Analysis
-
max time kernel
91s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:08
Static task
static1
Behavioral task
behavioral1
Sample
4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe
Resource
win10v2004-20230220-en
General
-
Target
4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe
-
Size
685KB
-
MD5
368f7dad82b39ca2d63f15c6c3c0d410
-
SHA1
0c67cc81fb297678cc6b0c4db6f42da0b4531159
-
SHA256
4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3
-
SHA512
8b489f565c3a870b3f530c088f6befaadf40f7c6bd044fd62ce935787608d139bae5f7bc5ecee12788065a0caf5c71529b0a8cd0c0b286144890a45e12a789c6
-
SSDEEP
12288:OMr8y90WRIJ5pwCmfq2tPrBxkwzSDnE02eTZKvWflACDlM48V:+yo5pVWPrBxkwYnE0rk2HpM48V
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0615.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0615.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2084-191-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-192-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-194-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-196-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-198-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-200-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-202-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-204-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-206-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-208-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-210-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-212-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-214-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-216-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-218-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-220-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-222-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-224-0x0000000005310000-0x000000000534E000-memory.dmp family_redline behavioral1/memory/2084-233-0x0000000002530000-0x0000000002540000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2008 un629177.exe 1288 pro0615.exe 2084 qu2772.exe 224 si205911.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0615.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un629177.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un629177.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2216 1288 WerFault.exe 79 1596 2084 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1288 pro0615.exe 1288 pro0615.exe 2084 qu2772.exe 2084 qu2772.exe 224 si205911.exe 224 si205911.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1288 pro0615.exe Token: SeDebugPrivilege 2084 qu2772.exe Token: SeDebugPrivilege 224 si205911.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3856 wrote to memory of 2008 3856 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe 78 PID 3856 wrote to memory of 2008 3856 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe 78 PID 3856 wrote to memory of 2008 3856 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe 78 PID 2008 wrote to memory of 1288 2008 un629177.exe 79 PID 2008 wrote to memory of 1288 2008 un629177.exe 79 PID 2008 wrote to memory of 1288 2008 un629177.exe 79 PID 2008 wrote to memory of 2084 2008 un629177.exe 88 PID 2008 wrote to memory of 2084 2008 un629177.exe 88 PID 2008 wrote to memory of 2084 2008 un629177.exe 88 PID 3856 wrote to memory of 224 3856 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe 92 PID 3856 wrote to memory of 224 3856 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe 92 PID 3856 wrote to memory of 224 3856 4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe"C:\Users\Admin\AppData\Local\Temp\4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un629177.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un629177.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0615.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 10884⤵
- Program crash
PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2772.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2772.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 13564⤵
- Program crash
PID:1596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205911.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1288 -ip 12881⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2084 -ip 20841⤵PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5863de3cb37053bfce6509ac1bccc98a0
SHA1fc7b3163dacea05b158add41c1c26ac1c58cb56c
SHA25608331949caf4d4f7ab37fbc91cfa8d5d92cb65d6b8446ab8a05ba77a662fb19e
SHA512d3c31586f0d157ba7a4fae7a306ffdd59dc11da725e8e010d6361e2d03de03527c9b58989f34967bbff62c30d1d034a8a6438b2b66fdf949a3ae92fd037d1525
-
Filesize
175KB
MD5863de3cb37053bfce6509ac1bccc98a0
SHA1fc7b3163dacea05b158add41c1c26ac1c58cb56c
SHA25608331949caf4d4f7ab37fbc91cfa8d5d92cb65d6b8446ab8a05ba77a662fb19e
SHA512d3c31586f0d157ba7a4fae7a306ffdd59dc11da725e8e010d6361e2d03de03527c9b58989f34967bbff62c30d1d034a8a6438b2b66fdf949a3ae92fd037d1525
-
Filesize
543KB
MD571246319e81938bf21e8b19efcbaa642
SHA12e24e69ecbb1a0730594e28971f0c9e60fbb408f
SHA256ef37f966783c426c70993db80a49e2e4fbe4bafdb78ac8ab1d5d0ef5a9533c33
SHA512db868472b3ad8880b569cf7c2d90f6935097b9b32ef081af9a4da9d2df2db081e49c476e33e57baad07bd554f7a53d401c60ef26f298fb78de015a8230ac7802
-
Filesize
543KB
MD571246319e81938bf21e8b19efcbaa642
SHA12e24e69ecbb1a0730594e28971f0c9e60fbb408f
SHA256ef37f966783c426c70993db80a49e2e4fbe4bafdb78ac8ab1d5d0ef5a9533c33
SHA512db868472b3ad8880b569cf7c2d90f6935097b9b32ef081af9a4da9d2df2db081e49c476e33e57baad07bd554f7a53d401c60ef26f298fb78de015a8230ac7802
-
Filesize
292KB
MD5676eaf0877bac9225f496b2339a62ea9
SHA14053e6b263dba2223df1899f0e0b88743c262ad4
SHA256fe7eee716e34fc9b9c3dc9595f18a8f75c78667c1f3dd694bfeb4be844a75056
SHA512f2734b1f8a81b2bf8c20467559edb6bfc6033ec4deaa12dc0e41030fff681324e3aff44f1056ac05d37fe2644608b75f7e8081a10cd05ab8ff803cbbfd66db48
-
Filesize
292KB
MD5676eaf0877bac9225f496b2339a62ea9
SHA14053e6b263dba2223df1899f0e0b88743c262ad4
SHA256fe7eee716e34fc9b9c3dc9595f18a8f75c78667c1f3dd694bfeb4be844a75056
SHA512f2734b1f8a81b2bf8c20467559edb6bfc6033ec4deaa12dc0e41030fff681324e3aff44f1056ac05d37fe2644608b75f7e8081a10cd05ab8ff803cbbfd66db48
-
Filesize
350KB
MD5a11d0d2998ae8b8a4223a2b12272dfa2
SHA1d58f14e89437b493c2c9956781e9f2c7f5f99005
SHA256ccd4a5e5d8fe2ab7ed3c2aaf983d1b9e39f0e7e6e5ecc5b64f9a7d307b9a70c7
SHA5123a82d9d3c17fa1d219e74f63e9d4aba8204c2210887147d788a8867e3f0560034609eb615c199936351330b62a91564894816c1d87b8987089a85f81f3884fc2
-
Filesize
350KB
MD5a11d0d2998ae8b8a4223a2b12272dfa2
SHA1d58f14e89437b493c2c9956781e9f2c7f5f99005
SHA256ccd4a5e5d8fe2ab7ed3c2aaf983d1b9e39f0e7e6e5ecc5b64f9a7d307b9a70c7
SHA5123a82d9d3c17fa1d219e74f63e9d4aba8204c2210887147d788a8867e3f0560034609eb615c199936351330b62a91564894816c1d87b8987089a85f81f3884fc2