Analysis
-
max time kernel
95s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:42
Static task
static1
Behavioral task
behavioral1
Sample
f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe
Resource
win10v2004-20230221-en
General
-
Target
f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe
-
Size
685KB
-
MD5
b3e8964b60d8face6312ec66c5293598
-
SHA1
3e8b5cd17124aae3f04f0e78f4f46ad9a46d4190
-
SHA256
f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b
-
SHA512
441d7076ef57d9f8fe3117bc018a3215f9c26f08b8b25ab79248642bea4d50cb21977e6bc85a65243bbcab7ff67960b71733728bda6f2ec71de880046594eda9
-
SSDEEP
12288:+MrIy90fkjr4MBnstDpo78SfWVn4hOglTd7BquvEy3BDuE:iyaMsVUzWV4ogt1YuvE+5uE
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6776.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6776.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3152-191-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-192-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-194-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-196-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-198-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-200-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-202-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-204-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-208-0x0000000002970000-0x0000000002980000-memory.dmp family_redline behavioral1/memory/3152-212-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-207-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-214-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-216-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-218-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-220-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-222-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-224-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-226-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/3152-228-0x0000000002760000-0x000000000279E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 740 un664299.exe 1256 pro6776.exe 3152 qu0109.exe 1592 si754162.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6776.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un664299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un664299.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 744 1256 WerFault.exe 84 3012 3152 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1256 pro6776.exe 1256 pro6776.exe 3152 qu0109.exe 3152 qu0109.exe 1592 si754162.exe 1592 si754162.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1256 pro6776.exe Token: SeDebugPrivilege 3152 qu0109.exe Token: SeDebugPrivilege 1592 si754162.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2712 wrote to memory of 740 2712 f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe 83 PID 2712 wrote to memory of 740 2712 f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe 83 PID 2712 wrote to memory of 740 2712 f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe 83 PID 740 wrote to memory of 1256 740 un664299.exe 84 PID 740 wrote to memory of 1256 740 un664299.exe 84 PID 740 wrote to memory of 1256 740 un664299.exe 84 PID 740 wrote to memory of 3152 740 un664299.exe 93 PID 740 wrote to memory of 3152 740 un664299.exe 93 PID 740 wrote to memory of 3152 740 un664299.exe 93 PID 2712 wrote to memory of 1592 2712 f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe 97 PID 2712 wrote to memory of 1592 2712 f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe 97 PID 2712 wrote to memory of 1592 2712 f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe"C:\Users\Admin\AppData\Local\Temp\f9630ad7067c859d4eb3a68bba9d2980445e5953058d52e9e02af7cff7d3d82b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un664299.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un664299.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6776.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6776.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 10844⤵
- Program crash
PID:744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0109.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0109.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 18884⤵
- Program crash
PID:3012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si754162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si754162.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1256 -ip 12561⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3152 -ip 31521⤵PID:4004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD551b728f2b7ead0ded8d525d37d35335e
SHA1b4f3db89fb2d7af992e71eabbaff6ceaddd5dc17
SHA256c4f7ba602cd4d9e66641e440101e876736eb32f8d493aa2a4d62504c8215788c
SHA512a798718690459e0c2fb4748977811affae8947c8ac9c82cb0ad3a9a5b84ff36919fc843921a6d0b425d34af185a214032d79b246c460d35c1c1c66c8616b285c
-
Filesize
175KB
MD551b728f2b7ead0ded8d525d37d35335e
SHA1b4f3db89fb2d7af992e71eabbaff6ceaddd5dc17
SHA256c4f7ba602cd4d9e66641e440101e876736eb32f8d493aa2a4d62504c8215788c
SHA512a798718690459e0c2fb4748977811affae8947c8ac9c82cb0ad3a9a5b84ff36919fc843921a6d0b425d34af185a214032d79b246c460d35c1c1c66c8616b285c
-
Filesize
543KB
MD5547a0aad8a6502ca945c2c10fba52179
SHA1c247c550f308a46ca73eada69b9b480ece7a30af
SHA256a33697c54a518cba83cee55762dd7a2bae07b44394f9ebe5a4d3e1bf22b41328
SHA5129e4e33b05955285f086d0f01d4176b0029ebb7a7a601da30d9726ff137ffa5097705a6e004fa5ded6754636cb9ea077f13ed8a55a50b868f648a3acd7e21190e
-
Filesize
543KB
MD5547a0aad8a6502ca945c2c10fba52179
SHA1c247c550f308a46ca73eada69b9b480ece7a30af
SHA256a33697c54a518cba83cee55762dd7a2bae07b44394f9ebe5a4d3e1bf22b41328
SHA5129e4e33b05955285f086d0f01d4176b0029ebb7a7a601da30d9726ff137ffa5097705a6e004fa5ded6754636cb9ea077f13ed8a55a50b868f648a3acd7e21190e
-
Filesize
292KB
MD534418bcefe9131050b410db657451251
SHA1e630e4c9f7ff19ff48f1e7100bfe54d0e785af26
SHA2561fb0441210707a8cd1751b253d76c2adbcb8ef88d09cf4d816deb9549498c945
SHA512c1e16184b47454dd31b488a9bd6345e93a77f95aeea7309800cc02c33aab1ff1d41a5826d9b02ac064fd4e2b0491aa94f189ce9f976f05959fe878c624ce3b9f
-
Filesize
292KB
MD534418bcefe9131050b410db657451251
SHA1e630e4c9f7ff19ff48f1e7100bfe54d0e785af26
SHA2561fb0441210707a8cd1751b253d76c2adbcb8ef88d09cf4d816deb9549498c945
SHA512c1e16184b47454dd31b488a9bd6345e93a77f95aeea7309800cc02c33aab1ff1d41a5826d9b02ac064fd4e2b0491aa94f189ce9f976f05959fe878c624ce3b9f
-
Filesize
350KB
MD5e88351cd546b853e998e33d06ed9c365
SHA10a22a2f61828ad699410d92d821efee248d028b7
SHA256aa2c2dc2b74dd61b40700d63bdf36a85efd223c861fd5184339434162b5440da
SHA512e87686001a3924fd9dea4002116b2ae1c11626ee16c3f73cb975878ebe27b7fa09a3e5848a2c1b49ab5e693a92c0c3dfa71981fffce04b1b31c1dad41577b2da
-
Filesize
350KB
MD5e88351cd546b853e998e33d06ed9c365
SHA10a22a2f61828ad699410d92d821efee248d028b7
SHA256aa2c2dc2b74dd61b40700d63bdf36a85efd223c861fd5184339434162b5440da
SHA512e87686001a3924fd9dea4002116b2ae1c11626ee16c3f73cb975878ebe27b7fa09a3e5848a2c1b49ab5e693a92c0c3dfa71981fffce04b1b31c1dad41577b2da