Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:44
Static task
static1
Behavioral task
behavioral1
Sample
be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe
Resource
win10-20230220-en
General
-
Target
be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe
-
Size
685KB
-
MD5
e19eb711c09e440148c1f53121acd2ea
-
SHA1
b85ce081af6bb5b074d46519c2d4d78d7f3a4732
-
SHA256
be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be
-
SHA512
c2935b000bd8fe0ad21d0b3e0c0c6ae3db0e55c08d9b695f723e264355e568b87fc72bc243e6aa939c584b48692992a8e54957805d282ba2b1e0b00c66d80917
-
SSDEEP
12288:EMrwy90XQiOF5sLvdE0MZgVPGwkbsdUzjo/Iwcw439RSB/AHEx/3DEZ/:UyZibLVnMiGwbUzjFr29AHEx7W/
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4920.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2208-181-0x00000000022B0000-0x00000000022F6000-memory.dmp family_redline behavioral1/memory/2208-182-0x00000000027D0000-0x0000000002814000-memory.dmp family_redline behavioral1/memory/2208-183-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-184-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-186-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-188-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-190-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-192-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-194-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-196-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-198-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-200-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-202-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-204-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-207-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-214-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-211-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-216-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-218-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2208-220-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2404 un343367.exe 2568 pro4920.exe 2208 qu0558.exe 3900 si862637.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4920.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un343367.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un343367.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2568 pro4920.exe 2568 pro4920.exe 2208 qu0558.exe 2208 qu0558.exe 3900 si862637.exe 3900 si862637.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2568 pro4920.exe Token: SeDebugPrivilege 2208 qu0558.exe Token: SeDebugPrivilege 3900 si862637.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2404 1568 be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe 66 PID 1568 wrote to memory of 2404 1568 be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe 66 PID 1568 wrote to memory of 2404 1568 be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe 66 PID 2404 wrote to memory of 2568 2404 un343367.exe 67 PID 2404 wrote to memory of 2568 2404 un343367.exe 67 PID 2404 wrote to memory of 2568 2404 un343367.exe 67 PID 2404 wrote to memory of 2208 2404 un343367.exe 68 PID 2404 wrote to memory of 2208 2404 un343367.exe 68 PID 2404 wrote to memory of 2208 2404 un343367.exe 68 PID 1568 wrote to memory of 3900 1568 be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe 70 PID 1568 wrote to memory of 3900 1568 be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe 70 PID 1568 wrote to memory of 3900 1568 be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe"C:\Users\Admin\AppData\Local\Temp\be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un343367.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un343367.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0558.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862637.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862637.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5288f0926cb7239224f066317947769ae
SHA1693e747e45e56a2c10b75a64e533439f3e50a759
SHA256df45d11c5c76f89c40292dbc51cb20fe2b9ab2ebc8038c8c55c9c11320ec2908
SHA512eba2a36bad31ef2a9baaa020f6c6169991cc0aaed4c93266a1ff1f2fc5e9a8ab90382846618110af290690b3f125c77b8070d2b4a8e29760df0add1077a84b98
-
Filesize
175KB
MD5288f0926cb7239224f066317947769ae
SHA1693e747e45e56a2c10b75a64e533439f3e50a759
SHA256df45d11c5c76f89c40292dbc51cb20fe2b9ab2ebc8038c8c55c9c11320ec2908
SHA512eba2a36bad31ef2a9baaa020f6c6169991cc0aaed4c93266a1ff1f2fc5e9a8ab90382846618110af290690b3f125c77b8070d2b4a8e29760df0add1077a84b98
-
Filesize
543KB
MD582dfe67b231bb1314fb52ee6df04436d
SHA1eabe77cba1843384c675d5d0650390927fb9d45e
SHA25612fb53787aa4291dc859a9bbae3c2fdcb7cbc35566fd4c3047934229e44ec730
SHA512cbed154625cc302589c50f25e4242b34569e8ae0851ad11557633f91d9f9250059a7daa1b348bef40823628bb2d9fa6167e79225665ecd296b76fd982c885d93
-
Filesize
543KB
MD582dfe67b231bb1314fb52ee6df04436d
SHA1eabe77cba1843384c675d5d0650390927fb9d45e
SHA25612fb53787aa4291dc859a9bbae3c2fdcb7cbc35566fd4c3047934229e44ec730
SHA512cbed154625cc302589c50f25e4242b34569e8ae0851ad11557633f91d9f9250059a7daa1b348bef40823628bb2d9fa6167e79225665ecd296b76fd982c885d93
-
Filesize
292KB
MD54e871647efb843e9a9a009087853b65b
SHA18a770114d8d53bdfdfa0be6e3fcc5b80ee7eeab6
SHA2561be0c3479abbd08eed1e811c06ee9e5f10ef1381efe992a48acc24eb2a62396f
SHA512445eeeb5a3375c50e48a49d8cc9211632a19dc37ce6cb3f6390a86189191df4a1bc5d8cc18f4a2a5d2e35c39e1b0bd31010f67d46108fb99ccf3f77d613338e9
-
Filesize
292KB
MD54e871647efb843e9a9a009087853b65b
SHA18a770114d8d53bdfdfa0be6e3fcc5b80ee7eeab6
SHA2561be0c3479abbd08eed1e811c06ee9e5f10ef1381efe992a48acc24eb2a62396f
SHA512445eeeb5a3375c50e48a49d8cc9211632a19dc37ce6cb3f6390a86189191df4a1bc5d8cc18f4a2a5d2e35c39e1b0bd31010f67d46108fb99ccf3f77d613338e9
-
Filesize
350KB
MD58ca9c7d6a45634db488aad5083de89ec
SHA1ed2e0012574d70ecefb05101e953561de8db077f
SHA256e13f8bb56bf9048cf81817ec8eb742eafee17f5512fde8b87c5d6ca140c0b03e
SHA5128f8498981c3052d157ecbf92842f42926e41dbb838d96b930632a0b546651fb509d92ac2f7343c73d68a07382a30cd898d05919f14e2c4fbcf887cf040870e2a
-
Filesize
350KB
MD58ca9c7d6a45634db488aad5083de89ec
SHA1ed2e0012574d70ecefb05101e953561de8db077f
SHA256e13f8bb56bf9048cf81817ec8eb742eafee17f5512fde8b87c5d6ca140c0b03e
SHA5128f8498981c3052d157ecbf92842f42926e41dbb838d96b930632a0b546651fb509d92ac2f7343c73d68a07382a30cd898d05919f14e2c4fbcf887cf040870e2a