Analysis
-
max time kernel
101s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:05
Static task
static1
Behavioral task
behavioral1
Sample
71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe
Resource
win10v2004-20230220-en
General
-
Target
71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe
-
Size
685KB
-
MD5
dc73bd8c870cd3e750a5944cb5b661a4
-
SHA1
5cbd29c98c48b19f63dd11a7820adb16515feea0
-
SHA256
71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf
-
SHA512
44bdd4826b692944dea89880ab33a79747dd2c284630315fc6af1bb4a1174777da1fb9c65a13ccc821a5a7720c0fda4ba65fb8dc160c45b4470d083339e51ed1
-
SSDEEP
12288:IMriy901VVwPEep6IPkJUkpVh2T/Q81SSgkMJuBoQPEF1E9PIp5gY:qyOVhep6ikrr0Q8/Mo6QPEF1uPIrt
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9369.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9369.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1432-192-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-191-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-194-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-196-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-198-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-200-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-202-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-204-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-206-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-208-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-210-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-212-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-214-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-216-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-218-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-220-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-222-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-224-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1432-414-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline behavioral1/memory/1432-411-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3080 un683165.exe 4524 pro9369.exe 1432 qu2253.exe 960 si863443.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9369.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9369.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un683165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un683165.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3908 4524 WerFault.exe 85 1428 1432 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4524 pro9369.exe 4524 pro9369.exe 1432 qu2253.exe 1432 qu2253.exe 960 si863443.exe 960 si863443.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4524 pro9369.exe Token: SeDebugPrivilege 1432 qu2253.exe Token: SeDebugPrivilege 960 si863443.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3080 1868 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe 84 PID 1868 wrote to memory of 3080 1868 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe 84 PID 1868 wrote to memory of 3080 1868 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe 84 PID 3080 wrote to memory of 4524 3080 un683165.exe 85 PID 3080 wrote to memory of 4524 3080 un683165.exe 85 PID 3080 wrote to memory of 4524 3080 un683165.exe 85 PID 3080 wrote to memory of 1432 3080 un683165.exe 91 PID 3080 wrote to memory of 1432 3080 un683165.exe 91 PID 3080 wrote to memory of 1432 3080 un683165.exe 91 PID 1868 wrote to memory of 960 1868 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe 95 PID 1868 wrote to memory of 960 1868 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe 95 PID 1868 wrote to memory of 960 1868 71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe"C:\Users\Admin\AppData\Local\Temp\71b8c912eb7e069fc1246b652f4d10646731689529e1366500bc459c3f77ffaf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un683165.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9369.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 10844⤵
- Program crash
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2253.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 15524⤵
- Program crash
PID:1428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863443.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4524 -ip 45241⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1432 -ip 14321⤵PID:5012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bee0ae4b7f895cdfee1c215b1080808a
SHA1b1457e9588c1df65a193bb677482cf052a0700b0
SHA256c737367456a991f98b0854f994d2508993de7b9969f7d180379611c2ea4c6a23
SHA5127acfd11f72d78318f9ff33569a2a60cf74696194a1d477cb60b852f29d1219a75e6f7506a3b37ef141a68d556c1514de6cf90875e3f7448361465112f71d7c8e
-
Filesize
175KB
MD5bee0ae4b7f895cdfee1c215b1080808a
SHA1b1457e9588c1df65a193bb677482cf052a0700b0
SHA256c737367456a991f98b0854f994d2508993de7b9969f7d180379611c2ea4c6a23
SHA5127acfd11f72d78318f9ff33569a2a60cf74696194a1d477cb60b852f29d1219a75e6f7506a3b37ef141a68d556c1514de6cf90875e3f7448361465112f71d7c8e
-
Filesize
543KB
MD5354ec81ca5649e7aacb82ef7122a4d9f
SHA12587b5df3050d0d4775a157cf89cfcf44afe95a6
SHA2568f4396b2b6e6197af08e79aa96edb27fae7d98d68f16955f151d0a4c4097cd6a
SHA5124948b838174dadeeb91a8e5c160326739e8c54ed38a3ecdb642c4363931adcde492a918ae94d62cd66befd868fdc41e4494807e821862f775d76457e712ca13c
-
Filesize
543KB
MD5354ec81ca5649e7aacb82ef7122a4d9f
SHA12587b5df3050d0d4775a157cf89cfcf44afe95a6
SHA2568f4396b2b6e6197af08e79aa96edb27fae7d98d68f16955f151d0a4c4097cd6a
SHA5124948b838174dadeeb91a8e5c160326739e8c54ed38a3ecdb642c4363931adcde492a918ae94d62cd66befd868fdc41e4494807e821862f775d76457e712ca13c
-
Filesize
292KB
MD5b4cfe26792b08f5fa934e718e01b06aa
SHA14c712889e400d33cb991d60bc1139b0506599117
SHA2561d65c903d659b985cf7ff709d606036d9982b88c0440ce136fd1d2b7563567ee
SHA5129dc962ff076e32179c0c179b7e26cbff68ba32780aed9936a7d902b5e1b9667b77e862b4ccae4c7c899466df90868bc40091035f892629dd5869afa109f860ad
-
Filesize
292KB
MD5b4cfe26792b08f5fa934e718e01b06aa
SHA14c712889e400d33cb991d60bc1139b0506599117
SHA2561d65c903d659b985cf7ff709d606036d9982b88c0440ce136fd1d2b7563567ee
SHA5129dc962ff076e32179c0c179b7e26cbff68ba32780aed9936a7d902b5e1b9667b77e862b4ccae4c7c899466df90868bc40091035f892629dd5869afa109f860ad
-
Filesize
350KB
MD56a4593ebd3c0e21b3d3a8605836bd3fb
SHA1c464594a0a5872627ea51455ef1bf23ccbe7e67f
SHA2568d6c70678fb1097e3f401b98d0fb2a33552a97de56fc41591f034e360c7e9fb7
SHA5127d2828fc218378f82ce4ff241aa01756bed849307c6a67f03216165e6887d62f94594f8026192c6c765fb300ccfe13bbe97390d1033bf37f946d18d951ae8492
-
Filesize
350KB
MD56a4593ebd3c0e21b3d3a8605836bd3fb
SHA1c464594a0a5872627ea51455ef1bf23ccbe7e67f
SHA2568d6c70678fb1097e3f401b98d0fb2a33552a97de56fc41591f034e360c7e9fb7
SHA5127d2828fc218378f82ce4ff241aa01756bed849307c6a67f03216165e6887d62f94594f8026192c6c765fb300ccfe13bbe97390d1033bf37f946d18d951ae8492