Analysis
-
max time kernel
87s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:07
Static task
static1
Behavioral task
behavioral1
Sample
bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe
Resource
win10v2004-20230220-en
General
-
Target
bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe
-
Size
685KB
-
MD5
da80dbf23bf1d5cba25240647b79a21c
-
SHA1
a1a14fc307f1450415c3e3e9f32e0eda823ca1ac
-
SHA256
bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9
-
SHA512
e2b5ada1375d32976bc6721576aab9452e9d683d2f79ecc254dd4e05a311690b0892ad3c72fbe74a56818600aee4283e53af7980fbe5d1eef4b517230184c5e2
-
SSDEEP
12288:nMray90PPdYnELnYCIfZ3/lZmojiryJvmZArk7BxsHE7xla23bL:dyOPKnELYCIxPLmojgyxmirU/sHE9lTf
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2826.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2826.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2826.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4952-190-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-189-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-192-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-194-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-196-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-198-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-200-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-202-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-204-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-206-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-208-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-210-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-212-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-214-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-216-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-218-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-220-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-222-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4952-1107-0x0000000002AD0000-0x0000000002AE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3724 un280574.exe 376 pro2826.exe 4952 qu8290.exe 5076 si559128.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2826.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2826.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un280574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un280574.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4464 376 WerFault.exe 84 5072 4952 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 376 pro2826.exe 376 pro2826.exe 4952 qu8290.exe 4952 qu8290.exe 5076 si559128.exe 5076 si559128.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 376 pro2826.exe Token: SeDebugPrivilege 4952 qu8290.exe Token: SeDebugPrivilege 5076 si559128.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3744 wrote to memory of 3724 3744 bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe 83 PID 3744 wrote to memory of 3724 3744 bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe 83 PID 3744 wrote to memory of 3724 3744 bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe 83 PID 3724 wrote to memory of 376 3724 un280574.exe 84 PID 3724 wrote to memory of 376 3724 un280574.exe 84 PID 3724 wrote to memory of 376 3724 un280574.exe 84 PID 3724 wrote to memory of 4952 3724 un280574.exe 92 PID 3724 wrote to memory of 4952 3724 un280574.exe 92 PID 3724 wrote to memory of 4952 3724 un280574.exe 92 PID 3744 wrote to memory of 5076 3744 bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe 96 PID 3744 wrote to memory of 5076 3744 bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe 96 PID 3744 wrote to memory of 5076 3744 bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe"C:\Users\Admin\AppData\Local\Temp\bfbb0cabc3799accc3410629170a36a11690f6606850f1b072195d039de56cf9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2826.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 10804⤵
- Program crash
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8290.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 20124⤵
- Program crash
PID:5072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si559128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si559128.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 376 -ip 3761⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4952 -ip 49521⤵PID:1032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5991901fe2efec51493da2a11aadaa553
SHA1dbc2c4b0c3f0dfe16a098b891acc11132c4b6b90
SHA256fbf56475ec3b82b6e9cd24f124066aee37e990d458096ea1c8590fcc45b6f0a5
SHA5124e0c08044f101c58acb7baa0b1a8712364d769d19afbf43c086d1961d983e8eebde4116b1487e92d585d30583694fe803993e75036982cce5a06c9c6bb82503e
-
Filesize
175KB
MD5991901fe2efec51493da2a11aadaa553
SHA1dbc2c4b0c3f0dfe16a098b891acc11132c4b6b90
SHA256fbf56475ec3b82b6e9cd24f124066aee37e990d458096ea1c8590fcc45b6f0a5
SHA5124e0c08044f101c58acb7baa0b1a8712364d769d19afbf43c086d1961d983e8eebde4116b1487e92d585d30583694fe803993e75036982cce5a06c9c6bb82503e
-
Filesize
543KB
MD56ac7b1fed07f8a7a47df09cf19d36a97
SHA14b4b5a9daab6d7b8193f6b40793e24f9c4c47ce7
SHA256820ff0760ca3cc60f58a4557c2946727faf68d5de18a0ca501b2a2f6693fd8a2
SHA512c12d5a2c19acca912c353413710df34afbbe1d82fee45f10935c7c10737edb9d05d18a9e59fd9267c5508819e363bf8e7a9bb0fe12a6c0d08b5e5485a4e0cf88
-
Filesize
543KB
MD56ac7b1fed07f8a7a47df09cf19d36a97
SHA14b4b5a9daab6d7b8193f6b40793e24f9c4c47ce7
SHA256820ff0760ca3cc60f58a4557c2946727faf68d5de18a0ca501b2a2f6693fd8a2
SHA512c12d5a2c19acca912c353413710df34afbbe1d82fee45f10935c7c10737edb9d05d18a9e59fd9267c5508819e363bf8e7a9bb0fe12a6c0d08b5e5485a4e0cf88
-
Filesize
292KB
MD51df86d713e01d2c8ad7e904e9cf7cd88
SHA11d5cd3bb1dedd473a4651d37420c04c57ecab260
SHA256589410f5d08559037c34563a020ec46c3f3589ef56ef9bcab6512ba4e63e9122
SHA5128501afb63122590db50f44e3a57bed49d750e2e7004a56866a5e8b3c2572fa9fc20764aa691ae358722ad810330cc7a807f5e19701023a999e40dc28383d716c
-
Filesize
292KB
MD51df86d713e01d2c8ad7e904e9cf7cd88
SHA11d5cd3bb1dedd473a4651d37420c04c57ecab260
SHA256589410f5d08559037c34563a020ec46c3f3589ef56ef9bcab6512ba4e63e9122
SHA5128501afb63122590db50f44e3a57bed49d750e2e7004a56866a5e8b3c2572fa9fc20764aa691ae358722ad810330cc7a807f5e19701023a999e40dc28383d716c
-
Filesize
350KB
MD5cf132db5dfbd9f3b628ee8521628bcbd
SHA1d03a568dea5b5cad325f6ffdc3bddd92711c4e30
SHA2560d479112cd1a9d48acd04db83b7c3ddf2a4a761f2ee47d027890924644fd630a
SHA5126a66d1c1164ed88426078e42555bd17b227e8021b9e281d0b40d14f20f3c0c7f432fe68b0d811e0b1a7c17a626b27c889bbdedcfe38a91dd248f5c229d2ce1e7
-
Filesize
350KB
MD5cf132db5dfbd9f3b628ee8521628bcbd
SHA1d03a568dea5b5cad325f6ffdc3bddd92711c4e30
SHA2560d479112cd1a9d48acd04db83b7c3ddf2a4a761f2ee47d027890924644fd630a
SHA5126a66d1c1164ed88426078e42555bd17b227e8021b9e281d0b40d14f20f3c0c7f432fe68b0d811e0b1a7c17a626b27c889bbdedcfe38a91dd248f5c229d2ce1e7