Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:33
Static task
static1
Behavioral task
behavioral1
Sample
3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe
Resource
win10v2004-20230220-en
General
-
Target
3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe
-
Size
685KB
-
MD5
0624b8681293c7a92abbede08a764cd0
-
SHA1
ca869a2b9a102130b1577b8400604e300b181753
-
SHA256
3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860
-
SHA512
35b70cdf7a37fa495af0e12f16b90180b3daee259de6093ecee1d5d3aeab126f6f7a9a6b7d4d214d8f87b479ad30bcb579faa96ef4522dd3237dd9e0d9537b08
-
SSDEEP
12288:iMr8y90ppHnmpB+J6QGUV9azjcYpS/mxwdaZixkU47BafxEg0dxKUe9+qN:Sy6mIvWzj7LwWixWIfxEDEd
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2833.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3112-187-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-188-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-190-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-200-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-204-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-206-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-208-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-210-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-212-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-214-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-216-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-218-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3112-220-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1576 un142927.exe 4692 pro2833.exe 3112 qu4551.exe 4964 si476284.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2833.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un142927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un142927.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3320 4692 WerFault.exe 85 4500 3112 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4692 pro2833.exe 4692 pro2833.exe 3112 qu4551.exe 3112 qu4551.exe 4964 si476284.exe 4964 si476284.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4692 pro2833.exe Token: SeDebugPrivilege 3112 qu4551.exe Token: SeDebugPrivilege 4964 si476284.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1576 2144 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe 84 PID 2144 wrote to memory of 1576 2144 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe 84 PID 2144 wrote to memory of 1576 2144 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe 84 PID 1576 wrote to memory of 4692 1576 un142927.exe 85 PID 1576 wrote to memory of 4692 1576 un142927.exe 85 PID 1576 wrote to memory of 4692 1576 un142927.exe 85 PID 1576 wrote to memory of 3112 1576 un142927.exe 88 PID 1576 wrote to memory of 3112 1576 un142927.exe 88 PID 1576 wrote to memory of 3112 1576 un142927.exe 88 PID 2144 wrote to memory of 4964 2144 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe 92 PID 2144 wrote to memory of 4964 2144 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe 92 PID 2144 wrote to memory of 4964 2144 3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe"C:\Users\Admin\AppData\Local\Temp\3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142927.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 10844⤵
- Program crash
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4551.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4551.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 19004⤵
- Program crash
PID:4500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476284.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4692 -ip 46921⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3112 -ip 31121⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5946d5a320d6d805b82410bef6f5a5f60
SHA1e88a6d2b91fd6fd3151285997729c13b7a42f94c
SHA25667f1537f4de5758c01ec7243535b72888ff0dfc18f0fe10d386df0c9415428b6
SHA512f0b98c5b4370c86c0155fc22c3080b040ef27b7db138fd0053775bd1bd0de870a43d0c557f5eb0c6257651740f2998b4082b709fcedbd924c22dd2072d0d5d1c
-
Filesize
175KB
MD5946d5a320d6d805b82410bef6f5a5f60
SHA1e88a6d2b91fd6fd3151285997729c13b7a42f94c
SHA25667f1537f4de5758c01ec7243535b72888ff0dfc18f0fe10d386df0c9415428b6
SHA512f0b98c5b4370c86c0155fc22c3080b040ef27b7db138fd0053775bd1bd0de870a43d0c557f5eb0c6257651740f2998b4082b709fcedbd924c22dd2072d0d5d1c
-
Filesize
543KB
MD50952f66a739a1eeeca7945473e5bbfe9
SHA1f806a3fa14fc7c39a8fd4844267c042f551cfe46
SHA25604ebf703ee773887ff70a7fa89a5eaecb20539f17ad69d668e31b3d11d9be8c9
SHA512967e0b50b35281b803e38e43c15c251351501dfa3335d5d2bc1a305fd2622f36e3315cb6beb3c05f34a9a550097b66d95c58aedfb579fc11a95303d06989fb7a
-
Filesize
543KB
MD50952f66a739a1eeeca7945473e5bbfe9
SHA1f806a3fa14fc7c39a8fd4844267c042f551cfe46
SHA25604ebf703ee773887ff70a7fa89a5eaecb20539f17ad69d668e31b3d11d9be8c9
SHA512967e0b50b35281b803e38e43c15c251351501dfa3335d5d2bc1a305fd2622f36e3315cb6beb3c05f34a9a550097b66d95c58aedfb579fc11a95303d06989fb7a
-
Filesize
292KB
MD53272e40a9f6df3b155400d02230acf5c
SHA1b01bfc75f15eb1e0ba784007635355d85a1cfae4
SHA256ee842f4dbbb6d0027b9495209106cb5e4d3fc37eae7cf0cca37e0e96d2939046
SHA51273cb6237097b8292b53df91355e787016e6feb579e3ee3b8bde7df822959e3cff02434db0ad47f730cb9eae9bb34a1347a4366376d27c45fe8d8d5820939e965
-
Filesize
292KB
MD53272e40a9f6df3b155400d02230acf5c
SHA1b01bfc75f15eb1e0ba784007635355d85a1cfae4
SHA256ee842f4dbbb6d0027b9495209106cb5e4d3fc37eae7cf0cca37e0e96d2939046
SHA51273cb6237097b8292b53df91355e787016e6feb579e3ee3b8bde7df822959e3cff02434db0ad47f730cb9eae9bb34a1347a4366376d27c45fe8d8d5820939e965
-
Filesize
350KB
MD5b48d1e4612517b7bab20c2b836c89c3f
SHA1c7ae914c6af9c7a2ec5dff148a0523221a51ee0c
SHA2564bf8dfdc813aea91e2477b459141188cc3690e669f11e071c7de40a0d365305b
SHA512ecbb4c2c9096ba5823eacf57e3f5f1fed725386bc663556f17facd499c204adefb2f4405220d0bee35ab7c1037b5dad1ba8f9be4a9b9f8d9ead805084354850b
-
Filesize
350KB
MD5b48d1e4612517b7bab20c2b836c89c3f
SHA1c7ae914c6af9c7a2ec5dff148a0523221a51ee0c
SHA2564bf8dfdc813aea91e2477b459141188cc3690e669f11e071c7de40a0d365305b
SHA512ecbb4c2c9096ba5823eacf57e3f5f1fed725386bc663556f17facd499c204adefb2f4405220d0bee35ab7c1037b5dad1ba8f9be4a9b9f8d9ead805084354850b