Analysis
-
max time kernel
85s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:51
Static task
static1
Behavioral task
behavioral1
Sample
55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe
Resource
win10v2004-20230221-en
General
-
Target
55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe
-
Size
685KB
-
MD5
ac77252cfe06529807885e1dc3adf98d
-
SHA1
08fcd3c297e4735ba125bcbda89d53f59b62ae19
-
SHA256
55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6
-
SHA512
5a9e0628b2a3b42aea906c616e8706ae2fecd1a0a2d807c68c73ce8c3232fb58782d71ffda8a489867b82c43f13c783437edc255fc1fd9a2a4c5dfe10f11ba54
-
SSDEEP
12288:nMrHy90kVnTsmwM6AylVFdTzjoa+Tr8BlYoEiIxE4:0y/RTsmwM6ZTzjN+8HYoEiJ4
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7485.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3584-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3584-372-0x0000000004DA0000-0x0000000004DB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 740 un961468.exe 2192 pro7485.exe 3584 qu4757.exe 880 si523450.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7485.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un961468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un961468.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 432 2192 WerFault.exe 83 1564 3584 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2192 pro7485.exe 2192 pro7485.exe 3584 qu4757.exe 3584 qu4757.exe 880 si523450.exe 880 si523450.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2192 pro7485.exe Token: SeDebugPrivilege 3584 qu4757.exe Token: SeDebugPrivilege 880 si523450.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2224 wrote to memory of 740 2224 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe 82 PID 2224 wrote to memory of 740 2224 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe 82 PID 2224 wrote to memory of 740 2224 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe 82 PID 740 wrote to memory of 2192 740 un961468.exe 83 PID 740 wrote to memory of 2192 740 un961468.exe 83 PID 740 wrote to memory of 2192 740 un961468.exe 83 PID 740 wrote to memory of 3584 740 un961468.exe 89 PID 740 wrote to memory of 3584 740 un961468.exe 89 PID 740 wrote to memory of 3584 740 un961468.exe 89 PID 2224 wrote to memory of 880 2224 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe 92 PID 2224 wrote to memory of 880 2224 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe 92 PID 2224 wrote to memory of 880 2224 55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe"C:\Users\Admin\AppData\Local\Temp\55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un961468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un961468.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7485.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 10844⤵
- Program crash
PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4757.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 19804⤵
- Program crash
PID:1564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523450.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523450.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2192 -ip 21921⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3584 -ip 35841⤵PID:2700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD574384e94fd7e0b62a67f27dddf93a89b
SHA10d2969a20eab3d6410716da377ed24861de317d2
SHA25610d3f27ca2f4de55f0ab28d4c00e80c47cb335e5d8d0b29fa49759b696950a62
SHA512b1907f2652e819c29c3d9a6caa3dcad1e31241168c5c1634f928afbcc73e5bad7d564dc695d5109c30002f64a80ec264b5246d15903a5a1891471275ed3617e7
-
Filesize
175KB
MD574384e94fd7e0b62a67f27dddf93a89b
SHA10d2969a20eab3d6410716da377ed24861de317d2
SHA25610d3f27ca2f4de55f0ab28d4c00e80c47cb335e5d8d0b29fa49759b696950a62
SHA512b1907f2652e819c29c3d9a6caa3dcad1e31241168c5c1634f928afbcc73e5bad7d564dc695d5109c30002f64a80ec264b5246d15903a5a1891471275ed3617e7
-
Filesize
543KB
MD598866fbc5f379a6593a7d6d005cdb3e3
SHA1f5439258c83cc907ddd62c3862543f2a82f34b2d
SHA256c39368740d78d8536681b98e228ead04266b6536a44425118645fb3e047f0d36
SHA512f5f1e6d71500d54d3f6404863d9d738233980074e23cbdcf10756cfcbe6ee9010786d93dcd55c40a4888a3ff38661cfe41ccf8c5fa3d5bfc9cf1ecaf4273fb0e
-
Filesize
543KB
MD598866fbc5f379a6593a7d6d005cdb3e3
SHA1f5439258c83cc907ddd62c3862543f2a82f34b2d
SHA256c39368740d78d8536681b98e228ead04266b6536a44425118645fb3e047f0d36
SHA512f5f1e6d71500d54d3f6404863d9d738233980074e23cbdcf10756cfcbe6ee9010786d93dcd55c40a4888a3ff38661cfe41ccf8c5fa3d5bfc9cf1ecaf4273fb0e
-
Filesize
292KB
MD58b9a121752e752b632102738105bafe2
SHA133ce3698a74f3b007da2d6748719cc6f281595a8
SHA256a03a9ced07bf4c21517293f70f6ba0332a0fb8642c484ce5238e6e329019b80c
SHA51215150ad0025fff3afac0a709a46a89d7a93cf383c751137af44e61afbfdff1f556821eabfed875741205f8bc7a8c3d6937137047576d9d0156c3aa4bced73a8b
-
Filesize
292KB
MD58b9a121752e752b632102738105bafe2
SHA133ce3698a74f3b007da2d6748719cc6f281595a8
SHA256a03a9ced07bf4c21517293f70f6ba0332a0fb8642c484ce5238e6e329019b80c
SHA51215150ad0025fff3afac0a709a46a89d7a93cf383c751137af44e61afbfdff1f556821eabfed875741205f8bc7a8c3d6937137047576d9d0156c3aa4bced73a8b
-
Filesize
350KB
MD5705b1e42e67896464a253800c923c473
SHA1aab9bc22de1c002ff752bf342fe21a45fca168c6
SHA256d8557b46b3f9cf793653c65d80007bfbce994f380a67c405682dfa75bd8732e4
SHA5127c7305e5999dbbdd265ff721a34a5fbd07fdb0ce66beb53c68ffd08c1b4832ba9205ea5f25295e2907835cec866a69bdea4641110728db2aae3a9ef0a327b22e
-
Filesize
350KB
MD5705b1e42e67896464a253800c923c473
SHA1aab9bc22de1c002ff752bf342fe21a45fca168c6
SHA256d8557b46b3f9cf793653c65d80007bfbce994f380a67c405682dfa75bd8732e4
SHA5127c7305e5999dbbdd265ff721a34a5fbd07fdb0ce66beb53c68ffd08c1b4832ba9205ea5f25295e2907835cec866a69bdea4641110728db2aae3a9ef0a327b22e