef4
SHA256d730088a46e6cf19b1ae4c267422fd1c6a131641d0731153d75390a3f2276911
SHA512bf8881d8a11cef1d0361a4edb08302cdcc0be76fc8d4ecf26cfadcfac4cfcf146cddae93476b7d3a2712a1d79435480ceb36cc56d31c393d48239030d6de61bd
-
Filesize
175KB
MD5e4626d75594951a61300a5791ba4b3f6
SHA1ad4ed854ba801a3a47db2186c719e526ddaf3ef4
SHA256d730088a46e6cf19b1ae4c267422fd1c6a131641d0731153d75390a3f2276911
SHA512bf8881d8a11cef1d0361a4edb08302cdcc0be76fc8d4ecf26cfadcfac4cfcf146cddae93476b7d3a2712a1d79435480ceb36cc56d31c393d48239030d6de61bd
-
Filesize
545KB
MD53455529c98efd5280939fb15aab61b86
SHA18b62d13db657f31f86e0c5260ad0a5a508c69201
SHA256d1fcd8a6159af8add2ba41ee277577371b6e44a8e38f91e9a47ef89ec0d23fbc
SHA512241d78121b4cdf7fcfd5b484393b032a8ee1c6d50d81b17fc1d6a925c1e1aedd6757baf48a97507c284f9bf864e59f575d118b483a7f9a09f59dfdf05e3528e3
-
Filesize
545KB
MD53455529c98efd5280939fb15aab61b86
SHA18b62d13db657f31f86e0c5260ad0a5a508c69201
SHA256d1fcd8a6159af8add2ba41ee277577371b6e44a8e38f91e9a47ef89ec0d23fbc
SHA512241d78121b4cdf7fcfd5b484393b032a8ee1c6d50d81b17fc1d6a925c1e1aedd6757baf48a97507c284f9bf864e59f575d118b483a7f9a09f59dfdf05e3528e3
-
Filesize
300KB
MD57c88e609d3b2ff9a0dab3a7df18d0b4f
SHA198ee7f83b3ba49b8c4f2802c51457044ce0bef5f
SHA2560bdaff475b7cb1ae6ae9cb9efdf63b5339ae68d0e7f525fd5afc32d7c3ea03cb
SHA512d456ae23e9d2ef34a9916905ec7160a54754b1d3984f8d647232e88c37bab7d92afd94f9d44fb7ff39b57892156710cf9caa210b02750a63a98f79cae39686b8
-
Filesize
300KB
MD57c88e609d3b2ff9a0dab3a7df18d0b4f
SHA198ee7f83b3ba49b8c4f2802c51457044ce0bef5f
SHA2560bdaff475b7cb1ae6ae9cb9efdf63b5339ae68d0e7f525fd5afc32d7c3ea03cb
SHA512d456ae23e9d2ef34a9916905ec7160a54754b1d3984f8d647232e88c37bab7d92afd94f9d44fb7ff39b57892156710cf9caa210b02750a63a98f79cae39686b8
-
Filesize
359KB
MD59151fa81d2d47cb87244be30feef015c
SHA1f4117bd5bca74faa1deaef3dcbff4d8ce8ac6298
SHA256cd2756de60cddf717c54958890588c982078b1afa92b58e02d0c250448ea4347
SHA5125b1d81b8bba6bdd84be9d4046cad9ec1845f1682930c0ed2d267e0b0f1a2b952890fe76b45fe5ea1081ab8ea31e07f8a2a8f28fa4a0a2d1973fd21a8b3c84df4
-
Filesize
359KB
MD59151fa81d2d47cb87244be30feef015c
SHA1f4117bd5bca74faa1deaef3dcbff4d8ce8ac6298
SHA256cd2756de60cddf717c54958890588c982078b1afa92b58e02d0c250448ea4347
SHA5125b1d81b8bba6bdd84be9d4046cad9ec1845f1682930c0ed2d267e0b0f1a2b952890fe76b45fe5ea1081ab8ea31e07f8a2a8f28fa4a0a2d1973fd21a8b3c84df4