Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe
Resource
win10v2004-20230220-en
General
-
Target
ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe
-
Size
685KB
-
MD5
016429fddc4350bd04febba92c38769f
-
SHA1
d28e0f002e509bfae2c7c0bf69ffb96b7a390025
-
SHA256
ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78
-
SHA512
f18bfae82d20353cf51a637ba7dac085ecfab82defe70d219aa12161db5bbb302c2bd0c0e2dda86f7a75924dc09db818703ae1de6c7de64a473b039c14a6e20b
-
SSDEEP
12288:KMrZy90IMiZZ1Vi0a5aNJKkqf+391Y8/iKiK3xB5bVEMdxYUBs3Uls:HynBZZraQNifwnMcDbVEods3Uu
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1007.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3740-192-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-195-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-193-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-199-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-197-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-201-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-203-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-205-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-207-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-209-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-211-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-213-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-215-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-217-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-220-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-223-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-227-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/3740-229-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4708 un825013.exe 4492 pro1007.exe 3740 qu8891.exe 2416 si226702.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1007.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un825013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un825013.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 780 4492 WerFault.exe 84 3832 3740 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4492 pro1007.exe 4492 pro1007.exe 3740 qu8891.exe 3740 qu8891.exe 2416 si226702.exe 2416 si226702.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4492 pro1007.exe Token: SeDebugPrivilege 3740 qu8891.exe Token: SeDebugPrivilege 2416 si226702.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4708 5040 ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe 83 PID 5040 wrote to memory of 4708 5040 ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe 83 PID 5040 wrote to memory of 4708 5040 ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe 83 PID 4708 wrote to memory of 4492 4708 un825013.exe 84 PID 4708 wrote to memory of 4492 4708 un825013.exe 84 PID 4708 wrote to memory of 4492 4708 un825013.exe 84 PID 4708 wrote to memory of 3740 4708 un825013.exe 94 PID 4708 wrote to memory of 3740 4708 un825013.exe 94 PID 4708 wrote to memory of 3740 4708 un825013.exe 94 PID 5040 wrote to memory of 2416 5040 ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe 99 PID 5040 wrote to memory of 2416 5040 ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe 99 PID 5040 wrote to memory of 2416 5040 ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe"C:\Users\Admin\AppData\Local\Temp\ef9692d0c6a8b62445cbe6d7321003f4bb1cb2dac647bf9834fa090d1054ac78.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1007.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 10924⤵
- Program crash
PID:780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8891.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8891.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 15964⤵
- Program crash
PID:3832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si226702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si226702.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4492 -ip 44921⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3740 -ip 37401⤵PID:3640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bbf6dda6b61b884f3e569fc1596d4607
SHA1b513f86748b948d6e04a1567a3b398587e2d37c0
SHA256b17fd77bff9c80e3c16b7e46998b48b78f839c67f882d6c8b2b5e8c62e383416
SHA512a415d65fe5c1310754adfbe8f7574340cff7d45c318270724ac43d6f792125f4abbec393308adb86e4da9572003d059d9da0273d27207ebb3206244adc1f0823
-
Filesize
175KB
MD5bbf6dda6b61b884f3e569fc1596d4607
SHA1b513f86748b948d6e04a1567a3b398587e2d37c0
SHA256b17fd77bff9c80e3c16b7e46998b48b78f839c67f882d6c8b2b5e8c62e383416
SHA512a415d65fe5c1310754adfbe8f7574340cff7d45c318270724ac43d6f792125f4abbec393308adb86e4da9572003d059d9da0273d27207ebb3206244adc1f0823
-
Filesize
543KB
MD515bebce9ee3f86207b3c175a260a2bbb
SHA12f4968a6a65cad7514b1e4a0052a30b5b139a2da
SHA256cc7e577bb69c7911414794491111a9190836c7ab5b57e67719e8adb35f9402cf
SHA5128927b8f50d7bd9d7e0f28e664a85046b68edfc0670854096b2a8a9428083ecddc61a67dc8db75cce75f0bc28423f7a84c1edbfd13b4c7aa24c1ad22a1e61b055
-
Filesize
543KB
MD515bebce9ee3f86207b3c175a260a2bbb
SHA12f4968a6a65cad7514b1e4a0052a30b5b139a2da
SHA256cc7e577bb69c7911414794491111a9190836c7ab5b57e67719e8adb35f9402cf
SHA5128927b8f50d7bd9d7e0f28e664a85046b68edfc0670854096b2a8a9428083ecddc61a67dc8db75cce75f0bc28423f7a84c1edbfd13b4c7aa24c1ad22a1e61b055
-
Filesize
292KB
MD552c8558fa4e09f9d1258848bfbe12538
SHA101532d5395182fa844541c68125d46b26ef4a4c8
SHA2566faaa2376d6106244b1bcd8423e7ade7e2d9a96aebfe56443aca4b7010a7616d
SHA512bd29710628b50226ef21033d17d609f9760c4c4cbc432735c23ece7a8d6e3745187edb6fac177b59a530eb3b72e1f08d1c1de83cc2a10679377ed8613586967a
-
Filesize
292KB
MD552c8558fa4e09f9d1258848bfbe12538
SHA101532d5395182fa844541c68125d46b26ef4a4c8
SHA2566faaa2376d6106244b1bcd8423e7ade7e2d9a96aebfe56443aca4b7010a7616d
SHA512bd29710628b50226ef21033d17d609f9760c4c4cbc432735c23ece7a8d6e3745187edb6fac177b59a530eb3b72e1f08d1c1de83cc2a10679377ed8613586967a
-
Filesize
350KB
MD5a7d16db96e7577c2a39356e843c8af5a
SHA1de0dcc44601b171cedc479fa93e817ff3eaa3780
SHA256feefe5d0087c21314a7d695ebe6b53ffae886df501f2abdb15ffb59dede472e0
SHA5126606e29a65f5bb2b5ff7c72443e5169a831a40c0c8edc081c7aae85e2d92c538d10f4fd22d8d0a336811827fd6f43bfdec86a83fb63d6d35ba19fbf9a85a6bf8
-
Filesize
350KB
MD5a7d16db96e7577c2a39356e843c8af5a
SHA1de0dcc44601b171cedc479fa93e817ff3eaa3780
SHA256feefe5d0087c21314a7d695ebe6b53ffae886df501f2abdb15ffb59dede472e0
SHA5126606e29a65f5bb2b5ff7c72443e5169a831a40c0c8edc081c7aae85e2d92c538d10f4fd22d8d0a336811827fd6f43bfdec86a83fb63d6d35ba19fbf9a85a6bf8