Analysis
-
max time kernel
109s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:45
Static task
static1
Behavioral task
behavioral1
Sample
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe
Resource
win10v2004-20230221-en
General
-
Target
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe
-
Size
684KB
-
MD5
e7092d8e4d0e976936074e7a2995766d
-
SHA1
03497f18f80820a99bf81dd7f4d9a96d913b9508
-
SHA256
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283
-
SHA512
f2b17be85b1812b8e8e8396f5abd1f290657dda1479966e957a49861a3eb14e5fea7a58739838d993d32b226dce6763c90d8aec323896941d666ba212805f041
-
SSDEEP
12288:9MrQy90ism8iTGSTvJkk/MdL3vXnkFLqqu3x9EN3WBsjqEA6g2y5+Jzw/EW:9ykDuvm3PkFLC3x9EsGjqE3y2kEW
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7937.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1512-189-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-190-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-192-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-194-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-196-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-198-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-200-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-202-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-204-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-206-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-208-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-210-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-212-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-214-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-216-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-218-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-220-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline behavioral1/memory/1512-222-0x00000000028C0000-0x00000000028FE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4828 un875665.exe 4516 pro7937.exe 1512 qu8517.exe 4336 si628301.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7937.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un875665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un875665.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4308 4516 WerFault.exe 87 4632 1512 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4516 pro7937.exe 4516 pro7937.exe 1512 qu8517.exe 1512 qu8517.exe 4336 si628301.exe 4336 si628301.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4516 pro7937.exe Token: SeDebugPrivilege 1512 qu8517.exe Token: SeDebugPrivilege 4336 si628301.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4828 3744 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe 86 PID 3744 wrote to memory of 4828 3744 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe 86 PID 3744 wrote to memory of 4828 3744 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe 86 PID 4828 wrote to memory of 4516 4828 un875665.exe 87 PID 4828 wrote to memory of 4516 4828 un875665.exe 87 PID 4828 wrote to memory of 4516 4828 un875665.exe 87 PID 4828 wrote to memory of 1512 4828 un875665.exe 96 PID 4828 wrote to memory of 1512 4828 un875665.exe 96 PID 4828 wrote to memory of 1512 4828 un875665.exe 96 PID 3744 wrote to memory of 4336 3744 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe 100 PID 3744 wrote to memory of 4336 3744 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe 100 PID 3744 wrote to memory of 4336 3744 6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe"C:\Users\Admin\AppData\Local\Temp\6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875665.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7937.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 10844⤵
- Program crash
PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8517.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8517.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 13764⤵
- Program crash
PID:4632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628301.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628301.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4516 -ip 45161⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1512 -ip 15121⤵PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD500cf00dae0d5eafcd19cf2ac0eeed881
SHA183a447375603a0adeb5918f77216b1a222013b87
SHA256c9bebd9f054ee2c15bf497e18a2c8cba6ac34c44f46c331fc56b27eb3cf5a218
SHA5128ff6de40703a86f6bbda32d46c4e6de7821b34e773a0019c32a003267542bec09eaf562300e860a0f1a1c5d57488a7b5af5885df391837e90cb494ab28c44a59
-
Filesize
175KB
MD500cf00dae0d5eafcd19cf2ac0eeed881
SHA183a447375603a0adeb5918f77216b1a222013b87
SHA256c9bebd9f054ee2c15bf497e18a2c8cba6ac34c44f46c331fc56b27eb3cf5a218
SHA5128ff6de40703a86f6bbda32d46c4e6de7821b34e773a0019c32a003267542bec09eaf562300e860a0f1a1c5d57488a7b5af5885df391837e90cb494ab28c44a59
-
Filesize
543KB
MD585b80fd63b7e5ea6bc87c94b74533800
SHA13441876323f0fc82242848bb1ea95f26cedd06b7
SHA25637cb4279d7cb00de79abe3a458a0a8d7be3adce094b524387188da0cddad8d9f
SHA51268325f04bb309c4b5e679da2309347daeb4df018c4bfcbf02ee0fae9cff422b83128c098858f61b85ada3811b6ce7a618e0d366caf166a0e1e1d684d4dbbfe75
-
Filesize
543KB
MD585b80fd63b7e5ea6bc87c94b74533800
SHA13441876323f0fc82242848bb1ea95f26cedd06b7
SHA25637cb4279d7cb00de79abe3a458a0a8d7be3adce094b524387188da0cddad8d9f
SHA51268325f04bb309c4b5e679da2309347daeb4df018c4bfcbf02ee0fae9cff422b83128c098858f61b85ada3811b6ce7a618e0d366caf166a0e1e1d684d4dbbfe75
-
Filesize
292KB
MD57397b4dccdb80f13835fb18a5130f097
SHA13a57aee709a8945d85476705a93186555bd08396
SHA256f690012711c9bfb7f70400eca19e3bc32a596780c7365c45c14385526b2df27d
SHA51239a1f256ba0962b6c8ae9902e500e1e5fb3df230bf178ab0d21b5d03202c535ea96e9edb50ff80f38fa7fe94b514259fec5aa70ef5c65b9e788a54fd5cfe6b70
-
Filesize
292KB
MD57397b4dccdb80f13835fb18a5130f097
SHA13a57aee709a8945d85476705a93186555bd08396
SHA256f690012711c9bfb7f70400eca19e3bc32a596780c7365c45c14385526b2df27d
SHA51239a1f256ba0962b6c8ae9902e500e1e5fb3df230bf178ab0d21b5d03202c535ea96e9edb50ff80f38fa7fe94b514259fec5aa70ef5c65b9e788a54fd5cfe6b70
-
Filesize
350KB
MD5866df39e9dfa4fc20b0c114b953bcbf0
SHA12efc221e1e58b64b4a9c6ae234d61cca35cbdc24
SHA25649437d49956e93fa919cf6fbeb0e73bef9a95c8bc7de35afb07e4f79c721efcd
SHA5129b8d792d96180c5041a3876aa07ae4b94cc0829a19c7d12fbc4ac1d9122f2472585a82aa969da218a82b5b45d28bdd6819baa86b069fdd7ba02f7397bfd6e42e
-
Filesize
350KB
MD5866df39e9dfa4fc20b0c114b953bcbf0
SHA12efc221e1e58b64b4a9c6ae234d61cca35cbdc24
SHA25649437d49956e93fa919cf6fbeb0e73bef9a95c8bc7de35afb07e4f79c721efcd
SHA5129b8d792d96180c5041a3876aa07ae4b94cc0829a19c7d12fbc4ac1d9122f2472585a82aa969da218a82b5b45d28bdd6819baa86b069fdd7ba02f7397bfd6e42e