Analysis
-
max time kernel
65s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:50
Static task
static1
Behavioral task
behavioral1
Sample
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe
Resource
win10v2004-20230220-en
General
-
Target
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe
-
Size
685KB
-
MD5
0c4bf728035c00a762008b153586681a
-
SHA1
093e863c446f4ee217ceeb9599ba5f87cd6e2b00
-
SHA256
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd
-
SHA512
e7580cab46c92a406fe095d4f69f226e7a868c6ffe2342609f42307ad36ad42fa36db78137ed58c18ecdbd214c08b44d3bf474585e4e47e830ecfc39af27ef9f
-
SSDEEP
12288:nMrGy90majJWUsYa48ulwEFs3YCGiXsSBH1zTHVhgsnnRpAKBz8gEiUuP5zb9g:dyUo//4FaEOtL/VzTvgsnnRjp8gE1uxO
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7284.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7284.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7284.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7284.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7284.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7284.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4488-191-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-200-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-204-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-206-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-208-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-210-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-212-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-214-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-220-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-218-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-216-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-223-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-226-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/4488-1108-0x0000000004E00000-0x0000000004E10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3824 un180532.exe 860 pro7284.exe 4488 qu9778.exe 4068 si031051.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7284.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7284.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un180532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un180532.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2568 860 WerFault.exe 84 4884 4488 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 860 pro7284.exe 860 pro7284.exe 4488 qu9778.exe 4488 qu9778.exe 4068 si031051.exe 4068 si031051.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 860 pro7284.exe Token: SeDebugPrivilege 4488 qu9778.exe Token: SeDebugPrivilege 4068 si031051.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3824 2376 cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe 83 PID 2376 wrote to memory of 3824 2376 cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe 83 PID 2376 wrote to memory of 3824 2376 cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe 83 PID 3824 wrote to memory of 860 3824 un180532.exe 84 PID 3824 wrote to memory of 860 3824 un180532.exe 84 PID 3824 wrote to memory of 860 3824 un180532.exe 84 PID 3824 wrote to memory of 4488 3824 un180532.exe 90 PID 3824 wrote to memory of 4488 3824 un180532.exe 90 PID 3824 wrote to memory of 4488 3824 un180532.exe 90 PID 2376 wrote to memory of 4068 2376 cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe 94 PID 2376 wrote to memory of 4068 2376 cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe 94 PID 2376 wrote to memory of 4068 2376 cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe"C:\Users\Admin\AppData\Local\Temp\cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180532.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7284.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7284.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 10844⤵
- Program crash
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 19404⤵
- Program crash
PID:4884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031051.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 860 -ip 8601⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:3904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56346a8748bf058eaa8e3a029a788973b
SHA189e678bcb4b8bbd1584e5de9cdc9654a9b7c26cb
SHA2568dae56bc3350bd1256ca826c142335a493c61afc928f57f86386918dddc10138
SHA51231684ef4ede2d95eb67f82c8ae6a505f45f88ef950e317cd2de5c907dfc79c1c4aaecbf35f829c4f15c9ef78f475bbc8d622bc3bd839b23fb8246227d2a8eb09
-
Filesize
175KB
MD56346a8748bf058eaa8e3a029a788973b
SHA189e678bcb4b8bbd1584e5de9cdc9654a9b7c26cb
SHA2568dae56bc3350bd1256ca826c142335a493c61afc928f57f86386918dddc10138
SHA51231684ef4ede2d95eb67f82c8ae6a505f45f88ef950e317cd2de5c907dfc79c1c4aaecbf35f829c4f15c9ef78f475bbc8d622bc3bd839b23fb8246227d2a8eb09
-
Filesize
543KB
MD5d5c3bf9ad3083eed7455d06b73e2d319
SHA1028c7d7b285848a7794b0f1f336f654ca4c445f6
SHA256f87cbbd88825487d7997b15cae6648cb5c063a8b38c7a6ec876ec93a80f0a98f
SHA5127f9e157b70243f450e1f508bbd9c096856473b105e5db704b1853f80153e2ffed8b0dc18f14f35bef8154e2a22f302809f01f2d4a68d20acc6dafd78b3656929
-
Filesize
543KB
MD5d5c3bf9ad3083eed7455d06b73e2d319
SHA1028c7d7b285848a7794b0f1f336f654ca4c445f6
SHA256f87cbbd88825487d7997b15cae6648cb5c063a8b38c7a6ec876ec93a80f0a98f
SHA5127f9e157b70243f450e1f508bbd9c096856473b105e5db704b1853f80153e2ffed8b0dc18f14f35bef8154e2a22f302809f01f2d4a68d20acc6dafd78b3656929
-
Filesize
292KB
MD5369e95e51729a22a25957712385bab68
SHA11d309ddf4320ce69a11f573ca39ecf7f3e886d8b
SHA256c53a7e02c381fd89a56b0aab8b1a996f58f203599f8348b04b3f2e1b0a99a2e7
SHA5127ed03e104e12528e8d940d6b1c87432e9b7ed965bab1dc2a9f578f8e49d11be990df6925d1ea4fd01d07f492e78c55088133b5551df716d1afc9f1eb870363ee
-
Filesize
292KB
MD5369e95e51729a22a25957712385bab68
SHA11d309ddf4320ce69a11f573ca39ecf7f3e886d8b
SHA256c53a7e02c381fd89a56b0aab8b1a996f58f203599f8348b04b3f2e1b0a99a2e7
SHA5127ed03e104e12528e8d940d6b1c87432e9b7ed965bab1dc2a9f578f8e49d11be990df6925d1ea4fd01d07f492e78c55088133b5551df716d1afc9f1eb870363ee
-
Filesize
350KB
MD5f504e8077c89428bd7c28bb9ecce2119
SHA12bdb574df0c84482d5b19cb14ac28828a59ae26d
SHA2569ae1cfdbaffc451da29bc31ec55bf4e663b5c659b6f34e0d538a66a03121e314
SHA512f971788436e4d9dfa12553bf4eb34c78985118f38ce0e3f943afdbf49878d1823c80c12b99475b4a3027b963cd594266cfdae6e2e20eecf1f5619645f21fd918
-
Filesize
350KB
MD5f504e8077c89428bd7c28bb9ecce2119
SHA12bdb574df0c84482d5b19cb14ac28828a59ae26d
SHA2569ae1cfdbaffc451da29bc31ec55bf4e663b5c659b6f34e0d538a66a03121e314
SHA512f971788436e4d9dfa12553bf4eb34c78985118f38ce0e3f943afdbf49878d1823c80c12b99475b4a3027b963cd594266cfdae6e2e20eecf1f5619645f21fd918