Analysis
-
max time kernel
88s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:45
Static task
static1
Behavioral task
behavioral1
Sample
03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe
Resource
win10v2004-20230220-en
General
-
Target
03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe
-
Size
685KB
-
MD5
75bc6495f484ae276724ae967326fa6f
-
SHA1
f4a58f483bc340bcb7ef4ea65d8d4903fb169292
-
SHA256
03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235
-
SHA512
837825fa821b676cb21a73ccc234462e0e250c3299d9d247d27ebd6b5575c50c7894dca79b2896df9c3366ef05a1b12005d476bbba3aed479bd8e477f0a482d8
-
SSDEEP
12288:qMrcy90irFnnTrrQScDxGbczCXhKvm72+Im7BmbLEXjZlTvNsPLzdQTqvYrZH:CyRrZTrUSGGbczCxKe7eiMbLEXoL811
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0925.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0925.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3616-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3616-350-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline behavioral1/memory/3616-352-0x0000000004E20000-0x0000000004E30000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3840 un781884.exe 4876 pro0925.exe 3616 qu1007.exe 1516 si089969.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0925.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0925.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un781884.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un781884.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 628 4876 WerFault.exe 86 3248 3616 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4876 pro0925.exe 4876 pro0925.exe 3616 qu1007.exe 3616 qu1007.exe 1516 si089969.exe 1516 si089969.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4876 pro0925.exe Token: SeDebugPrivilege 3616 qu1007.exe Token: SeDebugPrivilege 1516 si089969.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5028 wrote to memory of 3840 5028 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe 85 PID 5028 wrote to memory of 3840 5028 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe 85 PID 5028 wrote to memory of 3840 5028 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe 85 PID 3840 wrote to memory of 4876 3840 un781884.exe 86 PID 3840 wrote to memory of 4876 3840 un781884.exe 86 PID 3840 wrote to memory of 4876 3840 un781884.exe 86 PID 3840 wrote to memory of 3616 3840 un781884.exe 92 PID 3840 wrote to memory of 3616 3840 un781884.exe 92 PID 3840 wrote to memory of 3616 3840 un781884.exe 92 PID 5028 wrote to memory of 1516 5028 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe 95 PID 5028 wrote to memory of 1516 5028 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe 95 PID 5028 wrote to memory of 1516 5028 03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe"C:\Users\Admin\AppData\Local\Temp\03e265ba10823e5a025eef1e0ddee04913e58058c01023f4151e024002926235.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781884.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781884.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0925.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 10844⤵
- Program crash
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1007.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 9924⤵
- Program crash
PID:3248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si089969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si089969.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4876 -ip 48761⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3616 -ip 36161⤵PID:1064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d19a48e0c4543e218decb4b165f69fb7
SHA15fd21840b0437514325a7757a5ea65bce78a131b
SHA256f5554e499e71a7595ecc0b9b1a2da40775e70b95a07374bb9d6849fe9b513b79
SHA51238e9389ec54bf70f4bb28bd2cc8bbb2621e4de053d4f26e833554f57f7a83a7ccaaf5a9f59cb3fe110bfe015c949ade03c68f9afb5a0c58bafb78fd4ee93848b
-
Filesize
175KB
MD5d19a48e0c4543e218decb4b165f69fb7
SHA15fd21840b0437514325a7757a5ea65bce78a131b
SHA256f5554e499e71a7595ecc0b9b1a2da40775e70b95a07374bb9d6849fe9b513b79
SHA51238e9389ec54bf70f4bb28bd2cc8bbb2621e4de053d4f26e833554f57f7a83a7ccaaf5a9f59cb3fe110bfe015c949ade03c68f9afb5a0c58bafb78fd4ee93848b
-
Filesize
543KB
MD539e4afffd449834675b31aabf8287ad1
SHA1fa8484ee527438946af5f7be9c7413e6aae2a2f3
SHA256376dd389aef0694bb3175a0f4f691968c7bced7786b2e24af252d679fa339644
SHA512195fb4c04fd43f3be0fdede5e7415b339787b49fc066f772bab65c13b91ad807322dc4d5c559be2ec255387967b50ae5154b0a008f1b97e28b3952eaa9d61eaa
-
Filesize
543KB
MD539e4afffd449834675b31aabf8287ad1
SHA1fa8484ee527438946af5f7be9c7413e6aae2a2f3
SHA256376dd389aef0694bb3175a0f4f691968c7bced7786b2e24af252d679fa339644
SHA512195fb4c04fd43f3be0fdede5e7415b339787b49fc066f772bab65c13b91ad807322dc4d5c559be2ec255387967b50ae5154b0a008f1b97e28b3952eaa9d61eaa
-
Filesize
292KB
MD5ed5fdc94e8ff14e0b995e943a9b567a7
SHA1825befa79af0b0f6b687f49a88ce42c8d0ef3b7a
SHA2563edf06132e49c617361249b044951ade10fb7088a56e80a2d75285abdd86f1ed
SHA512d2a4b33a2a4cb9635f0e3aa0a5c38060d30d146d3fe4b6770471c18a0b9398b04be8548e5fd1807e71d449134c2666aa76d91f0bd2c0f8277f333217d1cbafa5
-
Filesize
292KB
MD5ed5fdc94e8ff14e0b995e943a9b567a7
SHA1825befa79af0b0f6b687f49a88ce42c8d0ef3b7a
SHA2563edf06132e49c617361249b044951ade10fb7088a56e80a2d75285abdd86f1ed
SHA512d2a4b33a2a4cb9635f0e3aa0a5c38060d30d146d3fe4b6770471c18a0b9398b04be8548e5fd1807e71d449134c2666aa76d91f0bd2c0f8277f333217d1cbafa5
-
Filesize
350KB
MD56c9b433532cfaf4141dba2fd90db1150
SHA15eaf70321a3819a791dbc98405975d3cc3cf464e
SHA2563e36a4e383598a43989adb937ca288671d9e0caf1eb9281c0fdd9057a5ca0ffd
SHA51210b2b9eb346e33694c5c0e1df1828140b6a254aa5ab862a2bbf599a952e8371b489cd29c12beb9ac0b2772bbd6126f7aeacf6e66d1c9a2b407223920fbb61bfb
-
Filesize
350KB
MD56c9b433532cfaf4141dba2fd90db1150
SHA15eaf70321a3819a791dbc98405975d3cc3cf464e
SHA2563e36a4e383598a43989adb937ca288671d9e0caf1eb9281c0fdd9057a5ca0ffd
SHA51210b2b9eb346e33694c5c0e1df1828140b6a254aa5ab862a2bbf599a952e8371b489cd29c12beb9ac0b2772bbd6126f7aeacf6e66d1c9a2b407223920fbb61bfb