Analysis
-
max time kernel
87s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:45
Static task
static1
Behavioral task
behavioral1
Sample
35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe
Resource
win10v2004-20230220-en
General
-
Target
35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe
-
Size
688KB
-
MD5
68c72f54a49ec5da5b0c4030828d8cf9
-
SHA1
cc7fbe9f5dbabbed35917573a59a9755ec3ddc7d
-
SHA256
35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188
-
SHA512
57fe0df4a4dfd07a2283ea229d6e9b839192a31db2db68aed395a6e438a5bd5ed050a32d50b2992c23c1c59b50f5b31522f2ee786eb1d1f0bab685b92630b818
-
SSDEEP
12288:LMrny906Fxxcp48Ei+bv5XqzHoJ0bXJcywZ094y3KBh3y:syXFxkENZW60jJm+9LKBh3y
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1180-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-202-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-206-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-212-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-219-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-224-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-226-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1180-228-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3332 un185575.exe 4036 pro2963.exe 1180 qu2497.exe 856 si448470.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2963.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2963.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un185575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un185575.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1440 4036 WerFault.exe 85 3904 1180 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4036 pro2963.exe 4036 pro2963.exe 1180 qu2497.exe 1180 qu2497.exe 856 si448470.exe 856 si448470.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4036 pro2963.exe Token: SeDebugPrivilege 1180 qu2497.exe Token: SeDebugPrivilege 856 si448470.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3332 4112 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe 84 PID 4112 wrote to memory of 3332 4112 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe 84 PID 4112 wrote to memory of 3332 4112 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe 84 PID 3332 wrote to memory of 4036 3332 un185575.exe 85 PID 3332 wrote to memory of 4036 3332 un185575.exe 85 PID 3332 wrote to memory of 4036 3332 un185575.exe 85 PID 3332 wrote to memory of 1180 3332 un185575.exe 92 PID 3332 wrote to memory of 1180 3332 un185575.exe 92 PID 3332 wrote to memory of 1180 3332 un185575.exe 92 PID 4112 wrote to memory of 856 4112 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe 96 PID 4112 wrote to memory of 856 4112 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe 96 PID 4112 wrote to memory of 856 4112 35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe"C:\Users\Admin\AppData\Local\Temp\35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un185575.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un185575.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2963.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 10804⤵
- Program crash
PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2497.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2497.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 13324⤵
- Program crash
PID:3904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si448470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si448470.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4036 -ip 40361⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1180 -ip 11801⤵PID:1064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4e684d6fe94e21bd7a29cb2bf4c645f
SHA19fa200e8ecb80d171129f9c190e94299ada68231
SHA256de9d3c1ef3ee3b266099ea6b1cedbbf5ee4552aece1f94582a59987a3feab859
SHA512d7eb14d430c1d83c46d21b3a3aa53d6d098afee020aa5d57bf0f2ade3f44aca9373fa2c2439f4c1b7db97a308517b631d2915ccf74c23043d0b0f332cff5a30d
-
Filesize
175KB
MD5d4e684d6fe94e21bd7a29cb2bf4c645f
SHA19fa200e8ecb80d171129f9c190e94299ada68231
SHA256de9d3c1ef3ee3b266099ea6b1cedbbf5ee4552aece1f94582a59987a3feab859
SHA512d7eb14d430c1d83c46d21b3a3aa53d6d098afee020aa5d57bf0f2ade3f44aca9373fa2c2439f4c1b7db97a308517b631d2915ccf74c23043d0b0f332cff5a30d
-
Filesize
545KB
MD58c7d2aa38b8c6f861306a7c019e0b143
SHA171545845dbe701715437e5bcdc4bcab97ac9cb8b
SHA256f4cadc4241317d5223f36aaee8f2ab8a828a0083690e88b7a3a4a8d6acc9a93b
SHA512e518073f1e92f728b60c0943f0d002645ff7482e40e8460015e7a9a4c2e99cc2e05212d005eb7ca1151da79e4cd3b90715ce552037a8ca04df6c1735c70ba346
-
Filesize
545KB
MD58c7d2aa38b8c6f861306a7c019e0b143
SHA171545845dbe701715437e5bcdc4bcab97ac9cb8b
SHA256f4cadc4241317d5223f36aaee8f2ab8a828a0083690e88b7a3a4a8d6acc9a93b
SHA512e518073f1e92f728b60c0943f0d002645ff7482e40e8460015e7a9a4c2e99cc2e05212d005eb7ca1151da79e4cd3b90715ce552037a8ca04df6c1735c70ba346
-
Filesize
300KB
MD5d042c4086a695c69c9e47c0bb2e2603f
SHA1533b2e00a9d7bc7dccdb86d59d06ae45b69ed2de
SHA256cc2898939a766bee713e09ac08275c6879666e42bb8c025f8ae861f72b36925a
SHA5122af9689846d8eaf380d6139a043f4ebc18e9891efe52264dc736fc8ed28bbcc7aa430ce9d28a15b1fed7a94f7eb6d1402ba1942db41ca6c753a0eded82256e0c
-
Filesize
300KB
MD5d042c4086a695c69c9e47c0bb2e2603f
SHA1533b2e00a9d7bc7dccdb86d59d06ae45b69ed2de
SHA256cc2898939a766bee713e09ac08275c6879666e42bb8c025f8ae861f72b36925a
SHA5122af9689846d8eaf380d6139a043f4ebc18e9891efe52264dc736fc8ed28bbcc7aa430ce9d28a15b1fed7a94f7eb6d1402ba1942db41ca6c753a0eded82256e0c
-
Filesize
359KB
MD52c83257c54be3b12fc11768dde02cb44
SHA18c73a9ef63b3411776f8f34af3a38e64ab0616ee
SHA2566d0e2608d6563d07e99a67c95d816a1fddf1e194a83cdf836d84754cbe99a0d3
SHA51290b526768911420dc048e535e89754e809828b615559ef75ecb131d402b4ea0082360aa70ba924be87214346122d176ee691804aebac46ca9e9e3f6199434e0f
-
Filesize
359KB
MD52c83257c54be3b12fc11768dde02cb44
SHA18c73a9ef63b3411776f8f34af3a38e64ab0616ee
SHA2566d0e2608d6563d07e99a67c95d816a1fddf1e194a83cdf836d84754cbe99a0d3
SHA51290b526768911420dc048e535e89754e809828b615559ef75ecb131d402b4ea0082360aa70ba924be87214346122d176ee691804aebac46ca9e9e3f6199434e0f