Analysis
-
max time kernel
66s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:44
Static task
static1
Behavioral task
behavioral1
Sample
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe
Resource
win10v2004-20230220-en
General
-
Target
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe
-
Size
685KB
-
MD5
06d3169043f2d148447213dadaa64f21
-
SHA1
87c46249990a22c25a2087489071929209c38cd4
-
SHA256
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89
-
SHA512
b9067343cba67c24ad160179627b016c924c24b2e525fadfa6f0861eeba5b90b763f76bd862e9bc587ca327fd7cafe8bd8671107b4a13a3dbbf72a739d16fbf0
-
SSDEEP
12288:6Mrky90Xt2k07ePJ6PJFO+FRuYqPzTHV4d76Ez2CYBHx4EED44zUgoy:yyitNmflqPzTed76Ez4lx4EEDbggF
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4557.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4652-190-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-193-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-195-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-197-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-199-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-201-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-203-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-205-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-207-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-214-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline behavioral1/memory/4652-217-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-219-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-221-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-223-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-225-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4652-227-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3832 un496342.exe 3132 pro4557.exe 4652 qu8663.exe 3820 si881669.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4557.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4557.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un496342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un496342.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3516 3132 WerFault.exe 84 4420 4652 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3132 pro4557.exe 3132 pro4557.exe 4652 qu8663.exe 4652 qu8663.exe 3820 si881669.exe 3820 si881669.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3132 pro4557.exe Token: SeDebugPrivilege 4652 qu8663.exe Token: SeDebugPrivilege 3820 si881669.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3832 2376 fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe 83 PID 2376 wrote to memory of 3832 2376 fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe 83 PID 2376 wrote to memory of 3832 2376 fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe 83 PID 3832 wrote to memory of 3132 3832 un496342.exe 84 PID 3832 wrote to memory of 3132 3832 un496342.exe 84 PID 3832 wrote to memory of 3132 3832 un496342.exe 84 PID 3832 wrote to memory of 4652 3832 un496342.exe 93 PID 3832 wrote to memory of 4652 3832 un496342.exe 93 PID 3832 wrote to memory of 4652 3832 un496342.exe 93 PID 2376 wrote to memory of 3820 2376 fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe 98 PID 2376 wrote to memory of 3820 2376 fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe 98 PID 2376 wrote to memory of 3820 2376 fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe"C:\Users\Admin\AppData\Local\Temp\fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496342.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4557.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4557.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10884⤵
- Program crash
PID:3516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8663.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8663.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 20204⤵
- Program crash
PID:4420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881669.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3132 -ip 31321⤵PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4652 -ip 46521⤵PID:3220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD513b73a19258e031b8efde35bb68afa65
SHA1128fceb432cc2b72062350ab7626b0f3f93e682e
SHA256bce6d3db1b4f110bd40b12fa8494e550916db92e896ed51e3789deb0e891bd98
SHA5126b2a09537143275de1d5b6fc2799b2d8989def5cab7827c0d5d06565d911a904fbed9867966a61e287a32fecfd65a5f66b0f27f97ce28caf722062d3afb126bd
-
Filesize
175KB
MD513b73a19258e031b8efde35bb68afa65
SHA1128fceb432cc2b72062350ab7626b0f3f93e682e
SHA256bce6d3db1b4f110bd40b12fa8494e550916db92e896ed51e3789deb0e891bd98
SHA5126b2a09537143275de1d5b6fc2799b2d8989def5cab7827c0d5d06565d911a904fbed9867966a61e287a32fecfd65a5f66b0f27f97ce28caf722062d3afb126bd
-
Filesize
543KB
MD5c78b0cea599f4caac0888aeeab553571
SHA16b7e5956a11d0786ba855c9c8df3cb36ffc3ae87
SHA25602f7d14036029f2d65c0438af3fae9dd3bac7bb88f579a8620f011da4b2dd20b
SHA5129159a3cde498688944ed3f30545eb0ead58c61eafc635ffcfda2f95298fda09091c68511739457fbbd4fec82d78341e3ad2b87da2ee07d7aa94dece02082bb96
-
Filesize
543KB
MD5c78b0cea599f4caac0888aeeab553571
SHA16b7e5956a11d0786ba855c9c8df3cb36ffc3ae87
SHA25602f7d14036029f2d65c0438af3fae9dd3bac7bb88f579a8620f011da4b2dd20b
SHA5129159a3cde498688944ed3f30545eb0ead58c61eafc635ffcfda2f95298fda09091c68511739457fbbd4fec82d78341e3ad2b87da2ee07d7aa94dece02082bb96
-
Filesize
292KB
MD5725092286da25f165dbd034486366659
SHA1b3512687e42fb4c13f300db0ea96995b2f08a0ae
SHA2569fbbfd9950bfeb6346966caed11bfe89a6d3b37c556a4c5ec3df3abd42c1d547
SHA5129a475800638b6fed39f0318e219578748b677331f4f189233f73392dfc0c35a25a4f97d61342c4c5caa04af6010594c0bab8e51cd886d2805220d7fb0af34b1e
-
Filesize
292KB
MD5725092286da25f165dbd034486366659
SHA1b3512687e42fb4c13f300db0ea96995b2f08a0ae
SHA2569fbbfd9950bfeb6346966caed11bfe89a6d3b37c556a4c5ec3df3abd42c1d547
SHA5129a475800638b6fed39f0318e219578748b677331f4f189233f73392dfc0c35a25a4f97d61342c4c5caa04af6010594c0bab8e51cd886d2805220d7fb0af34b1e
-
Filesize
350KB
MD5235a269ead64da996ef591b3b1483dd9
SHA108115fcee461292b700e562ebf7733c76bf79631
SHA25689a2f17c2596e1cef1999cffbd4eead5ef52411b763ac18e26caf4972211545d
SHA51269a73f100d0279ebfd34a5da986cf522c9264213720159fe9535511c166a2627dfb6612b4138b05d0c33fe9aa1eb721aee94ef14e1bfa19505dbb4190766b3c4
-
Filesize
350KB
MD5235a269ead64da996ef591b3b1483dd9
SHA108115fcee461292b700e562ebf7733c76bf79631
SHA25689a2f17c2596e1cef1999cffbd4eead5ef52411b763ac18e26caf4972211545d
SHA51269a73f100d0279ebfd34a5da986cf522c9264213720159fe9535511c166a2627dfb6612b4138b05d0c33fe9aa1eb721aee94ef14e1bfa19505dbb4190766b3c4