Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:28
Static task
static1
Behavioral task
behavioral1
Sample
94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe
Resource
win10v2004-20230220-en
General
-
Target
94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe
-
Size
687KB
-
MD5
6ace5f9b72dced3598c854dea66ee7b6
-
SHA1
527adaa84041070f13d33282914d3cf42ab079a2
-
SHA256
94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc
-
SHA512
9f2d322f37be06828539f8cd0225b11302e23898d480049184f67c623b91717227b4162b04eb6e2f27030ee6a50ac484ee833c021bbd174b163d4908a08756c0
-
SSDEEP
12288:RMrgy90cjm/iah81kRlosdnIPjNLjCeA+u4Z0oC7NwWHpjBU:NyQ/skRl/nSpjLt+oC7HBU
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5276.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5276.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4504-190-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-191-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-193-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-195-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-197-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-199-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-201-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-203-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-205-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-207-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-209-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-211-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-213-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-215-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-217-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-219-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-221-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-223-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4504-381-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline behavioral1/memory/4504-384-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4964 un124284.exe 4320 pro5276.exe 4504 qu5451.exe 5012 si509679.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5276.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5276.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un124284.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un124284.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 800 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3468 4320 WerFault.exe 85 4840 4504 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4320 pro5276.exe 4320 pro5276.exe 4504 qu5451.exe 4504 qu5451.exe 5012 si509679.exe 5012 si509679.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4320 pro5276.exe Token: SeDebugPrivilege 4504 qu5451.exe Token: SeDebugPrivilege 5012 si509679.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4964 1832 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe 84 PID 1832 wrote to memory of 4964 1832 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe 84 PID 1832 wrote to memory of 4964 1832 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe 84 PID 4964 wrote to memory of 4320 4964 un124284.exe 85 PID 4964 wrote to memory of 4320 4964 un124284.exe 85 PID 4964 wrote to memory of 4320 4964 un124284.exe 85 PID 4964 wrote to memory of 4504 4964 un124284.exe 91 PID 4964 wrote to memory of 4504 4964 un124284.exe 91 PID 4964 wrote to memory of 4504 4964 un124284.exe 91 PID 1832 wrote to memory of 5012 1832 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe 95 PID 1832 wrote to memory of 5012 1832 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe 95 PID 1832 wrote to memory of 5012 1832 94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe"C:\Users\Admin\AppData\Local\Temp\94a47c6c53cf5cc356d3bcd27f02d2592f464341775f424da501986ae2e8b1cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un124284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un124284.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5276.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5276.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 10844⤵
- Program crash
PID:3468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5451.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 13284⤵
- Program crash
PID:4840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si509679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si509679.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4320 -ip 43201⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4504 -ip 45041⤵PID:3596
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51967a110f04db8e70377352d6848d636
SHA115f9df3a1354ee202657cb4d04398762fb0a97ee
SHA256a3abaffbd223c553252fea7fd491d62cf09643c3a014d67fb9322b5839b62a9b
SHA51297739ca480d4f0584fb82351b396529a0fbbd6f9dd9235902ba20abc9acf106082b6dcb9f5b926c42b19edf3d4c8a62e243fa4fffa5a82e5fbb5c6d392eb77fa
-
Filesize
175KB
MD51967a110f04db8e70377352d6848d636
SHA115f9df3a1354ee202657cb4d04398762fb0a97ee
SHA256a3abaffbd223c553252fea7fd491d62cf09643c3a014d67fb9322b5839b62a9b
SHA51297739ca480d4f0584fb82351b396529a0fbbd6f9dd9235902ba20abc9acf106082b6dcb9f5b926c42b19edf3d4c8a62e243fa4fffa5a82e5fbb5c6d392eb77fa
-
Filesize
545KB
MD5adb400671be6b885a822adde36983c24
SHA1e90d9faddd176d0e7cfce35b6ac4d863c9836fc6
SHA2568a698533226dab0eda761609651b0ec2a9433f703d5c695d206ddd0c39c9bce0
SHA512a3fc1f35da35912780507957d654a5a4d5faf24f80b1ccd141ddef9b4a5efff86f36645f5e5a9b9f277c51867b47aaf2d4bd32acef5d9be4fa7d848da0e9bb0d
-
Filesize
545KB
MD5adb400671be6b885a822adde36983c24
SHA1e90d9faddd176d0e7cfce35b6ac4d863c9836fc6
SHA2568a698533226dab0eda761609651b0ec2a9433f703d5c695d206ddd0c39c9bce0
SHA512a3fc1f35da35912780507957d654a5a4d5faf24f80b1ccd141ddef9b4a5efff86f36645f5e5a9b9f277c51867b47aaf2d4bd32acef5d9be4fa7d848da0e9bb0d
-
Filesize
300KB
MD53903a991f65cc18179ed5acacf1a5efd
SHA1379ce24cfdb4e8a955e42667c63b00c5219c9005
SHA256c1c3c97a0555cb1a42ca6b294d87465755c06147b901e4863944079327690760
SHA512079d80aefa44f02bcc3f0f8b6c3f82783c9ef8f5a0a09422c736dc3608031a04fa0c8a74bdaf25e53a86f0443626a659b0981cc8ffc5e8a15168ad0126008981
-
Filesize
300KB
MD53903a991f65cc18179ed5acacf1a5efd
SHA1379ce24cfdb4e8a955e42667c63b00c5219c9005
SHA256c1c3c97a0555cb1a42ca6b294d87465755c06147b901e4863944079327690760
SHA512079d80aefa44f02bcc3f0f8b6c3f82783c9ef8f5a0a09422c736dc3608031a04fa0c8a74bdaf25e53a86f0443626a659b0981cc8ffc5e8a15168ad0126008981
-
Filesize
359KB
MD59ac7ef5e67d94f885e0e4d3896a31bc6
SHA1c087f283df0016e19a538cd58115323247b30073
SHA256a657481a45d9467ccac67ecf929ba8e34a25bcaeaa8472b4291e39a5f4ba41c8
SHA512d4a2014720b8c6b240d2c27a4630a1d41153cc3fcada771a60397cf9117519794fd4b5b8d78079b075f165df460fdc5c0bb42fc9dde35d4998e9b6b053c8ae25
-
Filesize
359KB
MD59ac7ef5e67d94f885e0e4d3896a31bc6
SHA1c087f283df0016e19a538cd58115323247b30073
SHA256a657481a45d9467ccac67ecf929ba8e34a25bcaeaa8472b4291e39a5f4ba41c8
SHA512d4a2014720b8c6b240d2c27a4630a1d41153cc3fcada771a60397cf9117519794fd4b5b8d78079b075f165df460fdc5c0bb42fc9dde35d4998e9b6b053c8ae25