Analysis
-
max time kernel
54s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:34
Static task
static1
Behavioral task
behavioral1
Sample
8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe
Resource
win10-20230220-en
General
-
Target
8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe
-
Size
685KB
-
MD5
ce05b6b8286d828e9ae8ddb548a0ea25
-
SHA1
c9c364dfe0d14c3d5c80e8e7c0470a272311ad5b
-
SHA256
8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4
-
SHA512
e0d5f76d6d4039bfa04f28b825f912180cf11d51d80f24f40f34ba335d276d1752b715d1a495c2a4bc2fa621535ba6e937785f10d4c7ac636fb6367e9eceabd1
-
SSDEEP
12288:WMriy909N0/O4tb0ZAw923Vsj7OkzjoXw/W41Im6wCqFAnBXh7EpNhNgiwuwXEiq:4yma90ZJ9z7bzjDOkXJe1h7EpVpx
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7940.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4688-181-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/4688-182-0x0000000004CB0000-0x0000000004CF4000-memory.dmp family_redline behavioral1/memory/4688-198-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-204-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-206-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-212-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-210-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-216-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-218-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-220-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-214-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-208-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-202-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-200-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-196-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-194-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-192-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-190-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-188-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline behavioral1/memory/4688-187-0x0000000004CB0000-0x0000000004CEE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4324 un078136.exe 3684 pro7940.exe 4688 qu2880.exe 4668 si259807.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7940.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un078136.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un078136.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3684 pro7940.exe 3684 pro7940.exe 4688 qu2880.exe 4688 qu2880.exe 4668 si259807.exe 4668 si259807.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3684 pro7940.exe Token: SeDebugPrivilege 4688 qu2880.exe Token: SeDebugPrivilege 4668 si259807.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4324 3044 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe 66 PID 3044 wrote to memory of 4324 3044 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe 66 PID 3044 wrote to memory of 4324 3044 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe 66 PID 4324 wrote to memory of 3684 4324 un078136.exe 67 PID 4324 wrote to memory of 3684 4324 un078136.exe 67 PID 4324 wrote to memory of 3684 4324 un078136.exe 67 PID 4324 wrote to memory of 4688 4324 un078136.exe 68 PID 4324 wrote to memory of 4688 4324 un078136.exe 68 PID 4324 wrote to memory of 4688 4324 un078136.exe 68 PID 3044 wrote to memory of 4668 3044 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe 70 PID 3044 wrote to memory of 4668 3044 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe 70 PID 3044 wrote to memory of 4668 3044 8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe"C:\Users\Admin\AppData\Local\Temp\8b0737959627942ed8175371b62d06e6965ebe9d300cf2457f6f148d8e70d6a4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078136.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7940.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2880.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2880.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si259807.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si259807.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b1005b1b1de57eff200c7f350866f887
SHA1aa47ee84921dec179fda2217861f59eba014a00b
SHA256bde40cc7a5c572da982c2f7e42b79c167c16e28be4318e77e427063e79527462
SHA5127a56cb3b015e2769caa225cf0e129f7552917601cd364a8b9dcf029b632e98373bcf46cde903b75a7defe7b3cef882feb0e1fd5a1604a60abec7b2d7743fae3a
-
Filesize
175KB
MD5b1005b1b1de57eff200c7f350866f887
SHA1aa47ee84921dec179fda2217861f59eba014a00b
SHA256bde40cc7a5c572da982c2f7e42b79c167c16e28be4318e77e427063e79527462
SHA5127a56cb3b015e2769caa225cf0e129f7552917601cd364a8b9dcf029b632e98373bcf46cde903b75a7defe7b3cef882feb0e1fd5a1604a60abec7b2d7743fae3a
-
Filesize
543KB
MD504ca892ae0e8effcd9e14faad1b0cb44
SHA1270cbbe1e811c24fb35bcc7dd0f50ef38ff736bd
SHA256d4db4bc7b26f2cd7f833d3ee9a99b739f71b1caa8cd63a95b3090307220be1c3
SHA512c1517005b5b3010796556e1d17b6bb292a657ab8c1e46ff171d78811ed022c4bc38bf218af8d14a53b571364a14b56f85d978e9a9e740c58a29c02a7f94a056b
-
Filesize
543KB
MD504ca892ae0e8effcd9e14faad1b0cb44
SHA1270cbbe1e811c24fb35bcc7dd0f50ef38ff736bd
SHA256d4db4bc7b26f2cd7f833d3ee9a99b739f71b1caa8cd63a95b3090307220be1c3
SHA512c1517005b5b3010796556e1d17b6bb292a657ab8c1e46ff171d78811ed022c4bc38bf218af8d14a53b571364a14b56f85d978e9a9e740c58a29c02a7f94a056b
-
Filesize
292KB
MD5d91e3ad8b5f84f1b9fd35d21e8c66a9e
SHA180521cc05f1fe72ab5030ca0d9ea5eac31408287
SHA256cc9f1ede340ffb14e3cee920082991e68f47421d3c275cb824de544333fdcd26
SHA51277d8172127e7cd522e747d75a110424456728312cb8553e5dfbfe007b3dce617121fa23806035537c5cb62773fd2633f70c81e7e7bd0c3c7b890d779c128e9b9
-
Filesize
292KB
MD5d91e3ad8b5f84f1b9fd35d21e8c66a9e
SHA180521cc05f1fe72ab5030ca0d9ea5eac31408287
SHA256cc9f1ede340ffb14e3cee920082991e68f47421d3c275cb824de544333fdcd26
SHA51277d8172127e7cd522e747d75a110424456728312cb8553e5dfbfe007b3dce617121fa23806035537c5cb62773fd2633f70c81e7e7bd0c3c7b890d779c128e9b9
-
Filesize
350KB
MD5fd00c540fa695e5a3d521d4819984d91
SHA105da368e92b19de9d808303f26ca322f49eb87fd
SHA256df940f3838498bb735880836b7490b9dcdefd384e67473f2e3a1d8d216479af1
SHA5121c1bc31944d805fa803d366c1c77139f4ebf996ea80efaebca30c05490404a253e4ab9fa9539ff81f83a04926545c37a223c5054e3fddab1a205570968554006
-
Filesize
350KB
MD5fd00c540fa695e5a3d521d4819984d91
SHA105da368e92b19de9d808303f26ca322f49eb87fd
SHA256df940f3838498bb735880836b7490b9dcdefd384e67473f2e3a1d8d216479af1
SHA5121c1bc31944d805fa803d366c1c77139f4ebf996ea80efaebca30c05490404a253e4ab9fa9539ff81f83a04926545c37a223c5054e3fddab1a205570968554006