Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:36
Static task
static1
Behavioral task
behavioral1
Sample
e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe
Resource
win10v2004-20230221-en
General
-
Target
e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe
-
Size
687KB
-
MD5
62dec9dd0e2ebda204e12e6257017105
-
SHA1
5ea878272367cb3a49e6e90588f1ecbdcd386957
-
SHA256
e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98
-
SHA512
56a309444fc848f63dbed279e5fb3f9b8c3be083200da23e8c554cd4bb33413b7375c099bae4e921c27e8b7270572e03fee8d55fa9e332fb750e4cfb4c56f7e9
-
SSDEEP
12288:iMrAy90OqVXjf9Ag19xTwiuxjONetMjvL317LlrObFxZTvNIlJR0eX9L6A:+yOf971M6NeC7L3Tqbb3uz0eX9Ln
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8626.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8626.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2124-192-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-191-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-194-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-196-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-198-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-200-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-202-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-204-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-206-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-208-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-210-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-212-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-214-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-216-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-218-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-220-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-222-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-224-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2124-287-0x0000000004E60000-0x0000000004E70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2584 un550696.exe 1456 pro8626.exe 2124 qu4890.exe 4168 si772213.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8626.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un550696.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un550696.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3292 1456 WerFault.exe 84 2376 2124 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1456 pro8626.exe 1456 pro8626.exe 2124 qu4890.exe 2124 qu4890.exe 4168 si772213.exe 4168 si772213.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1456 pro8626.exe Token: SeDebugPrivilege 2124 qu4890.exe Token: SeDebugPrivilege 4168 si772213.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2584 2140 e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe 83 PID 2140 wrote to memory of 2584 2140 e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe 83 PID 2140 wrote to memory of 2584 2140 e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe 83 PID 2584 wrote to memory of 1456 2584 un550696.exe 84 PID 2584 wrote to memory of 1456 2584 un550696.exe 84 PID 2584 wrote to memory of 1456 2584 un550696.exe 84 PID 2584 wrote to memory of 2124 2584 un550696.exe 90 PID 2584 wrote to memory of 2124 2584 un550696.exe 90 PID 2584 wrote to memory of 2124 2584 un550696.exe 90 PID 2140 wrote to memory of 4168 2140 e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe 93 PID 2140 wrote to memory of 4168 2140 e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe 93 PID 2140 wrote to memory of 4168 2140 e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe"C:\Users\Admin\AppData\Local\Temp\e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8626.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 10804⤵
- Program crash
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4890.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 13364⤵
- Program crash
PID:2376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772213.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772213.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1456 -ip 14561⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2124 -ip 21241⤵PID:4476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD594de44335c2a3b999536d184c8dedfe3
SHA15767292ed37689545d0d8fd5a06361fc99f02583
SHA25644d837f37b9565839f62f4a2ad5893fee8761578de863cf2a783cefe42b22d14
SHA512dcd0cee4b0bc80c638b5e7035d3db74e1e499384f33cf37137e9ad2a287d536406e37f648ef16359816e8546638e63bcd58da50f4958b4e32bb56501fdaae0f4
-
Filesize
175KB
MD594de44335c2a3b999536d184c8dedfe3
SHA15767292ed37689545d0d8fd5a06361fc99f02583
SHA25644d837f37b9565839f62f4a2ad5893fee8761578de863cf2a783cefe42b22d14
SHA512dcd0cee4b0bc80c638b5e7035d3db74e1e499384f33cf37137e9ad2a287d536406e37f648ef16359816e8546638e63bcd58da50f4958b4e32bb56501fdaae0f4
-
Filesize
546KB
MD5c63c0d46ad71fec768e23c7dd571ab9c
SHA173ed70307e11c07dcc03ea259569b023a57cd5fe
SHA256fe7380c1d4a36a11a8b1370da301b5288c0cef4ae5d5bf8fbf7606feec15ca34
SHA51286fc170ac52af4bbf3b5505ca631317b9dff297de61a5f55411018bfa842914f893af4590db6cdcaa263815c2f4586c12cd09397ff9b178605d85ba7431226f4
-
Filesize
546KB
MD5c63c0d46ad71fec768e23c7dd571ab9c
SHA173ed70307e11c07dcc03ea259569b023a57cd5fe
SHA256fe7380c1d4a36a11a8b1370da301b5288c0cef4ae5d5bf8fbf7606feec15ca34
SHA51286fc170ac52af4bbf3b5505ca631317b9dff297de61a5f55411018bfa842914f893af4590db6cdcaa263815c2f4586c12cd09397ff9b178605d85ba7431226f4
-
Filesize
300KB
MD591b8b197537a2fc0f914729edae6e62b
SHA185fd34dedea35ff588778308012a63cbdcc8895d
SHA25699ba8881244067a50d04028c3513c44315c97515eba02aa0719b58237e775265
SHA512d8aae892b069e551cb48e973183e1bf1c885019ad0feba9b6ca3a35bb5668d03689f8e96dcbc000d2dface58304287c1f5f7a1f140d0072307236dab83c02ed6
-
Filesize
300KB
MD591b8b197537a2fc0f914729edae6e62b
SHA185fd34dedea35ff588778308012a63cbdcc8895d
SHA25699ba8881244067a50d04028c3513c44315c97515eba02aa0719b58237e775265
SHA512d8aae892b069e551cb48e973183e1bf1c885019ad0feba9b6ca3a35bb5668d03689f8e96dcbc000d2dface58304287c1f5f7a1f140d0072307236dab83c02ed6
-
Filesize
359KB
MD5d0aa5597efa5e3d7634d18c1ff000de8
SHA18d1142156c58858bdaf69509f9bbd4f1574d54ce
SHA2562ca778573508a5ea73fe863b793f661db83eec07ec555d26e5f3bed5522fbcdc
SHA512d1d07d4a74956e52b224941f06a3c36fe1f55406cb8c407ce526c8c0a5bf1cb2458b22a452af20b17390a64891920832866ad884bced2e82ce9c0870071b35f8
-
Filesize
359KB
MD5d0aa5597efa5e3d7634d18c1ff000de8
SHA18d1142156c58858bdaf69509f9bbd4f1574d54ce
SHA2562ca778573508a5ea73fe863b793f661db83eec07ec555d26e5f3bed5522fbcdc
SHA512d1d07d4a74956e52b224941f06a3c36fe1f55406cb8c407ce526c8c0a5bf1cb2458b22a452af20b17390a64891920832866ad884bced2e82ce9c0870071b35f8