Analysis
-
max time kernel
55s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:34
Static task
static1
Behavioral task
behavioral1
Sample
c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe
Resource
win10v2004-20230220-en
General
-
Target
c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe
-
Size
687KB
-
MD5
ba4e76f184ec5450c400605747417364
-
SHA1
11879984df8cf2e40f6c7d0a8934045725aad551
-
SHA256
c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d
-
SHA512
5f795700e4487bda80715b86381dfab4ff8c5341938591bfba0ba49efd98ff8925b9d4398f7621390a72e8322dc42b372285ece6176b78e705757368da2fe064
-
SSDEEP
12288:kMrey90ksNOFBGGeT2lN5k/QB5y4py6L3qFMYZGGPZC8g2:qy/wOGGfCQBw4pyicbCO
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3361.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3361.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4376-188-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-189-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-191-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-193-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-195-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-197-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-199-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-201-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-203-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-205-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-207-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-209-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-211-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-213-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-215-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-217-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-219-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-221-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/4376-1109-0x0000000004F40000-0x0000000004F50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4480 un209486.exe 1636 pro3361.exe 4376 qu5328.exe 1996 si767184.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3361.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un209486.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un209486.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4716 1636 WerFault.exe 84 2800 4376 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1636 pro3361.exe 1636 pro3361.exe 4376 qu5328.exe 4376 qu5328.exe 1996 si767184.exe 1996 si767184.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1636 pro3361.exe Token: SeDebugPrivilege 4376 qu5328.exe Token: SeDebugPrivilege 1996 si767184.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4480 4228 c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe 83 PID 4228 wrote to memory of 4480 4228 c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe 83 PID 4228 wrote to memory of 4480 4228 c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe 83 PID 4480 wrote to memory of 1636 4480 un209486.exe 84 PID 4480 wrote to memory of 1636 4480 un209486.exe 84 PID 4480 wrote to memory of 1636 4480 un209486.exe 84 PID 4480 wrote to memory of 4376 4480 un209486.exe 90 PID 4480 wrote to memory of 4376 4480 un209486.exe 90 PID 4480 wrote to memory of 4376 4480 un209486.exe 90 PID 4228 wrote to memory of 1996 4228 c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe 94 PID 4228 wrote to memory of 1996 4228 c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe 94 PID 4228 wrote to memory of 1996 4228 c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe"C:\Users\Admin\AppData\Local\Temp\c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209486.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209486.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3361.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3361.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 10844⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5328.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 13484⤵
- Program crash
PID:2800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767184.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767184.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1636 -ip 16361⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4376 -ip 43761⤵PID:2536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD589e6289b81be8fdfa79dd6cb393acf11
SHA14c9a0199e22b8f30f1b4bb64a02eb1a875f58fb1
SHA25632bfdb6a4db0b37f71ed9d4ac49a50a7ee639ee62d80831f93a0260220a62e6d
SHA512e2c38db9d933b39017785542b94d040bb0c89d5fcd85adacd775446e8625417714cd552fe312c5d9c20a400bc9a0303da518b2f114cca2e80df7ba27f3af4754
-
Filesize
175KB
MD589e6289b81be8fdfa79dd6cb393acf11
SHA14c9a0199e22b8f30f1b4bb64a02eb1a875f58fb1
SHA25632bfdb6a4db0b37f71ed9d4ac49a50a7ee639ee62d80831f93a0260220a62e6d
SHA512e2c38db9d933b39017785542b94d040bb0c89d5fcd85adacd775446e8625417714cd552fe312c5d9c20a400bc9a0303da518b2f114cca2e80df7ba27f3af4754
-
Filesize
545KB
MD5e5a5b120c81efd67ad40275dd923aacc
SHA16e83f40fe04f7bef8c1b26e5eae287467aa0f207
SHA256b5a25fd2dac1bb2c565ab000f066110098703c74cb215a236358e0938df97cde
SHA512bb6b3cdd58d930dd9de6437d6f1b79685c5579da67e2cdcc484730876ade35bbc773584909cdf4181d52f02c56addbfae4500e12adf53b97b9d1e520b6048929
-
Filesize
545KB
MD5e5a5b120c81efd67ad40275dd923aacc
SHA16e83f40fe04f7bef8c1b26e5eae287467aa0f207
SHA256b5a25fd2dac1bb2c565ab000f066110098703c74cb215a236358e0938df97cde
SHA512bb6b3cdd58d930dd9de6437d6f1b79685c5579da67e2cdcc484730876ade35bbc773584909cdf4181d52f02c56addbfae4500e12adf53b97b9d1e520b6048929
-
Filesize
300KB
MD5481552279bb87b34877d2bb872652575
SHA1e02fab108f41114e38266637f709a9dfd46d6fe0
SHA256af5b204bfbbcb6f3582cf1343ed4d92047a7dca1d2da166a12f3614d53748711
SHA51245f12efa5e9aa99e18e3d2f23d66a751a482b003a590907aa2aba2e9182854d99e47b1c59920b88fcf2c4d1d0d56d0dd0fd870b38ef88f5bca01f179a5db7255
-
Filesize
300KB
MD5481552279bb87b34877d2bb872652575
SHA1e02fab108f41114e38266637f709a9dfd46d6fe0
SHA256af5b204bfbbcb6f3582cf1343ed4d92047a7dca1d2da166a12f3614d53748711
SHA51245f12efa5e9aa99e18e3d2f23d66a751a482b003a590907aa2aba2e9182854d99e47b1c59920b88fcf2c4d1d0d56d0dd0fd870b38ef88f5bca01f179a5db7255
-
Filesize
359KB
MD5db36c6abf78b3c48ce735f45d7e4b0ea
SHA107da7080233eb1cb31ec71f6a76873cb99643d6f
SHA2561382a61ecb63a1ccfe5dfdbb4ff49c02689247442151f65f856f65a303db1315
SHA5124326638a4a9fa61a0707a1b66e91165d98f23b1757e1e0e28b35b58f91e53ea89631723035f9391bfe22c4af2b09de1fe743df3b0731608bf23ecc6aeee39b6c
-
Filesize
359KB
MD5db36c6abf78b3c48ce735f45d7e4b0ea
SHA107da7080233eb1cb31ec71f6a76873cb99643d6f
SHA2561382a61ecb63a1ccfe5dfdbb4ff49c02689247442151f65f856f65a303db1315
SHA5124326638a4a9fa61a0707a1b66e91165d98f23b1757e1e0e28b35b58f91e53ea89631723035f9391bfe22c4af2b09de1fe743df3b0731608bf23ecc6aeee39b6c