Analysis
-
max time kernel
124s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:42
Static task
static1
Behavioral task
behavioral1
Sample
fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe
Resource
win10v2004-20230220-en
General
-
Target
fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe
-
Size
682KB
-
MD5
3ecc5c19f0cbbaec1412fa4d8022f9c6
-
SHA1
001108ad0332beaa5c60c9a937c6ea78a352b347
-
SHA256
fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291
-
SHA512
d5f9e6a7e5ca840350e0d8683b4c5c97caa6d4570fc08dba6e71c74c0acfda5437c0bf9e28c75283f058bb02d4bb37e680a59f400ab5dcf7930344ad951a67fb
-
SSDEEP
12288:aK7KRc/2qg5H3fNrHqZ99foYUtoBsaUleNc8EfSzAON8ymWJtMsOYyBu:9mI2tH3fBHqZnfoYUt4rUleNECGy54bB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr806405.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
resource yara_rule behavioral1/memory/1228-162-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-163-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-165-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-167-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-169-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-171-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-173-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-175-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-177-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-179-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-181-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-183-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-185-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-187-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-189-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-191-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-193-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-195-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-197-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-199-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-201-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-203-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-205-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-207-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-209-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-211-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-213-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-215-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-219-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-217-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-221-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1228-223-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4284 zieN6673.exe 4844 jr806405.exe 1228 ku081645.exe 1556 lr730710.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr806405.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieN6673.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieN6673.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4736 1228 WerFault.exe 85 4984 1968 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4844 jr806405.exe 4844 jr806405.exe 1228 ku081645.exe 1228 ku081645.exe 1556 lr730710.exe 1556 lr730710.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4844 jr806405.exe Token: SeDebugPrivilege 1228 ku081645.exe Token: SeDebugPrivilege 1556 lr730710.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4284 1968 fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe 83 PID 1968 wrote to memory of 4284 1968 fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe 83 PID 1968 wrote to memory of 4284 1968 fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe 83 PID 4284 wrote to memory of 4844 4284 zieN6673.exe 84 PID 4284 wrote to memory of 4844 4284 zieN6673.exe 84 PID 4284 wrote to memory of 1228 4284 zieN6673.exe 85 PID 4284 wrote to memory of 1228 4284 zieN6673.exe 85 PID 4284 wrote to memory of 1228 4284 zieN6673.exe 85 PID 1968 wrote to memory of 1556 1968 fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe 89 PID 1968 wrote to memory of 1556 1968 fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe 89 PID 1968 wrote to memory of 1556 1968 fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe"C:\Users\Admin\AppData\Local\Temp\fed20c7e366733c624808d68518ab7eac3d80d6d6708c01b184277daf6b27291.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 13404⤵
- Program crash
PID:4736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 4922⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1228 -ip 12281⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1968 -ip 19681⤵PID:4772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd