Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:58
Static task
static1
Behavioral task
behavioral1
Sample
79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe
Resource
win10v2004-20230220-en
General
-
Target
79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe
-
Size
685KB
-
MD5
725cce41eb23b630acd2d5df8ee29464
-
SHA1
3ef52755e80de477fbe48e480acf7c1d4fb56f1c
-
SHA256
79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24
-
SHA512
d32f5ac1fe37585806c0693abc9a72c2b369b0f4e361f5c2f1265e4dbc1c5a636ce904d6399288e71e2ce4bd65194309c2e3ea3ed1e680bf000ecfc28f619ce2
-
SSDEEP
12288:/Mr9y907LVaetQlvDiveovHPxR1pLzTHVd3qv4loBlyIIBr65ES244zJ:uy2VGlvAxRfzTn6vPzyh65ES2bd
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9698.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9698.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4124-189-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-188-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-191-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-193-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-195-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-197-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-201-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-199-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-203-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-205-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-207-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-209-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-211-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-213-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-215-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-217-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-219-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-221-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4124-1109-0x00000000027B0000-0x00000000027C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2764 un927954.exe 4492 pro9698.exe 4124 qu4246.exe 2256 si248797.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9698.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9698.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un927954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un927954.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4764 4492 WerFault.exe 84 2424 4124 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4492 pro9698.exe 4492 pro9698.exe 4124 qu4246.exe 4124 qu4246.exe 2256 si248797.exe 2256 si248797.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4492 pro9698.exe Token: SeDebugPrivilege 4124 qu4246.exe Token: SeDebugPrivilege 2256 si248797.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5036 wrote to memory of 2764 5036 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe 83 PID 5036 wrote to memory of 2764 5036 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe 83 PID 5036 wrote to memory of 2764 5036 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe 83 PID 2764 wrote to memory of 4492 2764 un927954.exe 84 PID 2764 wrote to memory of 4492 2764 un927954.exe 84 PID 2764 wrote to memory of 4492 2764 un927954.exe 84 PID 2764 wrote to memory of 4124 2764 un927954.exe 94 PID 2764 wrote to memory of 4124 2764 un927954.exe 94 PID 2764 wrote to memory of 4124 2764 un927954.exe 94 PID 5036 wrote to memory of 2256 5036 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe 99 PID 5036 wrote to memory of 2256 5036 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe 99 PID 5036 wrote to memory of 2256 5036 79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe"C:\Users\Admin\AppData\Local\Temp\79cf3f1e82ed180f0b13c72c120078a2c402e176416ffc93bf41e765589ecb24.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927954.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927954.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9698.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 10764⤵
- Program crash
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4246.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4246.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 16644⤵
- Program crash
PID:2424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si248797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si248797.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4492 -ip 44921⤵PID:4900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4124 -ip 41241⤵PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e36a882674934639fb446312bd4372b7
SHA16687d6fd47d40fb0f4dc801592c2f4d2ea045c53
SHA2566c2917cfd20ffc5456f78db71d8f1ed9854d94572db7d70054b11b37281d235e
SHA512764f440e6238a49bde05091f3596357b3de9d5fe894505a8c41718ee55ce93d5c85277ae490b5588fb53596a0947462247bc44be31ae8eb6e0a2b7e760343bf4
-
Filesize
175KB
MD5e36a882674934639fb446312bd4372b7
SHA16687d6fd47d40fb0f4dc801592c2f4d2ea045c53
SHA2566c2917cfd20ffc5456f78db71d8f1ed9854d94572db7d70054b11b37281d235e
SHA512764f440e6238a49bde05091f3596357b3de9d5fe894505a8c41718ee55ce93d5c85277ae490b5588fb53596a0947462247bc44be31ae8eb6e0a2b7e760343bf4
-
Filesize
543KB
MD599c4e8aa35fb4ca5d0eae286b72585de
SHA1d2539512cc0ee776cde9ab7d80c69768252b0441
SHA2560f12333c983d28b6f5b1710e0f69cf555f23e9c101786982f3f1c2e28bbb121a
SHA512e76d7577c8eb5acd104af1f06200c330f413704915bfd68d4392d467f8b272e229d1b4fe5a48091f8d98b7adc518d3d36caf68e8b301ad12c4c2bb3a43792e43
-
Filesize
543KB
MD599c4e8aa35fb4ca5d0eae286b72585de
SHA1d2539512cc0ee776cde9ab7d80c69768252b0441
SHA2560f12333c983d28b6f5b1710e0f69cf555f23e9c101786982f3f1c2e28bbb121a
SHA512e76d7577c8eb5acd104af1f06200c330f413704915bfd68d4392d467f8b272e229d1b4fe5a48091f8d98b7adc518d3d36caf68e8b301ad12c4c2bb3a43792e43
-
Filesize
292KB
MD5275870dceda55d15e24f0fcf9f61dbe4
SHA1def238c415d2a96e585257d1b8b82bff2ff79a10
SHA2568608542eeecca5f9ee7f457d4b73ba7ab21b88b447ad03eb56a0e4d0bace814b
SHA512cb56d17a10ee3b209a0f0f770253f62d31f0b9e196ea059bbf3660fac9b50372a570a06842b6588f654527d7899e7cb5dc1b70d3490c66d762a1eba1ab12db8a
-
Filesize
292KB
MD5275870dceda55d15e24f0fcf9f61dbe4
SHA1def238c415d2a96e585257d1b8b82bff2ff79a10
SHA2568608542eeecca5f9ee7f457d4b73ba7ab21b88b447ad03eb56a0e4d0bace814b
SHA512cb56d17a10ee3b209a0f0f770253f62d31f0b9e196ea059bbf3660fac9b50372a570a06842b6588f654527d7899e7cb5dc1b70d3490c66d762a1eba1ab12db8a
-
Filesize
350KB
MD5fe4edd6464803a68e756d6e8155e5fe8
SHA18a0e5430188fe0a07665892081853aaa6909496f
SHA25626a3b75aad9a216e9741bebcf86b0581d2691e5a999d377f012ec19933ccf3b1
SHA512c20f90b7bc083963c67dc10ca9a00f8e4cbadaaf51be39126600be02c6a456554ab161e8ba63b6258260e6b748292a466137bbef6a323d6cfecd58de3de8f80f
-
Filesize
350KB
MD5fe4edd6464803a68e756d6e8155e5fe8
SHA18a0e5430188fe0a07665892081853aaa6909496f
SHA25626a3b75aad9a216e9741bebcf86b0581d2691e5a999d377f012ec19933ccf3b1
SHA512c20f90b7bc083963c67dc10ca9a00f8e4cbadaaf51be39126600be02c6a456554ab161e8ba63b6258260e6b748292a466137bbef6a323d6cfecd58de3de8f80f