Analysis
-
max time kernel
54s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:51
Static task
static1
Behavioral task
behavioral1
Sample
7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe
Resource
win10-20230220-en
General
-
Target
7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe
-
Size
685KB
-
MD5
57f3660d212a30d2736cc974d72e804a
-
SHA1
a22d88e044eebbc7ce57ead5a3cd49858ca0a2f4
-
SHA256
7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb
-
SHA512
5ba66931244bea5e73a5c388c947382fea58c6fd7f54141ef456eccf86b9336bab21e6995e9cc7f2caaef951cc912ed2775341aec2b8e9f09f8968907280d14f
-
SSDEEP
12288:HMryy90/jO36MET1itmEMrceG0/AxyZUZ0aMzusQ8BliMEuFiIY8kxARRi/:py0jO36rRifwnG0AyU+zuMHiME1Fmq
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1502.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2036-178-0x0000000004CA0000-0x0000000004CE6000-memory.dmp family_redline behavioral1/memory/2036-179-0x0000000004D20000-0x0000000004D64000-memory.dmp family_redline behavioral1/memory/2036-180-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-181-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-183-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-185-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-187-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-189-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-191-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-193-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-195-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-197-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-199-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-201-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-203-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-205-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-207-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-209-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-211-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/2036-213-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3276 un609760.exe 3748 pro1502.exe 2036 qu3544.exe 4816 si156300.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1502.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un609760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un609760.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3748 pro1502.exe 3748 pro1502.exe 2036 qu3544.exe 2036 qu3544.exe 4816 si156300.exe 4816 si156300.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3748 pro1502.exe Token: SeDebugPrivilege 2036 qu3544.exe Token: SeDebugPrivilege 4816 si156300.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3276 3240 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe 66 PID 3240 wrote to memory of 3276 3240 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe 66 PID 3240 wrote to memory of 3276 3240 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe 66 PID 3276 wrote to memory of 3748 3276 un609760.exe 67 PID 3276 wrote to memory of 3748 3276 un609760.exe 67 PID 3276 wrote to memory of 3748 3276 un609760.exe 67 PID 3276 wrote to memory of 2036 3276 un609760.exe 68 PID 3276 wrote to memory of 2036 3276 un609760.exe 68 PID 3276 wrote to memory of 2036 3276 un609760.exe 68 PID 3240 wrote to memory of 4816 3240 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe 70 PID 3240 wrote to memory of 4816 3240 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe 70 PID 3240 wrote to memory of 4816 3240 7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe"C:\Users\Admin\AppData\Local\Temp\7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609760.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1502.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1502.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3544.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si156300.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si156300.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56dcfb56af334fcccf0abd4709bde36f2
SHA13a104d3ec3b438b5a59ccefbc9b25a82b9517f04
SHA256bce23d20eac8713e95046e212bab975e2f7e1bbe8e94c262417c5f1856a0e009
SHA5126f03864f3aa7291af334d14ef000a81895139ee82afe9397826a5131107b088479762d588811d7f786febf754115337e7e18a0d6817ee792e6a3ceb6307b7521
-
Filesize
175KB
MD56dcfb56af334fcccf0abd4709bde36f2
SHA13a104d3ec3b438b5a59ccefbc9b25a82b9517f04
SHA256bce23d20eac8713e95046e212bab975e2f7e1bbe8e94c262417c5f1856a0e009
SHA5126f03864f3aa7291af334d14ef000a81895139ee82afe9397826a5131107b088479762d588811d7f786febf754115337e7e18a0d6817ee792e6a3ceb6307b7521
-
Filesize
543KB
MD5b217fd5641f12885a7482edde7de6d9b
SHA18c1d33450e1c01a3f265786f304bba14026f1ec2
SHA25686cc99f4d2de8b311af4523f74e820cc6176fb89b86c64d83e7c7e2139013743
SHA512e023f1150ea996c9e604c5065da4f984e0d99d2e8ae4c7c673cf0cb5852eb1b74b664d73fe20b192e987f6502e7a68785a82022bfa74a97724e7a01cb86805db
-
Filesize
543KB
MD5b217fd5641f12885a7482edde7de6d9b
SHA18c1d33450e1c01a3f265786f304bba14026f1ec2
SHA25686cc99f4d2de8b311af4523f74e820cc6176fb89b86c64d83e7c7e2139013743
SHA512e023f1150ea996c9e604c5065da4f984e0d99d2e8ae4c7c673cf0cb5852eb1b74b664d73fe20b192e987f6502e7a68785a82022bfa74a97724e7a01cb86805db
-
Filesize
292KB
MD5f8beddefa2d809e87e72b23ecb0ca3eb
SHA1b13cb43c7eb8f52bc236a17ca980100a346931b6
SHA2562fd3909c28dac7a86063971c42b80cd48b1a99cd6daf6757ac0e09ccd5b0a5a5
SHA512e7156293d453ae59c62c40255d5f5a6c4428872b6f3d4bea421442b1c8d99bbadbcd922fccf8020ef1a1ea0e0395528143f4bef36208ffc3b41ae1905f15a5b5
-
Filesize
292KB
MD5f8beddefa2d809e87e72b23ecb0ca3eb
SHA1b13cb43c7eb8f52bc236a17ca980100a346931b6
SHA2562fd3909c28dac7a86063971c42b80cd48b1a99cd6daf6757ac0e09ccd5b0a5a5
SHA512e7156293d453ae59c62c40255d5f5a6c4428872b6f3d4bea421442b1c8d99bbadbcd922fccf8020ef1a1ea0e0395528143f4bef36208ffc3b41ae1905f15a5b5
-
Filesize
350KB
MD5a945f3c479278f71dd7b20091f56c96a
SHA10271e93d3d6da6b6664b2ca40b374c6422f1e3da
SHA256f02a4bfb45cda59fda0b87df515e1ff805bab8c70f6b665c3224528cc1ebd519
SHA512cd0dc52710dc12e23d9a796af2682c003297fc78dd2dacb70dcabd37dc697723563e1b0a7794f69f88393c16b8cf7fe27356dacfff5380ae2931cf8c7141e459
-
Filesize
350KB
MD5a945f3c479278f71dd7b20091f56c96a
SHA10271e93d3d6da6b6664b2ca40b374c6422f1e3da
SHA256f02a4bfb45cda59fda0b87df515e1ff805bab8c70f6b665c3224528cc1ebd519
SHA512cd0dc52710dc12e23d9a796af2682c003297fc78dd2dacb70dcabd37dc697723563e1b0a7794f69f88393c16b8cf7fe27356dacfff5380ae2931cf8c7141e459