Analysis
-
max time kernel
57s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:38
Static task
static1
Behavioral task
behavioral1
Sample
b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe
Resource
win10-20230220-en
General
-
Target
b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe
-
Size
685KB
-
MD5
d1d35a226df67adfb0360fa722879bff
-
SHA1
f213ca0ca8221e4d22601560ef8251b2726aba04
-
SHA256
b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b
-
SHA512
bf4420e84691fd48f7a3dad996509de97120b83e27c8f69de8c171acd51149ea3f774a060f5682fb9ec7c1b0e2d4b5ce7ce2f778d6014ef7be710b37bd8026ff
-
SSDEEP
12288:vMrGy90pL6pQrf5Kjd0Twn/zjonLImFG8CCzBbiCE+pL60yNfp5OcTVw73h7zX:JyaL6pTeEn/zjusmU8rRiCExnjRVw7Z
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7588.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1944-176-0x0000000004C40000-0x0000000004C86000-memory.dmp family_redline behavioral1/memory/1944-177-0x00000000051F0000-0x0000000005234000-memory.dmp family_redline behavioral1/memory/1944-179-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-178-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-181-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-183-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-190-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-186-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-193-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-195-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-197-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-199-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-201-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-203-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-205-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-207-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-209-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-211-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-213-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-215-0x00000000051F0000-0x000000000522E000-memory.dmp family_redline behavioral1/memory/1944-1099-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4960 un316638.exe 2068 pro7588.exe 1944 qu7720.exe 4584 si436066.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7588.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un316638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un316638.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2068 pro7588.exe 2068 pro7588.exe 1944 qu7720.exe 1944 qu7720.exe 4584 si436066.exe 4584 si436066.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2068 pro7588.exe Token: SeDebugPrivilege 1944 qu7720.exe Token: SeDebugPrivilege 4584 si436066.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4960 4616 b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe 66 PID 4616 wrote to memory of 4960 4616 b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe 66 PID 4616 wrote to memory of 4960 4616 b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe 66 PID 4960 wrote to memory of 2068 4960 un316638.exe 67 PID 4960 wrote to memory of 2068 4960 un316638.exe 67 PID 4960 wrote to memory of 2068 4960 un316638.exe 67 PID 4960 wrote to memory of 1944 4960 un316638.exe 68 PID 4960 wrote to memory of 1944 4960 un316638.exe 68 PID 4960 wrote to memory of 1944 4960 un316638.exe 68 PID 4616 wrote to memory of 4584 4616 b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe 70 PID 4616 wrote to memory of 4584 4616 b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe 70 PID 4616 wrote to memory of 4584 4616 b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe"C:\Users\Admin\AppData\Local\Temp\b139bf395d5c373932c1872f41d41b020de6cbf24a2759764fee1390b4a9364b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un316638.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un316638.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7720.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7720.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si436066.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54f50d3a334d401b76acfc6a37a1a4671
SHA1214db8870ee01d6d468dd6bca15e42bc55aa13f6
SHA256a20d6d530f8bf2893e29734edffbad228018ad074cf6385371e9fcd604336cc6
SHA51229d21c4ea96bf5855fac5c043e677be27dbc8c3418e6e0de207250e07f23ccae0aa1c50a99e20aa32468c4df7dddc89d50a2f58d4d6f1c9239821d4f389a6d46
-
Filesize
175KB
MD54f50d3a334d401b76acfc6a37a1a4671
SHA1214db8870ee01d6d468dd6bca15e42bc55aa13f6
SHA256a20d6d530f8bf2893e29734edffbad228018ad074cf6385371e9fcd604336cc6
SHA51229d21c4ea96bf5855fac5c043e677be27dbc8c3418e6e0de207250e07f23ccae0aa1c50a99e20aa32468c4df7dddc89d50a2f58d4d6f1c9239821d4f389a6d46
-
Filesize
543KB
MD579d92cbf8a50b451c698d4d263768bb1
SHA138d8dd009261230205fbd9d14b16caa6f60c68e4
SHA2568444ce1e3790f07cd59156e447ad20c84c247e73dba82b801e89317b881dcd4b
SHA512e7b18ab1aaf305a89c59dd5c58f7e69900be60f3ca6444bd3fe32f1a59f1a0057e49246919a02c5d46d66fa0926e750cc7cbc47b00fc151b14bb07a911c16890
-
Filesize
543KB
MD579d92cbf8a50b451c698d4d263768bb1
SHA138d8dd009261230205fbd9d14b16caa6f60c68e4
SHA2568444ce1e3790f07cd59156e447ad20c84c247e73dba82b801e89317b881dcd4b
SHA512e7b18ab1aaf305a89c59dd5c58f7e69900be60f3ca6444bd3fe32f1a59f1a0057e49246919a02c5d46d66fa0926e750cc7cbc47b00fc151b14bb07a911c16890
-
Filesize
292KB
MD57602663ce39bce11b703c07568d8f554
SHA100237a1490173b6db904d49a0e5377b4c1246f32
SHA2569360dca87958e2269e89792036f9699664bebc502e345c3ae9f8dc9800fb4784
SHA512f130859460e663aa075cb2b613ba81a1f2458740ab62f5498bcea1202ece62edd0cd113a00a092524377fa729ef4015e416c7df1218e4099a79898d5cb7e2cb3
-
Filesize
292KB
MD57602663ce39bce11b703c07568d8f554
SHA100237a1490173b6db904d49a0e5377b4c1246f32
SHA2569360dca87958e2269e89792036f9699664bebc502e345c3ae9f8dc9800fb4784
SHA512f130859460e663aa075cb2b613ba81a1f2458740ab62f5498bcea1202ece62edd0cd113a00a092524377fa729ef4015e416c7df1218e4099a79898d5cb7e2cb3
-
Filesize
350KB
MD5c4b645b6c62f8cb12ef1752bb114fac0
SHA128354da73f3f5879db153fd7cb1f45e742e8feef
SHA256517447dec8f49b7bfe702e078875afe8a7415bc1c279aaae44833d54613d43ef
SHA5122f452c69339fe25bfb11685a501f47fc2bc88b624522952dc74313e275e28d23d31460c6d961721ffa6f6c32fd72aa9b6c8d8246bfec478ec323d11e50348f67
-
Filesize
350KB
MD5c4b645b6c62f8cb12ef1752bb114fac0
SHA128354da73f3f5879db153fd7cb1f45e742e8feef
SHA256517447dec8f49b7bfe702e078875afe8a7415bc1c279aaae44833d54613d43ef
SHA5122f452c69339fe25bfb11685a501f47fc2bc88b624522952dc74313e275e28d23d31460c6d961721ffa6f6c32fd72aa9b6c8d8246bfec478ec323d11e50348f67