Analysis
-
max time kernel
87s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:39
Static task
static1
Behavioral task
behavioral1
Sample
3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe
Resource
win10v2004-20230220-en
General
-
Target
3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe
-
Size
687KB
-
MD5
6a95b83ddd4aebcdc18ef8f03c61d092
-
SHA1
7f129537f3c11f5a273f21cc066e7d29477a2fd5
-
SHA256
3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638
-
SHA512
932f5df02ed4f32d91237c962709b5845b3e4477e0fd9b9b47ef755b9727aec7e7e51623c725c144b2ffbc9c8bbdedfdf718717e4ce69cb17aa0d8fa39dfa87e
-
SSDEEP
12288:XMrKy90GT6LyD/4V22wa6Vk6MyBqFR2TCsAaFHaZmoetNgiFRcW:NyHuLi/4VmaukbwaAsctNgiFRcW
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4210.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4604-190-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-193-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-195-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-197-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-215-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-217-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-219-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4604-223-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3724 un028995.exe 684 pro4210.exe 4604 qu3595.exe 5100 si860352.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4210.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un028995.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un028995.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4744 684 WerFault.exe 84 664 4604 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 684 pro4210.exe 684 pro4210.exe 4604 qu3595.exe 4604 qu3595.exe 5100 si860352.exe 5100 si860352.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 684 pro4210.exe Token: SeDebugPrivilege 4604 qu3595.exe Token: SeDebugPrivilege 5100 si860352.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3744 wrote to memory of 3724 3744 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe 83 PID 3744 wrote to memory of 3724 3744 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe 83 PID 3744 wrote to memory of 3724 3744 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe 83 PID 3724 wrote to memory of 684 3724 un028995.exe 84 PID 3724 wrote to memory of 684 3724 un028995.exe 84 PID 3724 wrote to memory of 684 3724 un028995.exe 84 PID 3724 wrote to memory of 4604 3724 un028995.exe 92 PID 3724 wrote to memory of 4604 3724 un028995.exe 92 PID 3724 wrote to memory of 4604 3724 un028995.exe 92 PID 3744 wrote to memory of 5100 3744 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe 96 PID 3744 wrote to memory of 5100 3744 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe 96 PID 3744 wrote to memory of 5100 3744 3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe"C:\Users\Admin\AppData\Local\Temp\3312eab99f6709480fe86c649e7d480c65e6ddbd790e56875b5a003f4e11d638.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028995.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 10804⤵
- Program crash
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3595.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3595.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 13484⤵
- Program crash
PID:664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860352.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860352.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 684 -ip 6841⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4604 -ip 46041⤵PID:2520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5adc6e1a11aaae24efd5f1ed970295a1e
SHA10330cea408705cd57f811dda87a48fb6d3af4133
SHA2565f9c63cb2e74bc104fe7328e13cadfbf89491dcca0ac65dc8add03d9fbef7fd3
SHA51247929cf8de2c95b4fdbdcc4ce1ec3490432085e7a93a176c8ddbbdfe80da4ac71d8d7028379dc5200c382c262ffd2a2932da2354f85c216dac57ee7647b72c40
-
Filesize
175KB
MD5adc6e1a11aaae24efd5f1ed970295a1e
SHA10330cea408705cd57f811dda87a48fb6d3af4133
SHA2565f9c63cb2e74bc104fe7328e13cadfbf89491dcca0ac65dc8add03d9fbef7fd3
SHA51247929cf8de2c95b4fdbdcc4ce1ec3490432085e7a93a176c8ddbbdfe80da4ac71d8d7028379dc5200c382c262ffd2a2932da2354f85c216dac57ee7647b72c40
-
Filesize
545KB
MD556b13424e3d8edf742678ec97f3d9fa5
SHA1a8d82ca7ac2a723f6ce50c65d59388fdfa9c7189
SHA256bd4b5d7d2403b53c672cfe39b883efe75ea3dd63e0ce0ca2e72ac2f5d0a0ee4d
SHA512811de4f2746296becc3db6407cb50bb1e38f24375d19e8a5e63fea3ca7cf6de86c44a9e4c1566c79327515ac3e34f57b59db938c30ab4b57d76a389a3c31d738
-
Filesize
545KB
MD556b13424e3d8edf742678ec97f3d9fa5
SHA1a8d82ca7ac2a723f6ce50c65d59388fdfa9c7189
SHA256bd4b5d7d2403b53c672cfe39b883efe75ea3dd63e0ce0ca2e72ac2f5d0a0ee4d
SHA512811de4f2746296becc3db6407cb50bb1e38f24375d19e8a5e63fea3ca7cf6de86c44a9e4c1566c79327515ac3e34f57b59db938c30ab4b57d76a389a3c31d738
-
Filesize
300KB
MD58610e0a90237d4a7737dad8614a7ab47
SHA14803a2cef89b330bcd95913d7097d9f309bd7557
SHA2566781ae2bc6af46d3ff67ec28c8dc6470420f1123cc9d1d8b2d6221c7b84a08a8
SHA5123507b319d1890e45b246c85d3fe2350d4e6e08738409d07917dfea393a61479ab501e8fe7718f3a0014ced822a91225f1628b65d6a1a4ba2fb6d3f56c3459aa7
-
Filesize
300KB
MD58610e0a90237d4a7737dad8614a7ab47
SHA14803a2cef89b330bcd95913d7097d9f309bd7557
SHA2566781ae2bc6af46d3ff67ec28c8dc6470420f1123cc9d1d8b2d6221c7b84a08a8
SHA5123507b319d1890e45b246c85d3fe2350d4e6e08738409d07917dfea393a61479ab501e8fe7718f3a0014ced822a91225f1628b65d6a1a4ba2fb6d3f56c3459aa7
-
Filesize
359KB
MD5f28c088a29d3366aa4f79cf312d37457
SHA183829f2952961558e20ab0b85c658885942ec706
SHA25642c5fd7d5ba4438ce0db89e51303d0711a5db7d3590e4633bb4d396c3387779f
SHA512651c8c1e7f839388b5c04e1e13f067ee14b10ac77a453aa20ab39e632def2a0c351adc5a9aade8b71b86f3f6b360b646deb64923da8b9538e9e7fe622bd40ce6
-
Filesize
359KB
MD5f28c088a29d3366aa4f79cf312d37457
SHA183829f2952961558e20ab0b85c658885942ec706
SHA25642c5fd7d5ba4438ce0db89e51303d0711a5db7d3590e4633bb4d396c3387779f
SHA512651c8c1e7f839388b5c04e1e13f067ee14b10ac77a453aa20ab39e632def2a0c351adc5a9aade8b71b86f3f6b360b646deb64923da8b9538e9e7fe622bd40ce6