Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:42
Static task
static1
Behavioral task
behavioral1
Sample
a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe
Resource
win10v2004-20230220-en
General
-
Target
a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe
-
Size
687KB
-
MD5
4f5967af4c1bab7ff3bfddca523694cc
-
SHA1
a1b5b6eb854da1b7f728934d1cac44ac750deb25
-
SHA256
a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677
-
SHA512
f663216d8db5120c84d7d43ed012c79c8b11a6a0a5dbded5402c4e4aa232a86b4a3bc11e280191b977c36970e3ed7b483449f087b83979f01f52ea724d9a077a
-
SSDEEP
12288:JMrwy90lcgcjyFo9mRBAtNA+rvaG9E4gFq5Z2xmEMqsM+IwyPQ:py0cgcuoAkX3vO4XMTPQ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8248.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8248.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4412-191-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-192-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-194-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-196-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-198-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-200-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-202-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-204-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-206-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-208-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-210-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-212-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-214-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-216-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-218-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-222-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-223-0x0000000004F20000-0x0000000004F30000-memory.dmp family_redline behavioral1/memory/4412-226-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/4412-228-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4240 un685908.exe 740 pro8248.exe 4412 qu5325.exe 5116 si247001.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8248.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un685908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un685908.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3516 740 WerFault.exe 83 4072 4412 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 740 pro8248.exe 740 pro8248.exe 4412 qu5325.exe 4412 qu5325.exe 5116 si247001.exe 5116 si247001.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 740 pro8248.exe Token: SeDebugPrivilege 4412 qu5325.exe Token: SeDebugPrivilege 5116 si247001.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1652 wrote to memory of 4240 1652 a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe 82 PID 1652 wrote to memory of 4240 1652 a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe 82 PID 1652 wrote to memory of 4240 1652 a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe 82 PID 4240 wrote to memory of 740 4240 un685908.exe 83 PID 4240 wrote to memory of 740 4240 un685908.exe 83 PID 4240 wrote to memory of 740 4240 un685908.exe 83 PID 4240 wrote to memory of 4412 4240 un685908.exe 89 PID 4240 wrote to memory of 4412 4240 un685908.exe 89 PID 4240 wrote to memory of 4412 4240 un685908.exe 89 PID 1652 wrote to memory of 5116 1652 a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe 93 PID 1652 wrote to memory of 5116 1652 a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe 93 PID 1652 wrote to memory of 5116 1652 a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe"C:\Users\Admin\AppData\Local\Temp\a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685908.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8248.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8248.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 10804⤵
- Program crash
PID:3516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5325.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5325.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 13484⤵
- Program crash
PID:4072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247001.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 740 -ip 7401⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4412 -ip 44121⤵PID:680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dab1b71c6002a4ff98e396dd116ce5f8
SHA1367ed1943917cc78809f4f008cc4aa07ae3516aa
SHA256c738dfb55c45dde09b95a75880bc5952267bfa263feaea39b8e38c26f3b18c90
SHA512681235e38e95e18180d01b0358e3b8290edb5747c7820e168c623da32474621d28d558b4d1991de12ffe66cce787be14d54d59825a5cf9ef15a5e67a9f5a9005
-
Filesize
175KB
MD5dab1b71c6002a4ff98e396dd116ce5f8
SHA1367ed1943917cc78809f4f008cc4aa07ae3516aa
SHA256c738dfb55c45dde09b95a75880bc5952267bfa263feaea39b8e38c26f3b18c90
SHA512681235e38e95e18180d01b0358e3b8290edb5747c7820e168c623da32474621d28d558b4d1991de12ffe66cce787be14d54d59825a5cf9ef15a5e67a9f5a9005
-
Filesize
545KB
MD50156e7a1045d78e5940a0ccb5d1563fa
SHA11f26e6d85d061ae3c8ab39e9f65798f41dd0dc8d
SHA256ac360a8faf2d1cb4a73fb4837308578c6e99faddfe10541b737bcab81a1e5de7
SHA512d9bdc0d566bbcc2391f1c54538e62939b0856a9f66c302bec069760f623b67b50f2298905e7a14bf2cccdd8e63bd3058eb0e600b72301a0e84731b4beb10e8a0
-
Filesize
545KB
MD50156e7a1045d78e5940a0ccb5d1563fa
SHA11f26e6d85d061ae3c8ab39e9f65798f41dd0dc8d
SHA256ac360a8faf2d1cb4a73fb4837308578c6e99faddfe10541b737bcab81a1e5de7
SHA512d9bdc0d566bbcc2391f1c54538e62939b0856a9f66c302bec069760f623b67b50f2298905e7a14bf2cccdd8e63bd3058eb0e600b72301a0e84731b4beb10e8a0
-
Filesize
300KB
MD595d11ef059b05724a6fb01ee90eeb70b
SHA16038fda9cc94fc4e6d32fb42b1ad70a2f12752c9
SHA2567014055b7abed593839a1f2bcd186c88c4f06938037e16044421a6491e7542a7
SHA5127dca5bec735cd72b1f4076a2481bf4f7538cf7b8039c5c5c52caad666d5621775090c6226a2187ec56c5a4f13893ddb595ff51cfc21b403ed53f0cc0e753a37c
-
Filesize
300KB
MD595d11ef059b05724a6fb01ee90eeb70b
SHA16038fda9cc94fc4e6d32fb42b1ad70a2f12752c9
SHA2567014055b7abed593839a1f2bcd186c88c4f06938037e16044421a6491e7542a7
SHA5127dca5bec735cd72b1f4076a2481bf4f7538cf7b8039c5c5c52caad666d5621775090c6226a2187ec56c5a4f13893ddb595ff51cfc21b403ed53f0cc0e753a37c
-
Filesize
359KB
MD58b554115bec0357fe9b45c764bf48beb
SHA1468b55697f9fcc8815be90bc4a42d05a1d256b99
SHA2569c571d8b0f080af3b29c3d0b114f0ebb6974f832adbd9819c5cc5beba81f75df
SHA5129b8b718952356fb1c0751d429cc9d4ebf575e46387544d83595af6d95d84920600ad40733fccb8b66dfaa542d5a1ea6027cef741c7bc0fbefdb4d4890814e651
-
Filesize
359KB
MD58b554115bec0357fe9b45c764bf48beb
SHA1468b55697f9fcc8815be90bc4a42d05a1d256b99
SHA2569c571d8b0f080af3b29c3d0b114f0ebb6974f832adbd9819c5cc5beba81f75df
SHA5129b8b718952356fb1c0751d429cc9d4ebf575e46387544d83595af6d95d84920600ad40733fccb8b66dfaa542d5a1ea6027cef741c7bc0fbefdb4d4890814e651