Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 13:36
Static task
static1
Behavioral task
behavioral1
Sample
a76c5b96dc760f120ca5648ff469abd2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a76c5b96dc760f120ca5648ff469abd2.exe
Resource
win10v2004-20230220-en
General
-
Target
a76c5b96dc760f120ca5648ff469abd2.exe
-
Size
686KB
-
MD5
a76c5b96dc760f120ca5648ff469abd2
-
SHA1
81242e373931fdfbcb947969d8e4bd4360654fb1
-
SHA256
f74d44fd46f445f4346eed0236faaa4b932e675b315dccffd1f4476d3559bc93
-
SHA512
6f72b077c775fc0bee9fd1b64aeb8970aa594b473a84a19e2e3bdf55b806a31a5db746b23ba30c96300919da473e6bd08e5c849bb257f90b8f4c5c90c13bb336
-
SSDEEP
12288:EMrPy90UKsnoVh888guM/AhTzPyoJ0Fukp7qHOk40a2mFG6Z0U4oX0LquNeSnDjd:7yVKbVS8RuQAhnD0Fuk5JPYe+U4TqSnF
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6699.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro6699.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/1872-123-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/1872-124-0x0000000002540000-0x0000000002584000-memory.dmp family_redline behavioral1/memory/1872-125-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-126-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-128-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-130-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-132-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-134-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-136-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-138-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-140-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-142-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-144-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-146-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-148-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-150-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-152-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-154-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-156-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-158-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/1872-279-0x0000000002490000-0x00000000024D0000-memory.dmp family_redline behavioral1/memory/1872-1035-0x0000000002490000-0x00000000024D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1064 un993223.exe 1248 pro6699.exe 1872 qu5230.exe 1496 si160642.exe -
Loads dropped DLL 10 IoCs
pid Process 1724 a76c5b96dc760f120ca5648ff469abd2.exe 1064 un993223.exe 1064 un993223.exe 1064 un993223.exe 1248 pro6699.exe 1064 un993223.exe 1064 un993223.exe 1872 qu5230.exe 1724 a76c5b96dc760f120ca5648ff469abd2.exe 1496 si160642.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro6699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6699.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce a76c5b96dc760f120ca5648ff469abd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a76c5b96dc760f120ca5648ff469abd2.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un993223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un993223.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1248 pro6699.exe 1248 pro6699.exe 1872 qu5230.exe 1872 qu5230.exe 1496 si160642.exe 1496 si160642.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1248 pro6699.exe Token: SeDebugPrivilege 1872 qu5230.exe Token: SeDebugPrivilege 1496 si160642.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1724 wrote to memory of 1064 1724 a76c5b96dc760f120ca5648ff469abd2.exe 28 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1248 1064 un993223.exe 29 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1064 wrote to memory of 1872 1064 un993223.exe 30 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32 PID 1724 wrote to memory of 1496 1724 a76c5b96dc760f120ca5648ff469abd2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a76c5b96dc760f120ca5648ff469abd2.exe"C:\Users\Admin\AppData\Local\Temp\a76c5b96dc760f120ca5648ff469abd2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un993223.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un993223.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6699.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5230.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5230.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si160642.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si160642.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5abb5f5dcb51f91731e28dcfd025be41b
SHA1eff74e5d74f0fee46a17169eb51c604557943167
SHA256d219e3fe55fd887371b8d744f96a7bcd7c6651ae70ff1878ed35878244245a1a
SHA512f8b5d3f18e0fd6639e0f3e73927fa75559c7a969d37b83d651849a3bd4ac62969bdb1c37c776facec918a71f8530b6733a5f815096c45f6933511d2938fc6653
-
Filesize
175KB
MD5abb5f5dcb51f91731e28dcfd025be41b
SHA1eff74e5d74f0fee46a17169eb51c604557943167
SHA256d219e3fe55fd887371b8d744f96a7bcd7c6651ae70ff1878ed35878244245a1a
SHA512f8b5d3f18e0fd6639e0f3e73927fa75559c7a969d37b83d651849a3bd4ac62969bdb1c37c776facec918a71f8530b6733a5f815096c45f6933511d2938fc6653
-
Filesize
544KB
MD5853741e3cb8220cfaebde590534f511b
SHA1f0dd9661bcd0468aea17e38ce476381243bfb434
SHA256bca5acc546076d05ce96feb99db1b11ae027cee41d08cc05a98e7a2a27f203fa
SHA512f4afee8dd3bf99f6d75e7b52b83bba252c5f39189d730f2dc19bfa76168efa4cd7c94ae0b54dca3c0b8d1525b09b3b1ee468117977013704b6d41c399ac46492
-
Filesize
544KB
MD5853741e3cb8220cfaebde590534f511b
SHA1f0dd9661bcd0468aea17e38ce476381243bfb434
SHA256bca5acc546076d05ce96feb99db1b11ae027cee41d08cc05a98e7a2a27f203fa
SHA512f4afee8dd3bf99f6d75e7b52b83bba252c5f39189d730f2dc19bfa76168efa4cd7c94ae0b54dca3c0b8d1525b09b3b1ee468117977013704b6d41c399ac46492
-
Filesize
300KB
MD55c1ff4ae693f6dcb1f4c6b4df495ccd7
SHA19c26ad5a863559fe4f478f5dd1233a8f75b584ba
SHA256437326d7e4bb94bef1261c4be2a07d627d779bb1ae3a88c6ee33c1da77900b10
SHA512ece00fa302efd58cbec0146a23b84b0422390b4ac40f544a7fd0235bb09b085f0679435f61942c0e6a6fe86bd287439d14d87a07ac602b2729b9a83118563a15
-
Filesize
300KB
MD55c1ff4ae693f6dcb1f4c6b4df495ccd7
SHA19c26ad5a863559fe4f478f5dd1233a8f75b584ba
SHA256437326d7e4bb94bef1261c4be2a07d627d779bb1ae3a88c6ee33c1da77900b10
SHA512ece00fa302efd58cbec0146a23b84b0422390b4ac40f544a7fd0235bb09b085f0679435f61942c0e6a6fe86bd287439d14d87a07ac602b2729b9a83118563a15
-
Filesize
300KB
MD55c1ff4ae693f6dcb1f4c6b4df495ccd7
SHA19c26ad5a863559fe4f478f5dd1233a8f75b584ba
SHA256437326d7e4bb94bef1261c4be2a07d627d779bb1ae3a88c6ee33c1da77900b10
SHA512ece00fa302efd58cbec0146a23b84b0422390b4ac40f544a7fd0235bb09b085f0679435f61942c0e6a6fe86bd287439d14d87a07ac602b2729b9a83118563a15
-
Filesize
359KB
MD521cc28eb12ea4ebd67fd58a2ea8187f9
SHA1702a180a4bc41bfa926bcb62b5e1d73a662472d1
SHA256436aca877c17ca02b0ade12aec7cd8a7b039adcf9cfd6a73d366fcbe8aa6e20a
SHA512873426db34571f9b31ba7f42f04dbe68fabbd335a702b272fc8884c5a397c6c6f565c79cd4e0c1475d4ee06f79c478ad4894c87207acd4604836e5cb70bfe3db
-
Filesize
359KB
MD521cc28eb12ea4ebd67fd58a2ea8187f9
SHA1702a180a4bc41bfa926bcb62b5e1d73a662472d1
SHA256436aca877c17ca02b0ade12aec7cd8a7b039adcf9cfd6a73d366fcbe8aa6e20a
SHA512873426db34571f9b31ba7f42f04dbe68fabbd335a702b272fc8884c5a397c6c6f565c79cd4e0c1475d4ee06f79c478ad4894c87207acd4604836e5cb70bfe3db
-
Filesize
359KB
MD521cc28eb12ea4ebd67fd58a2ea8187f9
SHA1702a180a4bc41bfa926bcb62b5e1d73a662472d1
SHA256436aca877c17ca02b0ade12aec7cd8a7b039adcf9cfd6a73d366fcbe8aa6e20a
SHA512873426db34571f9b31ba7f42f04dbe68fabbd335a702b272fc8884c5a397c6c6f565c79cd4e0c1475d4ee06f79c478ad4894c87207acd4604836e5cb70bfe3db
-
Filesize
175KB
MD5abb5f5dcb51f91731e28dcfd025be41b
SHA1eff74e5d74f0fee46a17169eb51c604557943167
SHA256d219e3fe55fd887371b8d744f96a7bcd7c6651ae70ff1878ed35878244245a1a
SHA512f8b5d3f18e0fd6639e0f3e73927fa75559c7a969d37b83d651849a3bd4ac62969bdb1c37c776facec918a71f8530b6733a5f815096c45f6933511d2938fc6653
-
Filesize
175KB
MD5abb5f5dcb51f91731e28dcfd025be41b
SHA1eff74e5d74f0fee46a17169eb51c604557943167
SHA256d219e3fe55fd887371b8d744f96a7bcd7c6651ae70ff1878ed35878244245a1a
SHA512f8b5d3f18e0fd6639e0f3e73927fa75559c7a969d37b83d651849a3bd4ac62969bdb1c37c776facec918a71f8530b6733a5f815096c45f6933511d2938fc6653
-
Filesize
544KB
MD5853741e3cb8220cfaebde590534f511b
SHA1f0dd9661bcd0468aea17e38ce476381243bfb434
SHA256bca5acc546076d05ce96feb99db1b11ae027cee41d08cc05a98e7a2a27f203fa
SHA512f4afee8dd3bf99f6d75e7b52b83bba252c5f39189d730f2dc19bfa76168efa4cd7c94ae0b54dca3c0b8d1525b09b3b1ee468117977013704b6d41c399ac46492
-
Filesize
544KB
MD5853741e3cb8220cfaebde590534f511b
SHA1f0dd9661bcd0468aea17e38ce476381243bfb434
SHA256bca5acc546076d05ce96feb99db1b11ae027cee41d08cc05a98e7a2a27f203fa
SHA512f4afee8dd3bf99f6d75e7b52b83bba252c5f39189d730f2dc19bfa76168efa4cd7c94ae0b54dca3c0b8d1525b09b3b1ee468117977013704b6d41c399ac46492
-
Filesize
300KB
MD55c1ff4ae693f6dcb1f4c6b4df495ccd7
SHA19c26ad5a863559fe4f478f5dd1233a8f75b584ba
SHA256437326d7e4bb94bef1261c4be2a07d627d779bb1ae3a88c6ee33c1da77900b10
SHA512ece00fa302efd58cbec0146a23b84b0422390b4ac40f544a7fd0235bb09b085f0679435f61942c0e6a6fe86bd287439d14d87a07ac602b2729b9a83118563a15
-
Filesize
300KB
MD55c1ff4ae693f6dcb1f4c6b4df495ccd7
SHA19c26ad5a863559fe4f478f5dd1233a8f75b584ba
SHA256437326d7e4bb94bef1261c4be2a07d627d779bb1ae3a88c6ee33c1da77900b10
SHA512ece00fa302efd58cbec0146a23b84b0422390b4ac40f544a7fd0235bb09b085f0679435f61942c0e6a6fe86bd287439d14d87a07ac602b2729b9a83118563a15
-
Filesize
300KB
MD55c1ff4ae693f6dcb1f4c6b4df495ccd7
SHA19c26ad5a863559fe4f478f5dd1233a8f75b584ba
SHA256437326d7e4bb94bef1261c4be2a07d627d779bb1ae3a88c6ee33c1da77900b10
SHA512ece00fa302efd58cbec0146a23b84b0422390b4ac40f544a7fd0235bb09b085f0679435f61942c0e6a6fe86bd287439d14d87a07ac602b2729b9a83118563a15
-
Filesize
359KB
MD521cc28eb12ea4ebd67fd58a2ea8187f9
SHA1702a180a4bc41bfa926bcb62b5e1d73a662472d1
SHA256436aca877c17ca02b0ade12aec7cd8a7b039adcf9cfd6a73d366fcbe8aa6e20a
SHA512873426db34571f9b31ba7f42f04dbe68fabbd335a702b272fc8884c5a397c6c6f565c79cd4e0c1475d4ee06f79c478ad4894c87207acd4604836e5cb70bfe3db
-
Filesize
359KB
MD521cc28eb12ea4ebd67fd58a2ea8187f9
SHA1702a180a4bc41bfa926bcb62b5e1d73a662472d1
SHA256436aca877c17ca02b0ade12aec7cd8a7b039adcf9cfd6a73d366fcbe8aa6e20a
SHA512873426db34571f9b31ba7f42f04dbe68fabbd335a702b272fc8884c5a397c6c6f565c79cd4e0c1475d4ee06f79c478ad4894c87207acd4604836e5cb70bfe3db
-
Filesize
359KB
MD521cc28eb12ea4ebd67fd58a2ea8187f9
SHA1702a180a4bc41bfa926bcb62b5e1d73a662472d1
SHA256436aca877c17ca02b0ade12aec7cd8a7b039adcf9cfd6a73d366fcbe8aa6e20a
SHA512873426db34571f9b31ba7f42f04dbe68fabbd335a702b272fc8884c5a397c6c6f565c79cd4e0c1475d4ee06f79c478ad4894c87207acd4604836e5cb70bfe3db