Analysis
-
max time kernel
82s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:12
Static task
static1
Behavioral task
behavioral1
Sample
4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe
Resource
win10v2004-20230220-en
General
-
Target
4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe
-
Size
686KB
-
MD5
e5f9212180cc22c56345dda510d84d98
-
SHA1
0e8e7f4bb11926ef6d4269a1f2f844adef7a4f2b
-
SHA256
4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5
-
SHA512
52a1162c686f4e2a4790f337829335df1ce33524120b35b3b6797299148c61dfe0fdb0b16954593103cf5d03f460974ef959cba700d6146c1d11c99ec9ac2ef5
-
SSDEEP
12288:IMrKy90Xsfp7Ja3I/TxTkS8GPCSdj3GFf8Bf5R0YKZsyl+pwhIHhm:iyushda36CGPCi3GFKc1vyHhm
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9148.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9148.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4844-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-225-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4844-1113-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5032 un396925.exe 4944 pro9148.exe 4844 qu8264.exe 4448 si062377.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9148.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un396925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un396925.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 220 4944 WerFault.exe 83 5112 4844 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 pro9148.exe 4944 pro9148.exe 4844 qu8264.exe 4844 qu8264.exe 4448 si062377.exe 4448 si062377.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 pro9148.exe Token: SeDebugPrivilege 4844 qu8264.exe Token: SeDebugPrivilege 4448 si062377.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4632 wrote to memory of 5032 4632 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe 82 PID 4632 wrote to memory of 5032 4632 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe 82 PID 4632 wrote to memory of 5032 4632 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe 82 PID 5032 wrote to memory of 4944 5032 un396925.exe 83 PID 5032 wrote to memory of 4944 5032 un396925.exe 83 PID 5032 wrote to memory of 4944 5032 un396925.exe 83 PID 5032 wrote to memory of 4844 5032 un396925.exe 90 PID 5032 wrote to memory of 4844 5032 un396925.exe 90 PID 5032 wrote to memory of 4844 5032 un396925.exe 90 PID 4632 wrote to memory of 4448 4632 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe 94 PID 4632 wrote to memory of 4448 4632 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe 94 PID 4632 wrote to memory of 4448 4632 4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe"C:\Users\Admin\AppData\Local\Temp\4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9148.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9148.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 10844⤵
- Program crash
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8264.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 13484⤵
- Program crash
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si062377.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si062377.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4944 -ip 49441⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4844 -ip 48441⤵PID:4784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58e760a607ee3f02a2271286e5a5985e6
SHA1886e287de76f961f10b82f33fe750ef2b892ba85
SHA2569fdf81ee4042922b4dccfafa680ea61f970421aa7e713492ec04d195cb44f751
SHA51298fd411afa65a218c5f39483a3c115ba80260716e20eac5a105c27e9018b641b4b069220a033954833cd7922ef9d3c152db7b3338390898ee8611c6c31a724ca
-
Filesize
175KB
MD58e760a607ee3f02a2271286e5a5985e6
SHA1886e287de76f961f10b82f33fe750ef2b892ba85
SHA2569fdf81ee4042922b4dccfafa680ea61f970421aa7e713492ec04d195cb44f751
SHA51298fd411afa65a218c5f39483a3c115ba80260716e20eac5a105c27e9018b641b4b069220a033954833cd7922ef9d3c152db7b3338390898ee8611c6c31a724ca
-
Filesize
544KB
MD595174f43434c4eab6617f666cee14311
SHA1901a73a9840ce02c6a1be099956cb124721d83bc
SHA256c57dc6734170c74b255d523e0baf0ff3509d98fe4bc38ef10774514b4775ec88
SHA512f54453811f23650dfa4f8a4ab2eb3f7fa2fd0f6dd63e11f80582880500f9c4ef7ec946948cc4e2b8d3dc471e87f04eeb17158319e28bdf8be725e1db230fa589
-
Filesize
544KB
MD595174f43434c4eab6617f666cee14311
SHA1901a73a9840ce02c6a1be099956cb124721d83bc
SHA256c57dc6734170c74b255d523e0baf0ff3509d98fe4bc38ef10774514b4775ec88
SHA512f54453811f23650dfa4f8a4ab2eb3f7fa2fd0f6dd63e11f80582880500f9c4ef7ec946948cc4e2b8d3dc471e87f04eeb17158319e28bdf8be725e1db230fa589
-
Filesize
292KB
MD5d125862b25a3bf2f09b892cdd65eada4
SHA189c15790483ce7578b1982109e267f744344177e
SHA256e7f7425f59bcf4ee14f3edded2ddebe7a835a993b9de6a92b0500a0909df9b55
SHA51228ac963785ab20f7a80c674b10b19bf84b2508be2af88a18ac5251b0ac60f4f51a856ede0414c7872b2f02742829d1236783f712055f919b7f657f234baef18f
-
Filesize
292KB
MD5d125862b25a3bf2f09b892cdd65eada4
SHA189c15790483ce7578b1982109e267f744344177e
SHA256e7f7425f59bcf4ee14f3edded2ddebe7a835a993b9de6a92b0500a0909df9b55
SHA51228ac963785ab20f7a80c674b10b19bf84b2508be2af88a18ac5251b0ac60f4f51a856ede0414c7872b2f02742829d1236783f712055f919b7f657f234baef18f
-
Filesize
350KB
MD5c39ec450ff9e03568e922c2c7ac14b00
SHA184f0047eee220dacc8eca70822f3d5a908403641
SHA2568727011af99e685e88dfa8c3fedb84d029b7e984180db39538395b1a49c4562a
SHA5120718a2c28e2327badbd764e20d40b4834b9542d6a2265f72ebcace39b5bfb14aa9c4cc3eb2f6a21a36e48c542051e5526f508819c7259907ac2e3cbe7003cce5
-
Filesize
350KB
MD5c39ec450ff9e03568e922c2c7ac14b00
SHA184f0047eee220dacc8eca70822f3d5a908403641
SHA2568727011af99e685e88dfa8c3fedb84d029b7e984180db39538395b1a49c4562a
SHA5120718a2c28e2327badbd764e20d40b4834b9542d6a2265f72ebcace39b5bfb14aa9c4cc3eb2f6a21a36e48c542051e5526f508819c7259907ac2e3cbe7003cce5