Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe
Resource
win10v2004-20230221-en
General
-
Target
1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe
-
Size
685KB
-
MD5
498eaefe8cc3e81c4bcc182e634b586a
-
SHA1
f21080d537a338856cf1ee1c40fae50b12c533d2
-
SHA256
1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d
-
SHA512
4bdd6c7108ece81fff655b0baeb61ff651530d7a93feabf59aa83a487f6f93f2a6278134e5ad6bd56851281f1d5e65e547ff7266f33df1a65ae8c87dcf4322c0
-
SSDEEP
12288:NMrey90uJeClH7yAkvJ2kBu/DKOXJVJDs5UWy4BbIjExdxhU5zS:fy58wby/s2wJDrW5FIjEpozS
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7497.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5020-191-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-192-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-194-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-196-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-198-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-200-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-202-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-204-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-206-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-208-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-210-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-213-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-218-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-220-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-217-0x0000000002460000-0x0000000002470000-memory.dmp family_redline behavioral1/memory/5020-222-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-224-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-226-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/5020-228-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4400 un887400.exe 1384 pro7497.exe 5020 qu7404.exe 1128 si373507.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7497.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un887400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un887400.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5076 1384 WerFault.exe 77 3972 5020 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1384 pro7497.exe 1384 pro7497.exe 5020 qu7404.exe 5020 qu7404.exe 1128 si373507.exe 1128 si373507.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1384 pro7497.exe Token: SeDebugPrivilege 5020 qu7404.exe Token: SeDebugPrivilege 1128 si373507.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4400 2236 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe 76 PID 2236 wrote to memory of 4400 2236 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe 76 PID 2236 wrote to memory of 4400 2236 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe 76 PID 4400 wrote to memory of 1384 4400 un887400.exe 77 PID 4400 wrote to memory of 1384 4400 un887400.exe 77 PID 4400 wrote to memory of 1384 4400 un887400.exe 77 PID 4400 wrote to memory of 5020 4400 un887400.exe 86 PID 4400 wrote to memory of 5020 4400 un887400.exe 86 PID 4400 wrote to memory of 5020 4400 un887400.exe 86 PID 2236 wrote to memory of 1128 2236 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe 90 PID 2236 wrote to memory of 1128 2236 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe 90 PID 2236 wrote to memory of 1128 2236 1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe"C:\Users\Admin\AppData\Local\Temp\1805b4ac9d6a965dfd57c9a175635c57c0a69c1114bba16bbcefb93c4f14e03d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un887400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un887400.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7497.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7497.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 10844⤵
- Program crash
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7404.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7404.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 18644⤵
- Program crash
PID:3972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373507.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373507.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1384 -ip 13841⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5020 -ip 50201⤵PID:4944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5da84383c5054bb39e8d738e650478871
SHA197927daa1ec81982030201cac28abe8f107bd77c
SHA256febd9e4c06ffc2feb1ab248e15348f087aa1761f6140f563f88d504bdeadd855
SHA512a03556ea05c19693c3a619ad9c1d5748d7162af7132280caaa4359010128b3dba184a227a08bc03eadb5659417bb857775d31d80c8a4a71c7da85693769261bd
-
Filesize
175KB
MD5da84383c5054bb39e8d738e650478871
SHA197927daa1ec81982030201cac28abe8f107bd77c
SHA256febd9e4c06ffc2feb1ab248e15348f087aa1761f6140f563f88d504bdeadd855
SHA512a03556ea05c19693c3a619ad9c1d5748d7162af7132280caaa4359010128b3dba184a227a08bc03eadb5659417bb857775d31d80c8a4a71c7da85693769261bd
-
Filesize
543KB
MD53229286035db2e536ab64178cb3f6eab
SHA1382fab474a7e275fe8c47da70be7df0fb0782b2d
SHA256bd0d9e36a64f31adf1c33198c1d5d3a37d232f29860bb393296b8debd0a9a0c4
SHA5123751f4379fdfbd2d9d42ed8300e458e1155de8c64fa76a471865c8d65300b8a0f3778d7659d9462d82ddb4c0e58e7154db12dd79bae0bb87bc8c2876226dc5a3
-
Filesize
543KB
MD53229286035db2e536ab64178cb3f6eab
SHA1382fab474a7e275fe8c47da70be7df0fb0782b2d
SHA256bd0d9e36a64f31adf1c33198c1d5d3a37d232f29860bb393296b8debd0a9a0c4
SHA5123751f4379fdfbd2d9d42ed8300e458e1155de8c64fa76a471865c8d65300b8a0f3778d7659d9462d82ddb4c0e58e7154db12dd79bae0bb87bc8c2876226dc5a3
-
Filesize
292KB
MD531b20a2b13abd63441e0cb0a8e2f04b9
SHA111c010f41b6459c95c93f70734e013d77fb0053d
SHA256bac5fba356fa30a28c53eadd23a8b3377461f7d04e0d22d9e65871e92dce2b36
SHA512a37d6654295a9281b1ff3a37ef935a4868b13b0ebba4e9d4a3dec4662065345b24c55cebc036f289ef5010996c1a4377dc43e04a5a234029d72780264b766266
-
Filesize
292KB
MD531b20a2b13abd63441e0cb0a8e2f04b9
SHA111c010f41b6459c95c93f70734e013d77fb0053d
SHA256bac5fba356fa30a28c53eadd23a8b3377461f7d04e0d22d9e65871e92dce2b36
SHA512a37d6654295a9281b1ff3a37ef935a4868b13b0ebba4e9d4a3dec4662065345b24c55cebc036f289ef5010996c1a4377dc43e04a5a234029d72780264b766266
-
Filesize
350KB
MD51f3e282cb6fb4b5af69d3c6b70147f7d
SHA147ab3c7af0fefb5e8ac31a71bf1e5fdcf3b6b783
SHA25653ab2906f13b5287ce5cd3c0d7137d444454bffae588136b4d73fcb2cd868250
SHA51213f283efe91fecfc7438920a26337be0857c37663f0153ff311c05db05367e516744af17e16a0265ab3363c0c24d59be8b66f1c23478860fc63450e2103040ee
-
Filesize
350KB
MD51f3e282cb6fb4b5af69d3c6b70147f7d
SHA147ab3c7af0fefb5e8ac31a71bf1e5fdcf3b6b783
SHA25653ab2906f13b5287ce5cd3c0d7137d444454bffae588136b4d73fcb2cd868250
SHA51213f283efe91fecfc7438920a26337be0857c37663f0153ff311c05db05367e516744af17e16a0265ab3363c0c24d59be8b66f1c23478860fc63450e2103040ee