Analysis
-
max time kernel
50s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:27
Static task
static1
Behavioral task
behavioral1
Sample
8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe
Resource
win10-20230220-en
General
-
Target
8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe
-
Size
685KB
-
MD5
3373edb3d88329229d97f1eda61aab6c
-
SHA1
8deabab3a00ca4b32388bfed1d0a8d0a08b4d41a
-
SHA256
8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92
-
SHA512
6bf18eac35875d8b46cfb6a09011167a87b6fd384178d8704e43b1aa2e805e337abca48cb0da940b7f2d57a97025f2adf74925912da657d3df9016f175c65305
-
SSDEEP
12288:bMrBy90LkBCCzrOC6lXzURraj9/cjh/ZhXtcPmjvNxXB7BBavEMXiFXTXB1W3ctL:2y0gSjae9/cjznVvNxXZ7avEMSRxoMd
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9454.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3620-181-0x0000000004C80000-0x0000000004CC6000-memory.dmp family_redline behavioral1/memory/3620-182-0x0000000004D00000-0x0000000004D44000-memory.dmp family_redline behavioral1/memory/3620-183-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-184-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-186-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-188-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-190-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-212-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-214-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-216-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-218-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/3620-220-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4268 un936606.exe 2396 pro9454.exe 3620 qu2518.exe 4260 si947188.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9454.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un936606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un936606.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2396 pro9454.exe 2396 pro9454.exe 3620 qu2518.exe 3620 qu2518.exe 4260 si947188.exe 4260 si947188.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2396 pro9454.exe Token: SeDebugPrivilege 3620 qu2518.exe Token: SeDebugPrivilege 4260 si947188.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 400 wrote to memory of 4268 400 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe 66 PID 400 wrote to memory of 4268 400 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe 66 PID 400 wrote to memory of 4268 400 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe 66 PID 4268 wrote to memory of 2396 4268 un936606.exe 67 PID 4268 wrote to memory of 2396 4268 un936606.exe 67 PID 4268 wrote to memory of 2396 4268 un936606.exe 67 PID 4268 wrote to memory of 3620 4268 un936606.exe 68 PID 4268 wrote to memory of 3620 4268 un936606.exe 68 PID 4268 wrote to memory of 3620 4268 un936606.exe 68 PID 400 wrote to memory of 4260 400 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe 70 PID 400 wrote to memory of 4260 400 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe 70 PID 400 wrote to memory of 4260 400 8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe"C:\Users\Admin\AppData\Local\Temp\8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936606.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936606.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9454.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2518.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2518.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947188.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947188.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50ae2ff02889ac0c87e8ae99e3e3670f7
SHA190cea670bb8286b95f99f186a6bcfd34d84e455a
SHA256ad93b083cbb0f88f7087cbad99201020667241c8bcdc932bde64e7ce85f333cc
SHA512954237dc458966378ef5f71189adaaa784fedd833753baeee529b8e05230fe5b7217aa0f3f9ed819c2a5326b08fe6a3159834b0100f84f721d4b3e3934c520d9
-
Filesize
175KB
MD50ae2ff02889ac0c87e8ae99e3e3670f7
SHA190cea670bb8286b95f99f186a6bcfd34d84e455a
SHA256ad93b083cbb0f88f7087cbad99201020667241c8bcdc932bde64e7ce85f333cc
SHA512954237dc458966378ef5f71189adaaa784fedd833753baeee529b8e05230fe5b7217aa0f3f9ed819c2a5326b08fe6a3159834b0100f84f721d4b3e3934c520d9
-
Filesize
543KB
MD571cf28c461250a761a4142a645e1e039
SHA16ecb94e4490d3d2bb8f776a56abf2238ea833d17
SHA256576abd2771f21959fd7d5fe526fb92031ac31dbe5b8c7f93608c2b89b34b2d9f
SHA512c2ad4ee6e1958102959395a703ddbc5f9c10c0292839aaacf3f21e05899d3268281d477821eaaf36bc2921dc4fd396a8e6321d787fe0fd2d843f021da7953434
-
Filesize
543KB
MD571cf28c461250a761a4142a645e1e039
SHA16ecb94e4490d3d2bb8f776a56abf2238ea833d17
SHA256576abd2771f21959fd7d5fe526fb92031ac31dbe5b8c7f93608c2b89b34b2d9f
SHA512c2ad4ee6e1958102959395a703ddbc5f9c10c0292839aaacf3f21e05899d3268281d477821eaaf36bc2921dc4fd396a8e6321d787fe0fd2d843f021da7953434
-
Filesize
292KB
MD5f0a701e6d9a5251e9aa2025c256d7f51
SHA1216ab846c90e36c7e3727b3887875d954cb2a5b7
SHA256be35e80f1c6d852fdd1d992c3b6b2d4fde33bc0d6179984f24120c153eda9ef0
SHA51254023fa6e4681dd8e5a990c79a439af689c0b90d14316797888d16071b3d54f51009f4d44c31382ed93152f12d355b96850869698ce7241efb2a10692df8201b
-
Filesize
292KB
MD5f0a701e6d9a5251e9aa2025c256d7f51
SHA1216ab846c90e36c7e3727b3887875d954cb2a5b7
SHA256be35e80f1c6d852fdd1d992c3b6b2d4fde33bc0d6179984f24120c153eda9ef0
SHA51254023fa6e4681dd8e5a990c79a439af689c0b90d14316797888d16071b3d54f51009f4d44c31382ed93152f12d355b96850869698ce7241efb2a10692df8201b
-
Filesize
350KB
MD55e216c34686ea61681f5addc0c4cbee0
SHA1b7238944e815597ce5e917c46fa4c1795468d538
SHA25611c79c09fa71082d1ca2249401365bb6f0a07831c8513354cfa306f685bcbf52
SHA5128901d2e0c91db600d4571492022b01e8d78a71ebdcdf09eb83e6e49f3ef1036c534b17c3c01b0e110245a9fdb2637fd9a3cfc5d658834f534ee7ca6bd5601890
-
Filesize
350KB
MD55e216c34686ea61681f5addc0c4cbee0
SHA1b7238944e815597ce5e917c46fa4c1795468d538
SHA25611c79c09fa71082d1ca2249401365bb6f0a07831c8513354cfa306f685bcbf52
SHA5128901d2e0c91db600d4571492022b01e8d78a71ebdcdf09eb83e6e49f3ef1036c534b17c3c01b0e110245a9fdb2637fd9a3cfc5d658834f534ee7ca6bd5601890