Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:03
Static task
static1
Behavioral task
behavioral1
Sample
927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe
Resource
win10v2004-20230220-en
General
-
Target
927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe
-
Size
684KB
-
MD5
9dd90116271bde599502a48e3627c14b
-
SHA1
89cd79b0c85d43094e1993ee8684de81449eecde
-
SHA256
927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea
-
SHA512
a3f1049d81b4eccaba336ce8304bc5e6c7fa5f94960d169d8ad6e066f12cdec95e2f9db2bfd35e646224dca40e61f2259449fbacd90b0befb149125a10838140
-
SSDEEP
12288:hMrny90g2Tr+HuQOH/wih8QniJ9kvfLdv+4GYooVcBpVSEvY44zuUlwI6:iyD2eOj/QlidW4GxhzVSEvYbLD6
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2749.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2749.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2684-189-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-188-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-193-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-195-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-197-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-215-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-217-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-219-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/2684-1110-0x0000000004E90000-0x0000000004EA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1652 un106365.exe 2908 pro2749.exe 2684 qu6372.exe 1580 si764004.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2749.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un106365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un106365.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4736 2908 WerFault.exe 84 1172 2684 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2908 pro2749.exe 2908 pro2749.exe 2684 qu6372.exe 2684 qu6372.exe 1580 si764004.exe 1580 si764004.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2908 pro2749.exe Token: SeDebugPrivilege 2684 qu6372.exe Token: SeDebugPrivilege 1580 si764004.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1652 2544 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe 83 PID 2544 wrote to memory of 1652 2544 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe 83 PID 2544 wrote to memory of 1652 2544 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe 83 PID 1652 wrote to memory of 2908 1652 un106365.exe 84 PID 1652 wrote to memory of 2908 1652 un106365.exe 84 PID 1652 wrote to memory of 2908 1652 un106365.exe 84 PID 1652 wrote to memory of 2684 1652 un106365.exe 87 PID 1652 wrote to memory of 2684 1652 un106365.exe 87 PID 1652 wrote to memory of 2684 1652 un106365.exe 87 PID 2544 wrote to memory of 1580 2544 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe 91 PID 2544 wrote to memory of 1580 2544 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe 91 PID 2544 wrote to memory of 1580 2544 927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe"C:\Users\Admin\AppData\Local\Temp\927bdc830b2887ad9a7bbfd9c4fb86d154f4b5564a115732ff50a3bc16e6bbea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un106365.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un106365.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2749.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 10924⤵
- Program crash
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6372.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6372.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 14564⤵
- Program crash
PID:1172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764004.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2908 -ip 29081⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2684 -ip 26841⤵PID:504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50fc9c69f3f6d2f0c6cffe0a8cf7de26d
SHA187d19639fab716e6ee9aedc7ce3dbc4fb27b7bdf
SHA2569af0c7ae272e30f0931c06b9dbf2a8ba3cfaf2dd1142e298d6917407c88b44b0
SHA5123150b43f886da93e1a5767979102c76826d35ede73ede1f05e6c2c9706ad67f0f0f8852eefa47bff14bec38d431d1a61b90007bf8096d5653c10ae4d9e5456b3
-
Filesize
175KB
MD50fc9c69f3f6d2f0c6cffe0a8cf7de26d
SHA187d19639fab716e6ee9aedc7ce3dbc4fb27b7bdf
SHA2569af0c7ae272e30f0931c06b9dbf2a8ba3cfaf2dd1142e298d6917407c88b44b0
SHA5123150b43f886da93e1a5767979102c76826d35ede73ede1f05e6c2c9706ad67f0f0f8852eefa47bff14bec38d431d1a61b90007bf8096d5653c10ae4d9e5456b3
-
Filesize
543KB
MD533f472bef0c052d3c7770858a9a5be28
SHA1cad783a6e452befecd178f20fdd465f74784d5a6
SHA2568c034e1ca019abce44fb59e2d39951fee58c67b9f6c0cfb64086a89b852ea43a
SHA5127ca94d35b70cca74a2ca574854971a66b2d0f59dad2d82221de16d354d0186d90c19a13f8f4ae0b748a33800110c86d507a2c9c62c1e1d74f2ef48bd86f36798
-
Filesize
543KB
MD533f472bef0c052d3c7770858a9a5be28
SHA1cad783a6e452befecd178f20fdd465f74784d5a6
SHA2568c034e1ca019abce44fb59e2d39951fee58c67b9f6c0cfb64086a89b852ea43a
SHA5127ca94d35b70cca74a2ca574854971a66b2d0f59dad2d82221de16d354d0186d90c19a13f8f4ae0b748a33800110c86d507a2c9c62c1e1d74f2ef48bd86f36798
-
Filesize
292KB
MD5f2935b2bbfab7b98f13ad7ab7748c480
SHA19364d25962bc65f8562a1b47709162fd0457647b
SHA2562fe2f8f393183f3a4ace744a7213b0f9ea90db64ab55a08dc34a517dcc80c424
SHA512666ebdb6a58255e169c20dda9243a82d305e55c7584c09846ddc58a6ddd79af7379b08c119f1b03e49927e3e6d8caad4d5c0da0feee3e39fb4ba95324b79b229
-
Filesize
292KB
MD5f2935b2bbfab7b98f13ad7ab7748c480
SHA19364d25962bc65f8562a1b47709162fd0457647b
SHA2562fe2f8f393183f3a4ace744a7213b0f9ea90db64ab55a08dc34a517dcc80c424
SHA512666ebdb6a58255e169c20dda9243a82d305e55c7584c09846ddc58a6ddd79af7379b08c119f1b03e49927e3e6d8caad4d5c0da0feee3e39fb4ba95324b79b229
-
Filesize
350KB
MD52da7aec26a08962f7b2a2978e602b7a9
SHA147103ff23b8c58cad30e705e291024ef24d58370
SHA256d2bee435ec1e2f9b8744c7c8b4f8323cca2f225284d1d37c1da733cc8f8fb185
SHA512d77f7933b523d06414e97d775b5290c45dfab786ee748ec3b4b05decfc0d7d04f973b33eb2c360f443d6e8912d7b7aeb50ba2c62c6b0de4707ee5d0e3ae59e0d
-
Filesize
350KB
MD52da7aec26a08962f7b2a2978e602b7a9
SHA147103ff23b8c58cad30e705e291024ef24d58370
SHA256d2bee435ec1e2f9b8744c7c8b4f8323cca2f225284d1d37c1da733cc8f8fb185
SHA512d77f7933b523d06414e97d775b5290c45dfab786ee748ec3b4b05decfc0d7d04f973b33eb2c360f443d6e8912d7b7aeb50ba2c62c6b0de4707ee5d0e3ae59e0d