Analysis
-
max time kernel
141s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:41
Static task
static1
Behavioral task
behavioral1
Sample
0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe
Resource
win10v2004-20230220-en
General
-
Target
0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe
-
Size
685KB
-
MD5
a6d4ed4138b5d81929c9342bee6bd446
-
SHA1
4993c44aaa3d741f1aaafd0f3c2f3ca0a4f80edc
-
SHA256
0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c
-
SHA512
a1ab660cd5eef4b3447dd936d04a122b8bed0b4967bbeecde1b3d99b0f953c36395e4805e9e112680201ffa669625e712c09cb3983103b238cb9d3ee5a70058f
-
SSDEEP
12288:iMrcy90xZQvPVomfe9N6x1P/JPkyGx7QhooMr+/nmYinBLkiEOdx8Uilr:iyPl4Ex1P/RUoMldBkiEmip
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5205.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1100-191-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-192-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-194-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-196-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-198-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-200-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-202-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-204-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-206-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-208-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-210-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-212-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-214-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-216-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-218-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-220-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-222-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-224-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/1100-336-0x0000000004FB0000-0x0000000004FC0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3824 un111932.exe 840 pro5205.exe 1100 qu6465.exe 1920 si758132.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5205.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un111932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un111932.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4460 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 956 840 WerFault.exe 84 1612 1100 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 840 pro5205.exe 840 pro5205.exe 1100 qu6465.exe 1100 qu6465.exe 1920 si758132.exe 1920 si758132.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 840 pro5205.exe Token: SeDebugPrivilege 1100 qu6465.exe Token: SeDebugPrivilege 1920 si758132.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3824 3056 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe 83 PID 3056 wrote to memory of 3824 3056 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe 83 PID 3056 wrote to memory of 3824 3056 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe 83 PID 3824 wrote to memory of 840 3824 un111932.exe 84 PID 3824 wrote to memory of 840 3824 un111932.exe 84 PID 3824 wrote to memory of 840 3824 un111932.exe 84 PID 3824 wrote to memory of 1100 3824 un111932.exe 90 PID 3824 wrote to memory of 1100 3824 un111932.exe 90 PID 3824 wrote to memory of 1100 3824 un111932.exe 90 PID 3056 wrote to memory of 1920 3056 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe 95 PID 3056 wrote to memory of 1920 3056 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe 95 PID 3056 wrote to memory of 1920 3056 0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe"C:\Users\Admin\AppData\Local\Temp\0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111932.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5205.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5205.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 10844⤵
- Program crash
PID:956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6465.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6465.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 17884⤵
- Program crash
PID:1612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758132.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 840 -ip 8401⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1100 -ip 11001⤵PID:4964
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b6aad4ac7fdfd60a149562e1c54a7c44
SHA173ca4378598544d047d2e4cfe826bd4009b5e078
SHA2569be65f87ae00c47f5f72ddc0501411244d26aa2b806fc481fe74c63f902d9256
SHA512df53685c59b45c27cf419dd52f1f1c8c7298a49fa465ee7f34c3d897508c2c67e725ac3601753598a380634088f461895c6ad0e2049b895e9d413494ab470fda
-
Filesize
175KB
MD5b6aad4ac7fdfd60a149562e1c54a7c44
SHA173ca4378598544d047d2e4cfe826bd4009b5e078
SHA2569be65f87ae00c47f5f72ddc0501411244d26aa2b806fc481fe74c63f902d9256
SHA512df53685c59b45c27cf419dd52f1f1c8c7298a49fa465ee7f34c3d897508c2c67e725ac3601753598a380634088f461895c6ad0e2049b895e9d413494ab470fda
-
Filesize
543KB
MD51feb4bcd068d5d3081f844063d2c4f6d
SHA1ad92eb0c07089a5ec4a9cfc0bc4b7f3c15ab0c77
SHA2566452c0254ae3ffa2427d17db05069055b60323973ff7129dba82d1e59932907d
SHA51217cf3148c99a2496d66209024299d05d0debd9ad05c22650f32b8bb8d105b8cc9b5b4ea977784efbdc0f8ba63b8ed7bae82189afa8a80c7b65509f5d55f68df8
-
Filesize
543KB
MD51feb4bcd068d5d3081f844063d2c4f6d
SHA1ad92eb0c07089a5ec4a9cfc0bc4b7f3c15ab0c77
SHA2566452c0254ae3ffa2427d17db05069055b60323973ff7129dba82d1e59932907d
SHA51217cf3148c99a2496d66209024299d05d0debd9ad05c22650f32b8bb8d105b8cc9b5b4ea977784efbdc0f8ba63b8ed7bae82189afa8a80c7b65509f5d55f68df8
-
Filesize
292KB
MD505af589d8f1d23325892dd9cfa5aef41
SHA19d542e12e2668de76c69431a3162eac5f9157f9f
SHA2566232548999ac8c2935e3d384e3fdb017f4c7d22422d7dfc058aef39e6f0de944
SHA51201c1108008a70bac66c6a330d0f1800102f952ca744e15d1e474271f68a2c7acf9e8439072f3e804e9174efac9a3978217c05075d5371ce9681b8768362e60d9
-
Filesize
292KB
MD505af589d8f1d23325892dd9cfa5aef41
SHA19d542e12e2668de76c69431a3162eac5f9157f9f
SHA2566232548999ac8c2935e3d384e3fdb017f4c7d22422d7dfc058aef39e6f0de944
SHA51201c1108008a70bac66c6a330d0f1800102f952ca744e15d1e474271f68a2c7acf9e8439072f3e804e9174efac9a3978217c05075d5371ce9681b8768362e60d9
-
Filesize
350KB
MD5cbd4c17b4008edcfff1ac0c8c74cd243
SHA1359e3269f0c9c0c7d39dd587cadb5ca24f4f28c5
SHA25618b4b5ef130ce01c6f85f0069e0d2485b84be427663e630d73b0e59353bd4cad
SHA512fbaac04f8e112fef773a5ad879b92af30102bc4141cfb08148e3fbd5e210a03d23371e8dd07b1c42fa6aa094dbb456ef7e3a16797f64bbd172407dc5b8d39e8d
-
Filesize
350KB
MD5cbd4c17b4008edcfff1ac0c8c74cd243
SHA1359e3269f0c9c0c7d39dd587cadb5ca24f4f28c5
SHA25618b4b5ef130ce01c6f85f0069e0d2485b84be427663e630d73b0e59353bd4cad
SHA512fbaac04f8e112fef773a5ad879b92af30102bc4141cfb08148e3fbd5e210a03d23371e8dd07b1c42fa6aa094dbb456ef7e3a16797f64bbd172407dc5b8d39e8d