Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:05
Static task
static1
Behavioral task
behavioral1
Sample
6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe
Resource
win10-20230220-en
General
-
Target
6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe
-
Size
685KB
-
MD5
aa1954f01bf2372ea6d7e1f6ae360780
-
SHA1
86d8495cd6b7c06b4c616be6ac1bd8ab4f3f8c2a
-
SHA256
6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663
-
SHA512
bbf96a72de075a82cf5220002acf8a421cc86fbd4e75b2889f907ee34678999ab6a38c268373521ddfd45632518700d3dfbc53c55f451943b5a6107ddde45f4e
-
SSDEEP
12288:hMrey90kGTQhJNY9FFTjzAtPmwIgNF4sfmKpcpgjlKqBKIDullvgEqG:HyzEg4FTPAtuCN6sr+gJKH/voW
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2359.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/952-178-0x00000000027D0000-0x0000000002816000-memory.dmp family_redline behavioral1/memory/952-182-0x0000000004CC0000-0x0000000004D04000-memory.dmp family_redline behavioral1/memory/952-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-184-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-186-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-188-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-210-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-214-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/952-1099-0x0000000004DE0000-0x0000000004DF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 512 un479959.exe 924 pro2359.exe 952 qu4187.exe 3800 si644730.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2359.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un479959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un479959.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 924 pro2359.exe 924 pro2359.exe 952 qu4187.exe 952 qu4187.exe 3800 si644730.exe 3800 si644730.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 924 pro2359.exe Token: SeDebugPrivilege 952 qu4187.exe Token: SeDebugPrivilege 3800 si644730.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1780 wrote to memory of 512 1780 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe 66 PID 1780 wrote to memory of 512 1780 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe 66 PID 1780 wrote to memory of 512 1780 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe 66 PID 512 wrote to memory of 924 512 un479959.exe 67 PID 512 wrote to memory of 924 512 un479959.exe 67 PID 512 wrote to memory of 924 512 un479959.exe 67 PID 512 wrote to memory of 952 512 un479959.exe 68 PID 512 wrote to memory of 952 512 un479959.exe 68 PID 512 wrote to memory of 952 512 un479959.exe 68 PID 1780 wrote to memory of 3800 1780 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe 70 PID 1780 wrote to memory of 3800 1780 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe 70 PID 1780 wrote to memory of 3800 1780 6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe"C:\Users\Admin\AppData\Local\Temp\6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479959.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2359.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4187.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644730.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5280b7ea781e31ed22d5cef23b3a3f78d
SHA198aff95648db08491dec414efe336201e92a7c27
SHA2560ee7f90e13c8a9831b0e43541c19fe6cf0f5c1e0261b430871a63dd9367bd366
SHA5124847af3697b7599a68d65a4432d8e157030a8c314cbdb026dfd770a8723b08ab41867339a9aa3d2f83043c4d9842f5eec35c1e273cdab84624bfc4f380a46653
-
Filesize
175KB
MD5280b7ea781e31ed22d5cef23b3a3f78d
SHA198aff95648db08491dec414efe336201e92a7c27
SHA2560ee7f90e13c8a9831b0e43541c19fe6cf0f5c1e0261b430871a63dd9367bd366
SHA5124847af3697b7599a68d65a4432d8e157030a8c314cbdb026dfd770a8723b08ab41867339a9aa3d2f83043c4d9842f5eec35c1e273cdab84624bfc4f380a46653
-
Filesize
544KB
MD5c8dac05231194b3cce1940dce4e6b057
SHA12121c71dda07bfea54c28dbd67c891a750f23438
SHA256175629421b649f5814ad4081f1fb00b79904855da934b1a7750343e535a4c4d8
SHA5122e292d4de68bed4489ff7a8162c3a1aff92fd328311a615e570f481baca1adb70279368d29af9e902bc35223893a880a5a13231d84f8b0e707e72f0eef28dbc2
-
Filesize
544KB
MD5c8dac05231194b3cce1940dce4e6b057
SHA12121c71dda07bfea54c28dbd67c891a750f23438
SHA256175629421b649f5814ad4081f1fb00b79904855da934b1a7750343e535a4c4d8
SHA5122e292d4de68bed4489ff7a8162c3a1aff92fd328311a615e570f481baca1adb70279368d29af9e902bc35223893a880a5a13231d84f8b0e707e72f0eef28dbc2
-
Filesize
292KB
MD5e6f6a36e27234513464fbb560b467fe0
SHA17083c9b55f660f93d7f9c0a2721e431a7ef05892
SHA2565de3380daca8c0ae2c33475f21e21f95e6f21ca4b0fb050a0913464b98ccda1d
SHA512e9843c3ae1048069c9210de61bd95568f51ef9b8328a01e40108b84908ea360d6a0dfe64517c567ed4533f29d1bcdaf794352b6f006789b8a67d74955bbcac42
-
Filesize
292KB
MD5e6f6a36e27234513464fbb560b467fe0
SHA17083c9b55f660f93d7f9c0a2721e431a7ef05892
SHA2565de3380daca8c0ae2c33475f21e21f95e6f21ca4b0fb050a0913464b98ccda1d
SHA512e9843c3ae1048069c9210de61bd95568f51ef9b8328a01e40108b84908ea360d6a0dfe64517c567ed4533f29d1bcdaf794352b6f006789b8a67d74955bbcac42
-
Filesize
350KB
MD50ec84b52b0540e525d0a3df3f02ecfec
SHA1ad4e6f366629004eb7b44dd46aff3198bc1b7f50
SHA2567cc8b1d21674347e9736c5b3b39c02c158c6203522043a01768a0f1727f2c6df
SHA5123040cc6b0e450439f8ff9e4508edb252f603e7e1f9d8723dae5c710d29a22399caa7bc8d691667718ffe8f20429dcc1dbcc7b1561fbe74073e420a27bcbb4b22
-
Filesize
350KB
MD50ec84b52b0540e525d0a3df3f02ecfec
SHA1ad4e6f366629004eb7b44dd46aff3198bc1b7f50
SHA2567cc8b1d21674347e9736c5b3b39c02c158c6203522043a01768a0f1727f2c6df
SHA5123040cc6b0e450439f8ff9e4508edb252f603e7e1f9d8723dae5c710d29a22399caa7bc8d691667718ffe8f20429dcc1dbcc7b1561fbe74073e420a27bcbb4b22