Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:50
Static task
static1
Behavioral task
behavioral1
Sample
c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe
Resource
win10v2004-20230220-en
General
-
Target
c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe
-
Size
685KB
-
MD5
b7f5f4da82f2a32a1e717b9c9690f5c0
-
SHA1
2fdf48f06b7bc0b8e501e564764d60095a7cc529
-
SHA256
c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7
-
SHA512
d8817bf3fdb2bf3b22817def47f27a60a83db524c816b1d69f9c3b113409a31e26e8c7b29abd03a609846d7bad050f0799c0e3040d1a029de70d251d4286127a
-
SSDEEP
12288:wMriy90NNyqPPsYAs/tg1zDLRHSYjfj7BAkaE6GSg2dbOUJ:CyYRkYLg1zDpFvykaE6ldbO2
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8968.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8968.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4412-195-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-196-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-198-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-200-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-202-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-204-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-206-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-208-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-210-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-214-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-212-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-216-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-218-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-220-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-222-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-224-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-226-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4412-228-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1672 un797869.exe 608 pro8968.exe 4412 qu3926.exe 1460 si636020.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8968.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un797869.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un797869.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1028 608 WerFault.exe 84 4212 4412 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 608 pro8968.exe 608 pro8968.exe 4412 qu3926.exe 4412 qu3926.exe 1460 si636020.exe 1460 si636020.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 608 pro8968.exe Token: SeDebugPrivilege 4412 qu3926.exe Token: SeDebugPrivilege 1460 si636020.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 228 wrote to memory of 1672 228 c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe 83 PID 228 wrote to memory of 1672 228 c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe 83 PID 228 wrote to memory of 1672 228 c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe 83 PID 1672 wrote to memory of 608 1672 un797869.exe 84 PID 1672 wrote to memory of 608 1672 un797869.exe 84 PID 1672 wrote to memory of 608 1672 un797869.exe 84 PID 1672 wrote to memory of 4412 1672 un797869.exe 93 PID 1672 wrote to memory of 4412 1672 un797869.exe 93 PID 1672 wrote to memory of 4412 1672 un797869.exe 93 PID 228 wrote to memory of 1460 228 c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe 98 PID 228 wrote to memory of 1460 228 c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe 98 PID 228 wrote to memory of 1460 228 c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe"C:\Users\Admin\AppData\Local\Temp\c09b1574295936f6e63f3e604ef58791a208ba3035d7f825736da1fc0a592df7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797869.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 10844⤵
- Program crash
PID:1028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3926.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 17284⤵
- Program crash
PID:4212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636020.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636020.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 608 -ip 6081⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4412 -ip 44121⤵PID:4480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5976788ca3371a4e6f825cc6f6723f9ce
SHA110bb3d1b66c63858c17d95da5b9e8a65581eb411
SHA25665c3c9fe9f22ee0fbed38e08635db85625087c0dab5b695abbcd29e9ae9c3b47
SHA512bf5eb605d322ab603255a84ea801c658d9686502f67cc929ad07c6d49350ac25fd2f2afd9a17face615d0825d5dfc897e55a7e204bd255f3cbd99717a0d1c3cb
-
Filesize
175KB
MD5976788ca3371a4e6f825cc6f6723f9ce
SHA110bb3d1b66c63858c17d95da5b9e8a65581eb411
SHA25665c3c9fe9f22ee0fbed38e08635db85625087c0dab5b695abbcd29e9ae9c3b47
SHA512bf5eb605d322ab603255a84ea801c658d9686502f67cc929ad07c6d49350ac25fd2f2afd9a17face615d0825d5dfc897e55a7e204bd255f3cbd99717a0d1c3cb
-
Filesize
543KB
MD5a10464809425aaa19f43bd772b7a12ca
SHA1a0ac0960138aadbfc341af7ab832579c300b6f12
SHA2565dd5f9bc21680285d7c9f005823d655a20595f53149e0951d8e1eb5b5e28227b
SHA5127671a96d17454207cf43a10069365673a8920a98b6a7c7212316e0fc0b6383b46532db5355a4d0f02a654c40c150ebbde390339701158888e70a8dc13055febe
-
Filesize
543KB
MD5a10464809425aaa19f43bd772b7a12ca
SHA1a0ac0960138aadbfc341af7ab832579c300b6f12
SHA2565dd5f9bc21680285d7c9f005823d655a20595f53149e0951d8e1eb5b5e28227b
SHA5127671a96d17454207cf43a10069365673a8920a98b6a7c7212316e0fc0b6383b46532db5355a4d0f02a654c40c150ebbde390339701158888e70a8dc13055febe
-
Filesize
292KB
MD5b4dca1f4c49ddac1b26c76962095bbce
SHA1917db438f17a7f02ed6f59630106e7feaa7bd3f3
SHA2564ff241a324b61b0c1fad609e887bb96144bea997145efabc01ebd5b3566ff5fa
SHA51299b69ecd2f7c0ee4658e806a16712e1db000abee7eb546d3a2f42e238978c9f697e8726de7580194e2ba5a99e46f2992b5a04a323e2380d35316f953bc716b9a
-
Filesize
292KB
MD5b4dca1f4c49ddac1b26c76962095bbce
SHA1917db438f17a7f02ed6f59630106e7feaa7bd3f3
SHA2564ff241a324b61b0c1fad609e887bb96144bea997145efabc01ebd5b3566ff5fa
SHA51299b69ecd2f7c0ee4658e806a16712e1db000abee7eb546d3a2f42e238978c9f697e8726de7580194e2ba5a99e46f2992b5a04a323e2380d35316f953bc716b9a
-
Filesize
350KB
MD58ab1512879bfbe73c42cab07ccf065e5
SHA118838b578ad8bd6d5f7949660b746facf124880a
SHA256f7200fb36f501b06c5c27c800f4c2bec59f528463839b738e16385c38c43178f
SHA512d7ecceabbfc97b5b9f15997ef11ba6e2fc95ac16dbf19e3fad189b25ddad03df654483867726e7db1c7db63f16170046ed9cc980527f89c0c76497811955b868
-
Filesize
350KB
MD58ab1512879bfbe73c42cab07ccf065e5
SHA118838b578ad8bd6d5f7949660b746facf124880a
SHA256f7200fb36f501b06c5c27c800f4c2bec59f528463839b738e16385c38c43178f
SHA512d7ecceabbfc97b5b9f15997ef11ba6e2fc95ac16dbf19e3fad189b25ddad03df654483867726e7db1c7db63f16170046ed9cc980527f89c0c76497811955b868