Analysis
-
max time kernel
114s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:37
Static task
static1
Behavioral task
behavioral1
Sample
d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe
Resource
win10v2004-20230220-en
General
-
Target
d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe
-
Size
687KB
-
MD5
a7f8b3d1653c57a35b9e8239d455f08d
-
SHA1
0f5540938081fb43bbd8256497d57a79830d64c2
-
SHA256
d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2
-
SHA512
9a0966d62cd7e1442e2a4ecc63648c908402116f82b3805b83684338c2293ad79c4bc7cca78bde7488e4c6b6295ca614002b2de56e5406be882a8f841cf50e0b
-
SSDEEP
12288:9Mriy90415RtsxLDrfwhMTUz2QnQzGTq7d/wCMRFQfZfUCbZVZu2:PyDg5TS2Qd21DxDVZu2
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6682.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6682.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1320-190-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-191-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-193-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-195-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-197-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-199-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-201-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-203-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-205-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-207-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-209-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-211-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-213-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-215-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-217-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-219-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline behavioral1/memory/1320-222-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-225-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/1320-227-0x0000000002760000-0x000000000279E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3268 un660077.exe 624 pro6682.exe 1320 qu7873.exe 4476 si457772.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6682.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un660077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un660077.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4740 624 WerFault.exe 88 4516 1320 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 624 pro6682.exe 624 pro6682.exe 1320 qu7873.exe 1320 qu7873.exe 4476 si457772.exe 4476 si457772.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 624 pro6682.exe Token: SeDebugPrivilege 1320 qu7873.exe Token: SeDebugPrivilege 4476 si457772.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2548 wrote to memory of 3268 2548 d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe 87 PID 2548 wrote to memory of 3268 2548 d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe 87 PID 2548 wrote to memory of 3268 2548 d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe 87 PID 3268 wrote to memory of 624 3268 un660077.exe 88 PID 3268 wrote to memory of 624 3268 un660077.exe 88 PID 3268 wrote to memory of 624 3268 un660077.exe 88 PID 3268 wrote to memory of 1320 3268 un660077.exe 94 PID 3268 wrote to memory of 1320 3268 un660077.exe 94 PID 3268 wrote to memory of 1320 3268 un660077.exe 94 PID 2548 wrote to memory of 4476 2548 d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe 98 PID 2548 wrote to memory of 4476 2548 d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe 98 PID 2548 wrote to memory of 4476 2548 d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe"C:\Users\Admin\AppData\Local\Temp\d89ee7efa5beab298636e8f675f3b22953031701390cc1a98697ea42648216d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660077.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6682.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6682.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 10284⤵
- Program crash
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7873.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7873.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 13284⤵
- Program crash
PID:4516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si457772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si457772.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 624 -ip 6241⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1320 -ip 13201⤵PID:3464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54a0e50b4084cac58f092337ae6cf3b61
SHA19f122495abc7834fc923fdecceb375739339402a
SHA256262aecf6979654d27813d7da0e48465084c93d11399bc6b7f148990dcde363f0
SHA512fec9da5d5983fd7e86591c74fa2595a435b16d2819f0e648cdbae254620e9d59d9f43489970c433e98c6345f6d161a66b728aaae175a75f9a54d87c13ab00185
-
Filesize
175KB
MD54a0e50b4084cac58f092337ae6cf3b61
SHA19f122495abc7834fc923fdecceb375739339402a
SHA256262aecf6979654d27813d7da0e48465084c93d11399bc6b7f148990dcde363f0
SHA512fec9da5d5983fd7e86591c74fa2595a435b16d2819f0e648cdbae254620e9d59d9f43489970c433e98c6345f6d161a66b728aaae175a75f9a54d87c13ab00185
-
Filesize
545KB
MD5fce3fcf9932f2d86f0afdef35d91ca4d
SHA179fdeb3977f2ed2d22ab667e2515f88c0dc53cc7
SHA25601c4eef5faa100a4d17929bd643d6411ad8f7ce400968e535d49e5862c851575
SHA512708c366db906904874ff3331929903819ff3d4f2ba70997a49110b7e3f22318344108e424fc910ee9ade334a2a0596cd68ed081381eee16c98d1f13c05b531f0
-
Filesize
545KB
MD5fce3fcf9932f2d86f0afdef35d91ca4d
SHA179fdeb3977f2ed2d22ab667e2515f88c0dc53cc7
SHA25601c4eef5faa100a4d17929bd643d6411ad8f7ce400968e535d49e5862c851575
SHA512708c366db906904874ff3331929903819ff3d4f2ba70997a49110b7e3f22318344108e424fc910ee9ade334a2a0596cd68ed081381eee16c98d1f13c05b531f0
-
Filesize
300KB
MD5da567c48ea3e9bcdd78164520c085404
SHA1f279ec714fd5802d1d7c9e882018c89c8e4bf344
SHA2569a650babbe3ac65fd5162016a5fb2a254b5ff0d6015a099c16d25430d0dbea9d
SHA512bebf3c8a3b0da0f3ec918dff0684858f21da533aa9e2be7d03971b1a0d5eb0c588d9f4290e87b9919cc1881918362f3542a0e3ba487ddaf4c1b046d6591ec332
-
Filesize
300KB
MD5da567c48ea3e9bcdd78164520c085404
SHA1f279ec714fd5802d1d7c9e882018c89c8e4bf344
SHA2569a650babbe3ac65fd5162016a5fb2a254b5ff0d6015a099c16d25430d0dbea9d
SHA512bebf3c8a3b0da0f3ec918dff0684858f21da533aa9e2be7d03971b1a0d5eb0c588d9f4290e87b9919cc1881918362f3542a0e3ba487ddaf4c1b046d6591ec332
-
Filesize
359KB
MD5304ae93ed5446b6d97a9f40b0222d026
SHA14838abb33c232cb5a954032c5f7c67e6d34c6df4
SHA25670f0d3efb38fea2d55a7bfca51cd84e0d7b843495d52583e943e077f17110d8a
SHA5120ca20c098362cc7a5eedad819582456925131316602a42ac084bc5af479e817503f3171ccbe5e6901be1581ab9e48bd971f1ba54253cd4cce67349b28b73ebcd
-
Filesize
359KB
MD5304ae93ed5446b6d97a9f40b0222d026
SHA14838abb33c232cb5a954032c5f7c67e6d34c6df4
SHA25670f0d3efb38fea2d55a7bfca51cd84e0d7b843495d52583e943e077f17110d8a
SHA5120ca20c098362cc7a5eedad819582456925131316602a42ac084bc5af479e817503f3171ccbe5e6901be1581ab9e48bd971f1ba54253cd4cce67349b28b73ebcd