Analysis
-
max time kernel
49s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:48
Static task
static1
Behavioral task
behavioral1
Sample
0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe
Resource
win10-20230220-en
General
-
Target
0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe
-
Size
685KB
-
MD5
02066f65e90b84b01491f2bcdc4d729e
-
SHA1
a45882589436d23560db3159f23a11f129b235d7
-
SHA256
0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7
-
SHA512
37a4415639403c815799b015490b9616db652ef792a79d21341a2543d723f9d24819fa4a301ffaa656a6af1dbcf06055c371350e2860548072dfacfaad212a07
-
SSDEEP
12288:QMriy9081BKPBSIExJ0WX7Af1zcBnKwEGIALtsgP:iyjmPBSmWX7Af2FKwEbE
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1932-181-0x00000000026B0000-0x00000000026F6000-memory.dmp family_redline behavioral1/memory/1932-182-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/1932-184-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-183-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-186-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-188-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-190-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-192-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-194-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-196-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-198-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-200-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-202-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-208-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-212-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-214-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-204-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-216-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-218-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/1932-220-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2588 un401744.exe 3012 pro6829.exe 1932 qu8197.exe 3472 si258840.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6829.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un401744.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un401744.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3012 pro6829.exe 3012 pro6829.exe 1932 qu8197.exe 1932 qu8197.exe 3472 si258840.exe 3472 si258840.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3012 pro6829.exe Token: SeDebugPrivilege 1932 qu8197.exe Token: SeDebugPrivilege 3472 si258840.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2588 2452 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe 66 PID 2452 wrote to memory of 2588 2452 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe 66 PID 2452 wrote to memory of 2588 2452 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe 66 PID 2588 wrote to memory of 3012 2588 un401744.exe 67 PID 2588 wrote to memory of 3012 2588 un401744.exe 67 PID 2588 wrote to memory of 3012 2588 un401744.exe 67 PID 2588 wrote to memory of 1932 2588 un401744.exe 68 PID 2588 wrote to memory of 1932 2588 un401744.exe 68 PID 2588 wrote to memory of 1932 2588 un401744.exe 68 PID 2452 wrote to memory of 3472 2452 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe 70 PID 2452 wrote to memory of 3472 2452 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe 70 PID 2452 wrote to memory of 3472 2452 0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe"C:\Users\Admin\AppData\Local\Temp\0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401744.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6829.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8197.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8197.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258840.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b59a32fb03f1d18c5bf6a00844dac6f2
SHA16636c89481a902b83121463294f980a8a390dad4
SHA256a8ca3581ef9d2f93818fe316768c661ce254fa3d9e68920c862a8c04152bef12
SHA512ebef0230373cdc340b59fe594c8e83f454674bbb0f0224a3442da021682e678d406a062bc774dbbfa4cec7d5f843ad4db9235cbbd8c3e52c0e7fd420d0234792
-
Filesize
175KB
MD5b59a32fb03f1d18c5bf6a00844dac6f2
SHA16636c89481a902b83121463294f980a8a390dad4
SHA256a8ca3581ef9d2f93818fe316768c661ce254fa3d9e68920c862a8c04152bef12
SHA512ebef0230373cdc340b59fe594c8e83f454674bbb0f0224a3442da021682e678d406a062bc774dbbfa4cec7d5f843ad4db9235cbbd8c3e52c0e7fd420d0234792
-
Filesize
543KB
MD50decadaf7d4916271ba19c0d825986e2
SHA189ea7a0f08cf0ecd1d27918dfd78648a16bddf54
SHA2561957e2e629f39515da8d96a01d4b2f8ac304896f45dce930f64ac81c6f2a2f59
SHA5123b7cb6e66a19aac8d22feaa68a6850bd25fe8ea4178dc722571698ace78f6deb1ba055c1b6105cdc09521c8772ab6122402179c3829b7ae200127398a91015df
-
Filesize
543KB
MD50decadaf7d4916271ba19c0d825986e2
SHA189ea7a0f08cf0ecd1d27918dfd78648a16bddf54
SHA2561957e2e629f39515da8d96a01d4b2f8ac304896f45dce930f64ac81c6f2a2f59
SHA5123b7cb6e66a19aac8d22feaa68a6850bd25fe8ea4178dc722571698ace78f6deb1ba055c1b6105cdc09521c8772ab6122402179c3829b7ae200127398a91015df
-
Filesize
292KB
MD563d8c646b3fd6384509dd2fecde27962
SHA1a98519e61f95a2a98089c44fe17dd5c0d5898f00
SHA256b6e36a4b9890b44ad65764ec4d86fa1134b51f191ca744dcef8bcd54f5c9fb47
SHA512e43e6e1768245c198a6f7b9957d729cd9beba0f12f09057887f58e04d1a9eabc3b0ea79d6d1db295ed4bb9ad95f6135707ab651d678ac4cfa19cda9594ed7108
-
Filesize
292KB
MD563d8c646b3fd6384509dd2fecde27962
SHA1a98519e61f95a2a98089c44fe17dd5c0d5898f00
SHA256b6e36a4b9890b44ad65764ec4d86fa1134b51f191ca744dcef8bcd54f5c9fb47
SHA512e43e6e1768245c198a6f7b9957d729cd9beba0f12f09057887f58e04d1a9eabc3b0ea79d6d1db295ed4bb9ad95f6135707ab651d678ac4cfa19cda9594ed7108
-
Filesize
350KB
MD550cda2e1f3cf7c94939277bb99d0e631
SHA189cd717b92e5decb55f4fcdeda323aeb4ba29349
SHA25607fcbb89887d62a1550a5bd10f0b5fd4de138c41097f35ecabaad65d1424be7e
SHA512335606313d599a1293285bebed14c3b245f60e20b82f63ad190ad2c2b02f2112062802f3db47d0fc3d4fe956015f8abe3436b0768b4f317ef218ad7930217591
-
Filesize
350KB
MD550cda2e1f3cf7c94939277bb99d0e631
SHA189cd717b92e5decb55f4fcdeda323aeb4ba29349
SHA25607fcbb89887d62a1550a5bd10f0b5fd4de138c41097f35ecabaad65d1424be7e
SHA512335606313d599a1293285bebed14c3b245f60e20b82f63ad190ad2c2b02f2112062802f3db47d0fc3d4fe956015f8abe3436b0768b4f317ef218ad7930217591