Analysis
-
max time kernel
50s -
max time network
52s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 12:27
Static task
static1
Behavioral task
behavioral1
Sample
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe
Resource
win10-20230220-en
General
-
Target
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe
-
Size
688KB
-
MD5
d192f85a46e868ddc7a01f7798eb77c3
-
SHA1
c179e853894bde484e1b58f1af817619f77abb3f
-
SHA256
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329
-
SHA512
cd76271c6fcece6f6b7c01e7aeea9582d1cdbf89501fe1e7395f79ff7582649410a77039ffffb406f0aac4f51be46d56fa7acef088b09f6c3fd043d936c1eebd
-
SSDEEP
12288:CMriy90Nq73BU3QrQXrH7faGH1EAh0VReCGcgSSke2MZ0I6JGzaNIfwyY:Uym8cXXfPH1Es0VdXs7t+I6czsh
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4748-179-0x0000000002370000-0x00000000023B6000-memory.dmp family_redline behavioral1/memory/4748-180-0x0000000002520000-0x0000000002564000-memory.dmp family_redline behavioral1/memory/4748-181-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-182-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-184-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-186-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-188-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-190-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-192-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-194-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-196-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-198-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-200-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-202-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-204-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-206-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-208-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-210-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-212-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/4748-214-0x0000000002520000-0x000000000255E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4212 un599678.exe 4216 pro9948.exe 4748 qu5394.exe 3448 si859013.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9948.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un599678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un599678.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4216 pro9948.exe 4216 pro9948.exe 4748 qu5394.exe 4748 qu5394.exe 3448 si859013.exe 3448 si859013.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4216 pro9948.exe Token: SeDebugPrivilege 4748 qu5394.exe Token: SeDebugPrivilege 3448 si859013.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4212 4032 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe 66 PID 4032 wrote to memory of 4212 4032 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe 66 PID 4032 wrote to memory of 4212 4032 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe 66 PID 4212 wrote to memory of 4216 4212 un599678.exe 67 PID 4212 wrote to memory of 4216 4212 un599678.exe 67 PID 4212 wrote to memory of 4216 4212 un599678.exe 67 PID 4212 wrote to memory of 4748 4212 un599678.exe 68 PID 4212 wrote to memory of 4748 4212 un599678.exe 68 PID 4212 wrote to memory of 4748 4212 un599678.exe 68 PID 4032 wrote to memory of 3448 4032 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe 70 PID 4032 wrote to memory of 3448 4032 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe 70 PID 4032 wrote to memory of 3448 4032 302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe"C:\Users\Admin\AppData\Local\Temp\302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599678.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9948.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9948.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5394.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859013.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD559864b76cac82a98cb1ed5d58fec36e1
SHA1f43bf1ca7fa184ce1b1e8692ccec9db1fa0ad1dc
SHA256d9341f485ab4fe7a31ecfaa66b95034a847ce5e263ce00aaf6eb1f626ad6ee82
SHA5125fc766f0cf53dc48b6359690e0af038974d8a4480fb7218f956053c451c4d7881367b62e373a616f2fa5ca093f03475f9bcefc31149d77c3bee5fc04d264ac20
-
Filesize
175KB
MD559864b76cac82a98cb1ed5d58fec36e1
SHA1f43bf1ca7fa184ce1b1e8692ccec9db1fa0ad1dc
SHA256d9341f485ab4fe7a31ecfaa66b95034a847ce5e263ce00aaf6eb1f626ad6ee82
SHA5125fc766f0cf53dc48b6359690e0af038974d8a4480fb7218f956053c451c4d7881367b62e373a616f2fa5ca093f03475f9bcefc31149d77c3bee5fc04d264ac20
-
Filesize
545KB
MD5d1c7e22e8c70f0ba3db51478c535184f
SHA125e132c91fa5306ab04794dff1e35ed161adf183
SHA256cb066b0eb11cbf43c732fdafbe9d5ae89de1f3eec78049ffbb90538cf8094dd6
SHA51262b8adcd8fed68ab02d0d2a6ea3ae4be664e2703a26911a374d8799cf7815fc657a9aa527c8e91311df64d689c373acdb8099665e7833717ac48cb3df4036060
-
Filesize
545KB
MD5d1c7e22e8c70f0ba3db51478c535184f
SHA125e132c91fa5306ab04794dff1e35ed161adf183
SHA256cb066b0eb11cbf43c732fdafbe9d5ae89de1f3eec78049ffbb90538cf8094dd6
SHA51262b8adcd8fed68ab02d0d2a6ea3ae4be664e2703a26911a374d8799cf7815fc657a9aa527c8e91311df64d689c373acdb8099665e7833717ac48cb3df4036060
-
Filesize
300KB
MD54603c532c02695ae56109c4aaf4c6a9f
SHA1adc9421b5394adee1c9e4d5bca323e5c423ef517
SHA2565e7aca5542dcc8aa7b0738d582e53963e9ffca1453d2ca4bc59b9dd7cecf11e4
SHA5128d7f5908706af70d6f4f1ae2451166cfcfd3be7873d88d211c522421c2bf0ae892c03db143a9f619f9047336a1439953e183ac6f0521138c448f1aa707ddac08
-
Filesize
300KB
MD54603c532c02695ae56109c4aaf4c6a9f
SHA1adc9421b5394adee1c9e4d5bca323e5c423ef517
SHA2565e7aca5542dcc8aa7b0738d582e53963e9ffca1453d2ca4bc59b9dd7cecf11e4
SHA5128d7f5908706af70d6f4f1ae2451166cfcfd3be7873d88d211c522421c2bf0ae892c03db143a9f619f9047336a1439953e183ac6f0521138c448f1aa707ddac08
-
Filesize
359KB
MD58afce580adbffae93476349953ea1c8e
SHA14cf8bca77b3ce478bfec483ead86d7a472a27361
SHA256a3d2a2280394a30c1d2d1f97626980e7a204ad7e423e8567906ff42ca9a1fd44
SHA51296653cd2cb6cab76d38d123fc7d9027fe667ca90762a698685118dc9bf6fae0ca07ef3350e6f9d5aa9e99152a3c7a75f98bc7922f4a36500e7a440ca2c7e9168
-
Filesize
359KB
MD58afce580adbffae93476349953ea1c8e
SHA14cf8bca77b3ce478bfec483ead86d7a472a27361
SHA256a3d2a2280394a30c1d2d1f97626980e7a204ad7e423e8567906ff42ca9a1fd44
SHA51296653cd2cb6cab76d38d123fc7d9027fe667ca90762a698685118dc9bf6fae0ca07ef3350e6f9d5aa9e99152a3c7a75f98bc7922f4a36500e7a440ca2c7e9168