Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:37
Static task
static1
Behavioral task
behavioral1
Sample
879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe
Resource
win10v2004-20230220-en
General
-
Target
879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe
-
Size
685KB
-
MD5
d15a266edec44f0d9f3a65362f33652f
-
SHA1
3a6d150214d43150ac842d20ab42d60f3a26ebe6
-
SHA256
879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb
-
SHA512
21f6086de6fe8d5cac1703df96bde3723bc55ce2e0ef9b4ce008df11c28c0120cd297d30261c6e828f9d727089d8d06d887df8330c10f202ac57989923c64bca
-
SSDEEP
12288:1MrUy903h9rVrC3pckmgYarFyTwRQ12t1WLiCWF7BIW2EM244zcqUe:Vyuh3rgHmgYahQCGaWkNaW2EM2bQW
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3537.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3537.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1256-188-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-187-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-190-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-192-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-194-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-196-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-198-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-200-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-202-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-204-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-206-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-208-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-210-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-212-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-214-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-216-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-218-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-224-0x00000000025B0000-0x00000000025EE000-memory.dmp family_redline behavioral1/memory/1256-1109-0x0000000004DE0000-0x0000000004DF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3324 un434306.exe 8 pro3537.exe 1256 qu7414.exe 2760 si048575.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3537.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un434306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un434306.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3392 8 WerFault.exe 81 1080 1256 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 8 pro3537.exe 8 pro3537.exe 1256 qu7414.exe 1256 qu7414.exe 2760 si048575.exe 2760 si048575.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 8 pro3537.exe Token: SeDebugPrivilege 1256 qu7414.exe Token: SeDebugPrivilege 2760 si048575.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3324 3016 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe 80 PID 3016 wrote to memory of 3324 3016 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe 80 PID 3016 wrote to memory of 3324 3016 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe 80 PID 3324 wrote to memory of 8 3324 un434306.exe 81 PID 3324 wrote to memory of 8 3324 un434306.exe 81 PID 3324 wrote to memory of 8 3324 un434306.exe 81 PID 3324 wrote to memory of 1256 3324 un434306.exe 92 PID 3324 wrote to memory of 1256 3324 un434306.exe 92 PID 3324 wrote to memory of 1256 3324 un434306.exe 92 PID 3016 wrote to memory of 2760 3016 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe 97 PID 3016 wrote to memory of 2760 3016 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe 97 PID 3016 wrote to memory of 2760 3016 879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe"C:\Users\Admin\AppData\Local\Temp\879cc1e2015f2a24503a42aabf0929e736786689ed086cc4fa4825bb83afc7bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3537.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 10844⤵
- Program crash
PID:3392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7414.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 19684⤵
- Program crash
PID:1080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si048575.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si048575.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 8 -ip 81⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1256 -ip 12561⤵PID:4724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f0140d5a305c4fb3972899fe5a494962
SHA1584d3c26ccde216e83787d6ad58dec4b7dabfe38
SHA25692f85876449632ddd5e929be4e905630a87fa439df310d7aea91523b8753e618
SHA512df8e5aacca5663a8904b427df5db50618e820876156cf594d5febf31e0d9bcd3d66d4c12445b243f39503c91fce9e96e00c84663b5368d9fc5de05c9633bd31e
-
Filesize
175KB
MD5f0140d5a305c4fb3972899fe5a494962
SHA1584d3c26ccde216e83787d6ad58dec4b7dabfe38
SHA25692f85876449632ddd5e929be4e905630a87fa439df310d7aea91523b8753e618
SHA512df8e5aacca5663a8904b427df5db50618e820876156cf594d5febf31e0d9bcd3d66d4c12445b243f39503c91fce9e96e00c84663b5368d9fc5de05c9633bd31e
-
Filesize
543KB
MD507d0d0adfed2a77036419f47c303d907
SHA1c0e8370aa839fecf18bc6d1de56372010dcee68c
SHA256db8ca38a0c41c1ca7a41926c125242c1da49e66621709758aa015b6c3641d6aa
SHA512d955b88cf3532025366cd200780514b5475137863c08e6ff768c96c6dfae3ffbc778d52748caeafbedfbcc8c2a665e474eab428cabf11861453e111bbbeaf40e
-
Filesize
543KB
MD507d0d0adfed2a77036419f47c303d907
SHA1c0e8370aa839fecf18bc6d1de56372010dcee68c
SHA256db8ca38a0c41c1ca7a41926c125242c1da49e66621709758aa015b6c3641d6aa
SHA512d955b88cf3532025366cd200780514b5475137863c08e6ff768c96c6dfae3ffbc778d52748caeafbedfbcc8c2a665e474eab428cabf11861453e111bbbeaf40e
-
Filesize
292KB
MD5dbede32fc9487570f975f1db44f1b7c9
SHA17d7ba07a517616c6a56249c9b8b98cbe17433a94
SHA256d31d19c5f71541206a83da1df1133b82f7587b987ef989b2948953c042dd0382
SHA512f8e6b266301fbccf5d1531215d91fee7cf41798f219182c2b0778c056a9045606ac72c1a513060656f8bc1c0b3a6fe83e32af696f6cc30ab3b08c7c033929f44
-
Filesize
292KB
MD5dbede32fc9487570f975f1db44f1b7c9
SHA17d7ba07a517616c6a56249c9b8b98cbe17433a94
SHA256d31d19c5f71541206a83da1df1133b82f7587b987ef989b2948953c042dd0382
SHA512f8e6b266301fbccf5d1531215d91fee7cf41798f219182c2b0778c056a9045606ac72c1a513060656f8bc1c0b3a6fe83e32af696f6cc30ab3b08c7c033929f44
-
Filesize
350KB
MD59cbe079a87b134f8818e68e8c2545e83
SHA1c31c6e36a28a94f6d098ab88d99b9316c4aa5b17
SHA256ff456385ff984d4bf54e701f2a3c6b5a2e95417b34f2bb60d4883851c0e8906b
SHA5128fb326c865432a7f71ad910b0bcaf32d543e3b38185786ab4020637e69c436cd4e3d2acdd29f658c4e3e42a55840687847dd863d4bddf0bc638568be6c29074e
-
Filesize
350KB
MD59cbe079a87b134f8818e68e8c2545e83
SHA1c31c6e36a28a94f6d098ab88d99b9316c4aa5b17
SHA256ff456385ff984d4bf54e701f2a3c6b5a2e95417b34f2bb60d4883851c0e8906b
SHA5128fb326c865432a7f71ad910b0bcaf32d543e3b38185786ab4020637e69c436cd4e3d2acdd29f658c4e3e42a55840687847dd863d4bddf0bc638568be6c29074e