Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe
Resource
win10-20230220-en
General
-
Target
b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe
-
Size
686KB
-
MD5
a9b164eab188b77392d71e88f7fe7b14
-
SHA1
2a4a0d56d8a9dd9abdd038d5f6deaf34e1d84ba8
-
SHA256
b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944
-
SHA512
65a66730ab0d44145e9466211b64104c0c8e250718379c70d2cab6fa2a8ed3147a8d034fe3a0798704c2680fc37e76ee01187a7a9c5131cd7d17a8dc78bb7f70
-
SSDEEP
12288:YMr5y90f+R8XDDaZ+Sn7ggDItzN2AZwxKv04WH8ycbIKsAflYe9u4kx6:RyH8zDAzkRNDw0WoT2fC
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8933.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1448-181-0x00000000025B0000-0x00000000025F6000-memory.dmp family_redline behavioral1/memory/1448-182-0x0000000002640000-0x0000000002684000-memory.dmp family_redline behavioral1/memory/1448-183-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-184-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-186-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-189-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-192-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-196-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-198-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-200-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-202-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-204-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-206-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-208-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-210-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-212-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-214-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-216-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-218-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1448-220-0x0000000002640000-0x000000000267E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2328 un815550.exe 2572 pro8933.exe 1448 qu1746.exe 2300 si841766.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8933.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8933.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un815550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un815550.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2572 pro8933.exe 2572 pro8933.exe 1448 qu1746.exe 1448 qu1746.exe 2300 si841766.exe 2300 si841766.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2572 pro8933.exe Token: SeDebugPrivilege 1448 qu1746.exe Token: SeDebugPrivilege 2300 si841766.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2328 2076 b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe 66 PID 2076 wrote to memory of 2328 2076 b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe 66 PID 2076 wrote to memory of 2328 2076 b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe 66 PID 2328 wrote to memory of 2572 2328 un815550.exe 67 PID 2328 wrote to memory of 2572 2328 un815550.exe 67 PID 2328 wrote to memory of 2572 2328 un815550.exe 67 PID 2328 wrote to memory of 1448 2328 un815550.exe 68 PID 2328 wrote to memory of 1448 2328 un815550.exe 68 PID 2328 wrote to memory of 1448 2328 un815550.exe 68 PID 2076 wrote to memory of 2300 2076 b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe 70 PID 2076 wrote to memory of 2300 2076 b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe 70 PID 2076 wrote to memory of 2300 2076 b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe"C:\Users\Admin\AppData\Local\Temp\b272cc29fbdd087fbf8903e2cad774e92374b0054f683e43e152acf6c29d8944.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un815550.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un815550.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8933.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8933.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1746.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841766.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841766.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb0d11668bb566d8b3dd58e9578b0caf
SHA1a15aec6abb2cf1e122f6ff6ccf2e6a1cf65b6b58
SHA256a8977107f76df835e538d5ae2ce497d68e01058287cd114a7e4f25f3372eeead
SHA5127074cf86fa0d6e377ba0575704f6381c4c2bf8dafd3c3ced0e51ba5d83d0956c98a697e10326659c9090d368f4e1e873254f04e7b581bce414658ef1eabbfd84
-
Filesize
175KB
MD5fb0d11668bb566d8b3dd58e9578b0caf
SHA1a15aec6abb2cf1e122f6ff6ccf2e6a1cf65b6b58
SHA256a8977107f76df835e538d5ae2ce497d68e01058287cd114a7e4f25f3372eeead
SHA5127074cf86fa0d6e377ba0575704f6381c4c2bf8dafd3c3ced0e51ba5d83d0956c98a697e10326659c9090d368f4e1e873254f04e7b581bce414658ef1eabbfd84
-
Filesize
544KB
MD56dd21a1c5658d5b880d208d5015579f9
SHA1127dd95cdf5cd0d98070817905058c3e5f199314
SHA25650feb19095404d04a026c64efd9476c1032f484ea8f9d7209f1dff7432d412c6
SHA512d67b4166f50198e343c419523ef513bec157cffd8c4fc4e613ddf86fbac087d5749e20a279592056faaab1d102870ed125e4829de400f7fe52fd45ced64e2250
-
Filesize
544KB
MD56dd21a1c5658d5b880d208d5015579f9
SHA1127dd95cdf5cd0d98070817905058c3e5f199314
SHA25650feb19095404d04a026c64efd9476c1032f484ea8f9d7209f1dff7432d412c6
SHA512d67b4166f50198e343c419523ef513bec157cffd8c4fc4e613ddf86fbac087d5749e20a279592056faaab1d102870ed125e4829de400f7fe52fd45ced64e2250
-
Filesize
292KB
MD51da7bf6f530fbf8323fb71b8a8b94597
SHA11d1e828e856fd11fb9b1523a12e2daab2ecd1b3e
SHA256776e827e11ff889305d21b09223f4e79002ed807061617c8d7a56d7209500ca2
SHA5129cfdaec5620db5e98b661962e2edb851039934441fa25443b4aa6cf876b518d488382ee84601610c2879a512fc77946ef513d9b32476642342bf470466613662
-
Filesize
292KB
MD51da7bf6f530fbf8323fb71b8a8b94597
SHA11d1e828e856fd11fb9b1523a12e2daab2ecd1b3e
SHA256776e827e11ff889305d21b09223f4e79002ed807061617c8d7a56d7209500ca2
SHA5129cfdaec5620db5e98b661962e2edb851039934441fa25443b4aa6cf876b518d488382ee84601610c2879a512fc77946ef513d9b32476642342bf470466613662
-
Filesize
350KB
MD565411ecffc9f7cbecb5094ff5f1e5f91
SHA1921ffbfe68b35403a19e500b0b7613cf364e0273
SHA25631715029afed7b935ba3c191bd3c47bb5e1f52a0bf294af65b05fb6e9f45ac42
SHA51210c1a1df2e82ee4f48821002751b4fa80f4abdbfe4192314179c94ffbc477f8c0bae14bda1e6048d92f7e3e24cffcb53eaa9c2afef8e1378f71c190868dc53dd
-
Filesize
350KB
MD565411ecffc9f7cbecb5094ff5f1e5f91
SHA1921ffbfe68b35403a19e500b0b7613cf364e0273
SHA25631715029afed7b935ba3c191bd3c47bb5e1f52a0bf294af65b05fb6e9f45ac42
SHA51210c1a1df2e82ee4f48821002751b4fa80f4abdbfe4192314179c94ffbc477f8c0bae14bda1e6048d92f7e3e24cffcb53eaa9c2afef8e1378f71c190868dc53dd