Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:39
Static task
static1
Behavioral task
behavioral1
Sample
4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe
Resource
win10v2004-20230221-en
General
-
Target
4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe
-
Size
685KB
-
MD5
3f1f21de2d53faf3baff8014ac49e231
-
SHA1
b879ef53e95b7695f64baec581da0827e454ab38
-
SHA256
4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8
-
SHA512
d5660044979ccaec7f8812e5ad9b09ab295d5a698850bc7e831bdf82e63a958b50255e771f49271a84d7bee6b481159141123f0461f0fcc5ad64ef675da44e67
-
SSDEEP
12288:mMr+y90CpTO4/Lju/ZgL4WYrwoqmiqdK7BubzE8JLA20df/GSo:syxfu/ZgEWSLZi02UbzE84fXo
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4379.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2072-195-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-197-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-194-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-199-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-201-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-203-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-205-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-207-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-209-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-211-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-213-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-215-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-217-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-219-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-221-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-223-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-225-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/2072-227-0x0000000002700000-0x000000000273E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4800 un936028.exe 4804 pro4379.exe 2072 qu7113.exe 4116 si277950.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4379.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un936028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un936028.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 620 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 212 4804 WerFault.exe 83 4344 2072 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4804 pro4379.exe 4804 pro4379.exe 2072 qu7113.exe 2072 qu7113.exe 4116 si277950.exe 4116 si277950.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4804 pro4379.exe Token: SeDebugPrivilege 2072 qu7113.exe Token: SeDebugPrivilege 4116 si277950.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4800 3484 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe 82 PID 3484 wrote to memory of 4800 3484 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe 82 PID 3484 wrote to memory of 4800 3484 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe 82 PID 4800 wrote to memory of 4804 4800 un936028.exe 83 PID 4800 wrote to memory of 4804 4800 un936028.exe 83 PID 4800 wrote to memory of 4804 4800 un936028.exe 83 PID 4800 wrote to memory of 2072 4800 un936028.exe 89 PID 4800 wrote to memory of 2072 4800 un936028.exe 89 PID 4800 wrote to memory of 2072 4800 un936028.exe 89 PID 3484 wrote to memory of 4116 3484 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe 92 PID 3484 wrote to memory of 4116 3484 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe 92 PID 3484 wrote to memory of 4116 3484 4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe"C:\Users\Admin\AppData\Local\Temp\4d47b3a0e03b8ce78ce1905d54e9acbf5ec8ae0ba63a94f917c6334365701fa8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936028.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4379.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4379.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 10924⤵
- Program crash
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7113.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 9804⤵
- Program crash
PID:4344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277950.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4804 -ip 48041⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2072 -ip 20721⤵PID:2104
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fdf009443d8b65766ffb3270aa932bfe
SHA1ed8ea967ddf2110f072df58354f0ab609b3debf9
SHA2567a68ab134235f7ed2d2565be6ab2ba239c3b5948f9b7ee2216d9856de2e3429b
SHA5123b5a4bdbaa2e1eee31e02b5c55320f933ef0b4d2691a4721ed8f9d142633e2d2d070f2c30c706b0ad86b6a988c0f2bd6b048411d47fa8116e0ad3ee04f0ca11a
-
Filesize
175KB
MD5fdf009443d8b65766ffb3270aa932bfe
SHA1ed8ea967ddf2110f072df58354f0ab609b3debf9
SHA2567a68ab134235f7ed2d2565be6ab2ba239c3b5948f9b7ee2216d9856de2e3429b
SHA5123b5a4bdbaa2e1eee31e02b5c55320f933ef0b4d2691a4721ed8f9d142633e2d2d070f2c30c706b0ad86b6a988c0f2bd6b048411d47fa8116e0ad3ee04f0ca11a
-
Filesize
543KB
MD5293bdfe533539965b310ea992b3cbfbd
SHA1f2409d078d7b2fe18b0647213928e043a51a72fa
SHA25623c92f629f607f260a7588c506e8e43bcc9cee180cc82994a52956538a4b47f6
SHA512a04ce8b009ff07bd086a17969fd33617785a3a8f4b68ba264478f00786f08ea7dac032cf719b614dae6f291f0e58fa4464e928765e0fe06d2c456361ffe716d6
-
Filesize
543KB
MD5293bdfe533539965b310ea992b3cbfbd
SHA1f2409d078d7b2fe18b0647213928e043a51a72fa
SHA25623c92f629f607f260a7588c506e8e43bcc9cee180cc82994a52956538a4b47f6
SHA512a04ce8b009ff07bd086a17969fd33617785a3a8f4b68ba264478f00786f08ea7dac032cf719b614dae6f291f0e58fa4464e928765e0fe06d2c456361ffe716d6
-
Filesize
292KB
MD5bdbf7c1910af3b6046d2e1325fb02b0e
SHA1b881c95ef603e4407e0833709f24bf03b26ce741
SHA25623fa68460203e09952bd404062a2fe59443d26b016417c61566872ddb90fae4a
SHA512ba40e86f64624f2d8ae441b4814fa49e6ffffffff8a898fb24c117cd729bdc7e38c3c610f87b585431a1eb91127e51224046fe1870d5f78c7d3a46357dcccbe7
-
Filesize
292KB
MD5bdbf7c1910af3b6046d2e1325fb02b0e
SHA1b881c95ef603e4407e0833709f24bf03b26ce741
SHA25623fa68460203e09952bd404062a2fe59443d26b016417c61566872ddb90fae4a
SHA512ba40e86f64624f2d8ae441b4814fa49e6ffffffff8a898fb24c117cd729bdc7e38c3c610f87b585431a1eb91127e51224046fe1870d5f78c7d3a46357dcccbe7
-
Filesize
350KB
MD58c8c13d696b3390fc187728eee609b87
SHA1117bc84e809bf05c4d722ea3b67ac1c83a63afcf
SHA256854fa1eae8abd368605777580c6ae7ac386247b42f64760cc7da6ace7033f445
SHA51225d7011635383329d7621d841df8fe6cbdf852d25240bd0b482de02b6657dbd829f01f980dc47f424b175541cfa3383adec02b171e728ce3a63a48c16e3a3e34
-
Filesize
350KB
MD58c8c13d696b3390fc187728eee609b87
SHA1117bc84e809bf05c4d722ea3b67ac1c83a63afcf
SHA256854fa1eae8abd368605777580c6ae7ac386247b42f64760cc7da6ace7033f445
SHA51225d7011635383329d7621d841df8fe6cbdf852d25240bd0b482de02b6657dbd829f01f980dc47f424b175541cfa3383adec02b171e728ce3a63a48c16e3a3e34