Analysis
-
max time kernel
61s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe
Resource
win10v2004-20230220-en
General
-
Target
4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe
-
Size
685KB
-
MD5
2e89edb5513ac823e69c023af7e2ad9e
-
SHA1
bed12b15e687f4873b840af32112bdf2423667b9
-
SHA256
4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257
-
SHA512
74580022765856abc37533e0b988958ffcdd1ef84c9fad42d65e611263b76360be73e0683ee40f713075f7dad92e7494f9296cdf135fa92343196f873765c46c
-
SSDEEP
12288:GMrMy908Muej/Y52o3wzSkU4We2JWHn3tlaE331wBBCIEnn3g2BpIZdZeL:2yVMuejPInWWnJWXJmLCIEn1BMfeL
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6025.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/232-191-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-192-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-194-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-196-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-198-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-200-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-202-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-204-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-206-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-208-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-210-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-212-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-214-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-216-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-218-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-220-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-222-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/232-224-0x0000000002660000-0x000000000269E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4268 un582699.exe 4532 pro6025.exe 232 qu2123.exe 3516 si971541.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6025.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un582699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un582699.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1756 4532 WerFault.exe 83 1516 232 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4532 pro6025.exe 4532 pro6025.exe 232 qu2123.exe 232 qu2123.exe 3516 si971541.exe 3516 si971541.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4532 pro6025.exe Token: SeDebugPrivilege 232 qu2123.exe Token: SeDebugPrivilege 3516 si971541.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3808 wrote to memory of 4268 3808 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe 82 PID 3808 wrote to memory of 4268 3808 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe 82 PID 3808 wrote to memory of 4268 3808 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe 82 PID 4268 wrote to memory of 4532 4268 un582699.exe 83 PID 4268 wrote to memory of 4532 4268 un582699.exe 83 PID 4268 wrote to memory of 4532 4268 un582699.exe 83 PID 4268 wrote to memory of 232 4268 un582699.exe 86 PID 4268 wrote to memory of 232 4268 un582699.exe 86 PID 4268 wrote to memory of 232 4268 un582699.exe 86 PID 3808 wrote to memory of 3516 3808 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe 90 PID 3808 wrote to memory of 3516 3808 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe 90 PID 3808 wrote to memory of 3516 3808 4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe"C:\Users\Admin\AppData\Local\Temp\4cc059bdd240bac7d2eb64b7aebf8c4ce81ac100fa699352d6706308b1df8257.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un582699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6025.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6025.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 10884⤵
- Program crash
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2123.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2123.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 16924⤵
- Program crash
PID:1516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si971541.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4532 -ip 45321⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 232 -ip 2321⤵PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cf37592f554e23533225b4f211b779ea
SHA151441ca080c3fcf66fb3e733de77704d23cd3666
SHA2566bbff2969cc61fb1e3098210e36a9ee32ffa864b54ffb14a3f6b955081ecd2cc
SHA5120437356ea002909951a4e2282c2a6d22d97eb339518bcc51d911eba21db82e9c430883b11261361e770180bdd6b2366341cb83178058a022feef7ebdbe1aed26
-
Filesize
175KB
MD5cf37592f554e23533225b4f211b779ea
SHA151441ca080c3fcf66fb3e733de77704d23cd3666
SHA2566bbff2969cc61fb1e3098210e36a9ee32ffa864b54ffb14a3f6b955081ecd2cc
SHA5120437356ea002909951a4e2282c2a6d22d97eb339518bcc51d911eba21db82e9c430883b11261361e770180bdd6b2366341cb83178058a022feef7ebdbe1aed26
-
Filesize
543KB
MD58c728d6903b85bf4409fb2f28b7872b8
SHA1db681aa8722596b2a852b44e4cafea256e619fe3
SHA256ff1fd4da02a5ae1590ccc15deba82237689af6effd4cb87dcbdacabb9ccf6c85
SHA5120b6e1982c88508eb26f8ec08f92bb0fd93729dd94587e86566fcb84d256d603096260a241aacbdbefc865ff9111219d3a9bce067c728dbafea247f95cc9dfad6
-
Filesize
543KB
MD58c728d6903b85bf4409fb2f28b7872b8
SHA1db681aa8722596b2a852b44e4cafea256e619fe3
SHA256ff1fd4da02a5ae1590ccc15deba82237689af6effd4cb87dcbdacabb9ccf6c85
SHA5120b6e1982c88508eb26f8ec08f92bb0fd93729dd94587e86566fcb84d256d603096260a241aacbdbefc865ff9111219d3a9bce067c728dbafea247f95cc9dfad6
-
Filesize
292KB
MD5e6b1b2abd9b3e58ba2a4e974d5900b3f
SHA15768b4b06333556ad0bf2106a232317e16bcdd58
SHA256fe9f7234efbab2c0bc5c8de715f9dcc8ba4731f95675df57104ab22c5af674a0
SHA512f0dabf22340bba27b5a8bbe6ff87b8b1020d0666f9e7058f2a3c6375f694d1bb07ca1aa2d565e9d349dcacb39ac88f17ea264f1ece148f50864b1b6b3cabb592
-
Filesize
292KB
MD5e6b1b2abd9b3e58ba2a4e974d5900b3f
SHA15768b4b06333556ad0bf2106a232317e16bcdd58
SHA256fe9f7234efbab2c0bc5c8de715f9dcc8ba4731f95675df57104ab22c5af674a0
SHA512f0dabf22340bba27b5a8bbe6ff87b8b1020d0666f9e7058f2a3c6375f694d1bb07ca1aa2d565e9d349dcacb39ac88f17ea264f1ece148f50864b1b6b3cabb592
-
Filesize
350KB
MD59fc53d88ff2982c5eb857a70d0505f88
SHA1e838ee332ae4253f2d9fa28943186e8ab4c6c456
SHA2561374f0b17d8424848dd8c661442df5b4d69a83a5a2f4cf0cd41c7eac86d32abf
SHA512497c5613d342ee40b52b041273fc9b20af0df06a81ae11185c11a14fcf1464325e1beb5635ab7434f87a6b7b2988c952c85287b39a9ebd8e4108b019e5d98165
-
Filesize
350KB
MD59fc53d88ff2982c5eb857a70d0505f88
SHA1e838ee332ae4253f2d9fa28943186e8ab4c6c456
SHA2561374f0b17d8424848dd8c661442df5b4d69a83a5a2f4cf0cd41c7eac86d32abf
SHA512497c5613d342ee40b52b041273fc9b20af0df06a81ae11185c11a14fcf1464325e1beb5635ab7434f87a6b7b2988c952c85287b39a9ebd8e4108b019e5d98165