Analysis
-
max time kernel
50s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:53
Static task
static1
Behavioral task
behavioral1
Sample
29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe
Resource
win10-20230220-en
General
-
Target
29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe
-
Size
685KB
-
MD5
efea4eaeed461c7d12cfad2f17d7e561
-
SHA1
db45975881acb596c9db3469b2d813a6cd6a9c11
-
SHA256
29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528
-
SHA512
3c24349e5cbd8e4623670326846952e38bec08f137e8d69d66374c0686a1777a80b041f364dfc5e3c823a72d6f9eeed3da9ea4ce009c3e6874ba3de672a77a55
-
SSDEEP
12288:2Mrny90Zk4m+SmAKoCoHJDk4V1/DKCXi9az8EiPcBFi+EwI2yOu:ty1VCoHdn2kiG8EiEni+ESyZ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8219.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2764-182-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/2764-185-0x00000000027A0000-0x00000000027E4000-memory.dmp family_redline behavioral1/memory/2764-188-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-189-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-191-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-193-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-195-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-197-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-199-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-201-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-203-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-205-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-207-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-209-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-211-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-213-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-215-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-217-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-219-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline behavioral1/memory/2764-221-0x00000000027A0000-0x00000000027DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2260 un741045.exe 2536 pro8219.exe 2764 qu9763.exe 1544 si242315.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8219.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8219.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un741045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un741045.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2536 pro8219.exe 2536 pro8219.exe 2764 qu9763.exe 2764 qu9763.exe 1544 si242315.exe 1544 si242315.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2536 pro8219.exe Token: SeDebugPrivilege 2764 qu9763.exe Token: SeDebugPrivilege 1544 si242315.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2260 1444 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe 66 PID 1444 wrote to memory of 2260 1444 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe 66 PID 1444 wrote to memory of 2260 1444 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe 66 PID 2260 wrote to memory of 2536 2260 un741045.exe 67 PID 2260 wrote to memory of 2536 2260 un741045.exe 67 PID 2260 wrote to memory of 2536 2260 un741045.exe 67 PID 2260 wrote to memory of 2764 2260 un741045.exe 68 PID 2260 wrote to memory of 2764 2260 un741045.exe 68 PID 2260 wrote to memory of 2764 2260 un741045.exe 68 PID 1444 wrote to memory of 1544 1444 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe 70 PID 1444 wrote to memory of 1544 1444 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe 70 PID 1444 wrote to memory of 1544 1444 29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe"C:\Users\Admin\AppData\Local\Temp\29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741045.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8219.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8219.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9763.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9763.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242315.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242315.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ccbc3969f7f7e509bd403641a28c26fb
SHA12c0dd8f170fe87639f2ba309f68c0ecb16bf4ce8
SHA256f92025ed5915a836f7e3984ca44e13463308922d14c75e4041d3573876b9a061
SHA5120ae24719df16e84a46ad7bbc21964364740133ce7e635f4c7b1a6db030f7b1a4c00f9235a7a7d74d1ca49d701b4f178f00812feee5a9c73699b10e06e3fa9330
-
Filesize
175KB
MD5ccbc3969f7f7e509bd403641a28c26fb
SHA12c0dd8f170fe87639f2ba309f68c0ecb16bf4ce8
SHA256f92025ed5915a836f7e3984ca44e13463308922d14c75e4041d3573876b9a061
SHA5120ae24719df16e84a46ad7bbc21964364740133ce7e635f4c7b1a6db030f7b1a4c00f9235a7a7d74d1ca49d701b4f178f00812feee5a9c73699b10e06e3fa9330
-
Filesize
543KB
MD5c4c8650eaf93559e9236d2149b6e6e15
SHA1c5254e14d188d8237a5e6cdda90fab97ab797635
SHA256f3810d2ac15e1a6cdbb6cbd3377b83af3d4ff8adb89400891324ecf1168ee5ab
SHA512fe086510e0102ce67b42b65455260ecbfbe81abdb3e61dd51020712cdd0eeec0cd7d320e52614ce9a08ff47d912f9dd1294786765c92015dafd7098e1b17ac1c
-
Filesize
543KB
MD5c4c8650eaf93559e9236d2149b6e6e15
SHA1c5254e14d188d8237a5e6cdda90fab97ab797635
SHA256f3810d2ac15e1a6cdbb6cbd3377b83af3d4ff8adb89400891324ecf1168ee5ab
SHA512fe086510e0102ce67b42b65455260ecbfbe81abdb3e61dd51020712cdd0eeec0cd7d320e52614ce9a08ff47d912f9dd1294786765c92015dafd7098e1b17ac1c
-
Filesize
292KB
MD500c351e019896e3bc7c63cb8f03f32ba
SHA1c7436c4e6e90ae5d322113db7ac637fa9a44bf35
SHA256b817a4de6dcd311a52e72eadf882243834110e5a0d46e553cc0b8f4254e3a793
SHA512fef23cb1769cc36b197943caa599cddd2a373696170ca07f8286b1a74ecc18be2f0e0186e4eab57eb7c2ddb980f6282eb72eab0d51ea8cc44f457555d6f68631
-
Filesize
292KB
MD500c351e019896e3bc7c63cb8f03f32ba
SHA1c7436c4e6e90ae5d322113db7ac637fa9a44bf35
SHA256b817a4de6dcd311a52e72eadf882243834110e5a0d46e553cc0b8f4254e3a793
SHA512fef23cb1769cc36b197943caa599cddd2a373696170ca07f8286b1a74ecc18be2f0e0186e4eab57eb7c2ddb980f6282eb72eab0d51ea8cc44f457555d6f68631
-
Filesize
350KB
MD5e5cc78017e26e239cf8cc6b4a6ba36fc
SHA192b7964abae13aefe6f5fa926536b52bad2ac421
SHA256b8c0dc2abed9480d25e746b09a5e8f11e3d10f1cf8a827e1fd26d6c59be80be1
SHA51230d1e47267011651ba1b1ec57e5798d9fda1d0e4b719c582337bd7a2bcb2a09dc33396af802270db51e26c6c5f2de52633d900df9c00749e30c30ca8b847200a
-
Filesize
350KB
MD5e5cc78017e26e239cf8cc6b4a6ba36fc
SHA192b7964abae13aefe6f5fa926536b52bad2ac421
SHA256b8c0dc2abed9480d25e746b09a5e8f11e3d10f1cf8a827e1fd26d6c59be80be1
SHA51230d1e47267011651ba1b1ec57e5798d9fda1d0e4b719c582337bd7a2bcb2a09dc33396af802270db51e26c6c5f2de52633d900df9c00749e30c30ca8b847200a