Analysis
-
max time kernel
79s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:56
Static task
static1
Behavioral task
behavioral1
Sample
a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe
Resource
win10v2004-20230220-en
General
-
Target
a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe
-
Size
685KB
-
MD5
925ac5b8d8ca31a084b3179a6521985a
-
SHA1
7800261397c987a47f88789b92c5bee35925766e
-
SHA256
a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf
-
SHA512
e24a552f02cb8e840e01cee14354dc9db20888e7e9285ad34e74111ee4f803a0df2631052087b6dec9ab9415b75f538f727d26b02ed2860213735ae1692cc1f7
-
SSDEEP
12288:1MrJy90yLikRuQVXFypnPiN7gxToFGufEq3iWwrkME57B/D0Eaz/FUpJbl9:8yEQVKLT8DtSWQixD0EkUHbl9
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3958.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3958.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5008-191-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-192-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-194-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-196-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-198-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-200-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-202-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-204-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-206-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-208-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-210-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-212-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-214-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-216-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-218-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-220-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-224-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-222-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/5008-252-0x0000000004E60000-0x0000000004E70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3040 un709586.exe 1992 pro3958.exe 5008 qu0248.exe 2876 si048262.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3958.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un709586.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un709586.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4936 1992 WerFault.exe 86 3832 5008 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1992 pro3958.exe 1992 pro3958.exe 5008 qu0248.exe 5008 qu0248.exe 2876 si048262.exe 2876 si048262.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1992 pro3958.exe Token: SeDebugPrivilege 5008 qu0248.exe Token: SeDebugPrivilege 2876 si048262.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1300 wrote to memory of 3040 1300 a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe 85 PID 1300 wrote to memory of 3040 1300 a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe 85 PID 1300 wrote to memory of 3040 1300 a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe 85 PID 3040 wrote to memory of 1992 3040 un709586.exe 86 PID 3040 wrote to memory of 1992 3040 un709586.exe 86 PID 3040 wrote to memory of 1992 3040 un709586.exe 86 PID 3040 wrote to memory of 5008 3040 un709586.exe 89 PID 3040 wrote to memory of 5008 3040 un709586.exe 89 PID 3040 wrote to memory of 5008 3040 un709586.exe 89 PID 1300 wrote to memory of 2876 1300 a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe 92 PID 1300 wrote to memory of 2876 1300 a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe 92 PID 1300 wrote to memory of 2876 1300 a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe"C:\Users\Admin\AppData\Local\Temp\a92b2c2708b0970df9854a8447ebb0b30f5c3846aa4db37d27a30c0bbeeb91cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un709586.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un709586.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3958.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3958.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 10884⤵
- Program crash
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0248.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0248.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 21004⤵
- Program crash
PID:3832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si048262.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si048262.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1992 -ip 19921⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5008 -ip 50081⤵PID:3376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c9d889d03916dd59766dcd972940445a
SHA1fac006d18e0b032cfb4e4cc8e5e1df9767f97024
SHA256cd9685ac46ac4b54afd6e5224df7452884de14de76fa218319046d773e0629b9
SHA51207cb3dc5bbaff31917ab946f0799ed3c4343fc529c4c758836e5235f132df4a205e30baf1f35b57011ff659da5d08b7e3d76352ed4ec8cdf219f0b9e27bfacd5
-
Filesize
175KB
MD5c9d889d03916dd59766dcd972940445a
SHA1fac006d18e0b032cfb4e4cc8e5e1df9767f97024
SHA256cd9685ac46ac4b54afd6e5224df7452884de14de76fa218319046d773e0629b9
SHA51207cb3dc5bbaff31917ab946f0799ed3c4343fc529c4c758836e5235f132df4a205e30baf1f35b57011ff659da5d08b7e3d76352ed4ec8cdf219f0b9e27bfacd5
-
Filesize
543KB
MD5beab1b2d21ce733263e309c61c156f1d
SHA10c7306a357d60944b3ffc08ba5cc32430f96fa29
SHA256382be2fd15d403f98d7754d44102bfbf02e41de1693c4eb21fabbdea1cce71b1
SHA51226d34f634dc925cc809571dda15cdaa51c6c3673da655ae3b9d375876f292cbf6d5bb8630dbe3d2e14f2b0841c30142cdb1d97ba372212bf3f299c18ee120cef
-
Filesize
543KB
MD5beab1b2d21ce733263e309c61c156f1d
SHA10c7306a357d60944b3ffc08ba5cc32430f96fa29
SHA256382be2fd15d403f98d7754d44102bfbf02e41de1693c4eb21fabbdea1cce71b1
SHA51226d34f634dc925cc809571dda15cdaa51c6c3673da655ae3b9d375876f292cbf6d5bb8630dbe3d2e14f2b0841c30142cdb1d97ba372212bf3f299c18ee120cef
-
Filesize
292KB
MD54c1c12d504ca5e5306ef57169fe67597
SHA1d1368ac38258f8f22b4cd7c904c2b54541dd654b
SHA256b11ff5227d8ad9f92bdf89ab867d49c358d094c19fc9a348baf90930beca634b
SHA5129c7a073ce8d92cb89139873e346fa75ce333c91e9f410b86be367c1be324fbf3b67cea31da1cde44444c11ba24f60c4b3764be55249cd1d53f6be6c12696f705
-
Filesize
292KB
MD54c1c12d504ca5e5306ef57169fe67597
SHA1d1368ac38258f8f22b4cd7c904c2b54541dd654b
SHA256b11ff5227d8ad9f92bdf89ab867d49c358d094c19fc9a348baf90930beca634b
SHA5129c7a073ce8d92cb89139873e346fa75ce333c91e9f410b86be367c1be324fbf3b67cea31da1cde44444c11ba24f60c4b3764be55249cd1d53f6be6c12696f705
-
Filesize
350KB
MD5b1ced7b58ee839cfe836dfe2065ae146
SHA1eafafaccab5b0b08504bd403ca8b582edef6e68f
SHA256f33cfb288adb6f8e8e5d63796ca9a13e62f2536f13db275d43f767a4a3e0f4d1
SHA51223ff35b2ea9127b74d37a9094518e0d0450c6f1fc5aabfdbb36f933d3fbfc1f4d2800c30460f9712dce12c3337efc1131c4747cc09c0d2b8d697798607c39f3e
-
Filesize
350KB
MD5b1ced7b58ee839cfe836dfe2065ae146
SHA1eafafaccab5b0b08504bd403ca8b582edef6e68f
SHA256f33cfb288adb6f8e8e5d63796ca9a13e62f2536f13db275d43f767a4a3e0f4d1
SHA51223ff35b2ea9127b74d37a9094518e0d0450c6f1fc5aabfdbb36f933d3fbfc1f4d2800c30460f9712dce12c3337efc1131c4747cc09c0d2b8d697798607c39f3e