Analysis
-
max time kernel
50s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:13
Static task
static1
Behavioral task
behavioral1
Sample
7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe
Resource
win10-20230220-en
General
-
Target
7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe
-
Size
686KB
-
MD5
f9ea5beb4cb299e6e0157bdfc342efb5
-
SHA1
b4fbd24f67c428b071871d6f1cc7fb37895f3259
-
SHA256
7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21
-
SHA512
5c53be0dccc36d5d0c62d3c12e91012802f9edc9c9dda501f62bc1127d5675911d265d50de2c4d7ce24c7e96acafe39b61b867a76b5adad2092baffec8afaab8
-
SSDEEP
12288:XMrNy90v3hFzzEA5Hbp8vI1sPa8jbdlLpgpGMjyKmccl0VLT5:uyshlhWI1sPa8jbdlLp23WqVf5
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5019.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1972-181-0x00000000022A0000-0x00000000022E6000-memory.dmp family_redline behavioral1/memory/1972-182-0x0000000004C90000-0x0000000004CD4000-memory.dmp family_redline behavioral1/memory/1972-183-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-184-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-186-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-188-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-190-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-192-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-194-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-196-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-206-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-203-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-198-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-208-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-210-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-212-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-214-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-216-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-218-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/1972-220-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2144 un857140.exe 3196 pro5019.exe 1972 qu8155.exe 3468 si244003.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5019.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un857140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un857140.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3196 pro5019.exe 3196 pro5019.exe 1972 qu8155.exe 1972 qu8155.exe 3468 si244003.exe 3468 si244003.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3196 pro5019.exe Token: SeDebugPrivilege 1972 qu8155.exe Token: SeDebugPrivilege 3468 si244003.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2144 2484 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe 66 PID 2484 wrote to memory of 2144 2484 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe 66 PID 2484 wrote to memory of 2144 2484 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe 66 PID 2144 wrote to memory of 3196 2144 un857140.exe 67 PID 2144 wrote to memory of 3196 2144 un857140.exe 67 PID 2144 wrote to memory of 3196 2144 un857140.exe 67 PID 2144 wrote to memory of 1972 2144 un857140.exe 68 PID 2144 wrote to memory of 1972 2144 un857140.exe 68 PID 2144 wrote to memory of 1972 2144 un857140.exe 68 PID 2484 wrote to memory of 3468 2484 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe 70 PID 2484 wrote to memory of 3468 2484 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe 70 PID 2484 wrote to memory of 3468 2484 7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe"C:\Users\Admin\AppData\Local\Temp\7cb243cfd862dcaa577c0b27aba20f29bb3cb62ba984c848e11c100747ca3b21.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un857140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un857140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5019.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8155.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8155.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si244003.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si244003.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55a3b92879396a5f4335b46caf8730611
SHA16b90417631be00958f60d6cd98be536c3bdfc538
SHA2565b100c893aabe770d39c821b0f6fc4dd636d43d8eeb09423a3b4e0757b8babd7
SHA5127a1338c4ee0ecfb4ca310be0789cfa64d097940e93ae1560f8cddc4db63dec54843f5691584c8c657224c46f398aea986ae96895daded6b4b5255042334ec489
-
Filesize
175KB
MD55a3b92879396a5f4335b46caf8730611
SHA16b90417631be00958f60d6cd98be536c3bdfc538
SHA2565b100c893aabe770d39c821b0f6fc4dd636d43d8eeb09423a3b4e0757b8babd7
SHA5127a1338c4ee0ecfb4ca310be0789cfa64d097940e93ae1560f8cddc4db63dec54843f5691584c8c657224c46f398aea986ae96895daded6b4b5255042334ec489
-
Filesize
544KB
MD5cac060d1e75ceeb9acd24b3e935928ff
SHA14ac280dfe7c490de5adcdb934d263700ff53ae68
SHA2563fee5c0cbcd4c0af36d09255f68496bb84894fac77c8b76b2fe9ca4a84debbe8
SHA5125d967b36540ed20873752de6f1cd932a256cc022033ba105011933293bf867ff13cea674a1e6d800e7c553e01138d3ebd027b0a4e80c0e6c9d85204c445e1044
-
Filesize
544KB
MD5cac060d1e75ceeb9acd24b3e935928ff
SHA14ac280dfe7c490de5adcdb934d263700ff53ae68
SHA2563fee5c0cbcd4c0af36d09255f68496bb84894fac77c8b76b2fe9ca4a84debbe8
SHA5125d967b36540ed20873752de6f1cd932a256cc022033ba105011933293bf867ff13cea674a1e6d800e7c553e01138d3ebd027b0a4e80c0e6c9d85204c445e1044
-
Filesize
292KB
MD53739d8c99773a767df28b904f3173164
SHA1dc7667cd39f2f92004cf31b8f79cc03ad92b899f
SHA256117efd16c76737d0963aa3e039539bf0eae90e13f9a1eb8b2f2a163d16457084
SHA5126dfb74e1714ada17c81c57b8f2dffccea26efb35b8f880c36aa807f5b943d332be91204606c6aeef1322399a6317d593cc50a747bf7230d442be26688ab7d605
-
Filesize
292KB
MD53739d8c99773a767df28b904f3173164
SHA1dc7667cd39f2f92004cf31b8f79cc03ad92b899f
SHA256117efd16c76737d0963aa3e039539bf0eae90e13f9a1eb8b2f2a163d16457084
SHA5126dfb74e1714ada17c81c57b8f2dffccea26efb35b8f880c36aa807f5b943d332be91204606c6aeef1322399a6317d593cc50a747bf7230d442be26688ab7d605
-
Filesize
350KB
MD5186ec166e3308e3024237b1be905edb4
SHA1b83464a477f87b9b9782cef49ae4fcdcfe553614
SHA256d79dbbc60252599fb11dd653bbc0201c577e0489abe2488da618903ce4a9ef78
SHA5125826d4f1870cd3ec7614866faebd2f61a8eb1991d225b834b37ee64d0fb2bf46574eb39a551b219b78ef18a4df1dd3efd91b8b11f9ac83164bb7f2990cf2a5d3
-
Filesize
350KB
MD5186ec166e3308e3024237b1be905edb4
SHA1b83464a477f87b9b9782cef49ae4fcdcfe553614
SHA256d79dbbc60252599fb11dd653bbc0201c577e0489abe2488da618903ce4a9ef78
SHA5125826d4f1870cd3ec7614866faebd2f61a8eb1991d225b834b37ee64d0fb2bf46574eb39a551b219b78ef18a4df1dd3efd91b8b11f9ac83164bb7f2990cf2a5d3