Analysis
-
max time kernel
64s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:10
Static task
static1
Behavioral task
behavioral1
Sample
72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe
Resource
win10v2004-20230220-en
General
-
Target
72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe
-
Size
684KB
-
MD5
a8f0759e12e005e36ce46bd7c1dc544e
-
SHA1
367a8a6efd3779663a471bbe55291d16f76c6b40
-
SHA256
72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3
-
SHA512
1dce96ed0ddbbde317f06be27dbc620fb1e6fb47eb116b376b5f5be4bc2fc129e9cb95e442819f836183db9cc54ef1a12f822b41ba3becd5cf51cd3c2f5c2f05
-
SSDEEP
12288:fMrby90II5hSD/0qJOkpwLdvH65+1MhAB+LsEat44zRtFtW:MyjIgXGdy5mTkLsEatbNtFY
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2482.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4500-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-192-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-194-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-196-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-198-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-200-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-202-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-204-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-206-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-208-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-210-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-212-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-214-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-216-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-218-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-220-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-222-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4500-224-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3824 un784038.exe 860 pro2482.exe 4500 qu6126.exe 2636 si078832.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2482.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un784038.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un784038.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1904 860 WerFault.exe 84 4340 4500 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 860 pro2482.exe 860 pro2482.exe 4500 qu6126.exe 4500 qu6126.exe 2636 si078832.exe 2636 si078832.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 860 pro2482.exe Token: SeDebugPrivilege 4500 qu6126.exe Token: SeDebugPrivilege 2636 si078832.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3824 4692 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe 83 PID 4692 wrote to memory of 3824 4692 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe 83 PID 4692 wrote to memory of 3824 4692 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe 83 PID 3824 wrote to memory of 860 3824 un784038.exe 84 PID 3824 wrote to memory of 860 3824 un784038.exe 84 PID 3824 wrote to memory of 860 3824 un784038.exe 84 PID 3824 wrote to memory of 4500 3824 un784038.exe 90 PID 3824 wrote to memory of 4500 3824 un784038.exe 90 PID 3824 wrote to memory of 4500 3824 un784038.exe 90 PID 4692 wrote to memory of 2636 4692 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe 94 PID 4692 wrote to memory of 2636 4692 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe 94 PID 4692 wrote to memory of 2636 4692 72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe"C:\Users\Admin\AppData\Local\Temp\72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784038.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784038.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2482.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 10844⤵
- Program crash
PID:1904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6126.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6126.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 19524⤵
- Program crash
PID:4340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078832.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078832.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 860 -ip 8601⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4500 -ip 45001⤵PID:384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51edeecf2a5972e2f8661e3a286aac3bb
SHA1646d624edbda42f09af6f53be4b48ec594053bd1
SHA2564ea74285e27e6dfe2390c8f4511b8f40166ef315d47cc949afdb3fb7a95af42d
SHA51204d1d5783237bd9ead5ef47e1733426a68ab898a697f69cbee49a3ea19df1aa56f4dfb9bb913437eb56f3cdda13a4984b401354136081b04698ca1d28a87c06f
-
Filesize
175KB
MD51edeecf2a5972e2f8661e3a286aac3bb
SHA1646d624edbda42f09af6f53be4b48ec594053bd1
SHA2564ea74285e27e6dfe2390c8f4511b8f40166ef315d47cc949afdb3fb7a95af42d
SHA51204d1d5783237bd9ead5ef47e1733426a68ab898a697f69cbee49a3ea19df1aa56f4dfb9bb913437eb56f3cdda13a4984b401354136081b04698ca1d28a87c06f
-
Filesize
543KB
MD55fece2c97b745e2a66927178e44759ce
SHA18e64ef2e092bf4e94e7ae43c0efcbc124d5f09d5
SHA256d13eb3e6359bf3bd87c222b51170c3a1b5eef75e60b21462f60e5b170fbc238b
SHA512c1b31d1f3edc6e9cfb810ffe46dabe5b98cbe4be115777375e4fa7769f56e2bc81d1f039e807d4a4dc71ebf3e8631df5d4b97f685dc3cd6b28ef354911b35149
-
Filesize
543KB
MD55fece2c97b745e2a66927178e44759ce
SHA18e64ef2e092bf4e94e7ae43c0efcbc124d5f09d5
SHA256d13eb3e6359bf3bd87c222b51170c3a1b5eef75e60b21462f60e5b170fbc238b
SHA512c1b31d1f3edc6e9cfb810ffe46dabe5b98cbe4be115777375e4fa7769f56e2bc81d1f039e807d4a4dc71ebf3e8631df5d4b97f685dc3cd6b28ef354911b35149
-
Filesize
292KB
MD53fe420846125ba4306a98f9f936caed8
SHA1248e91007d89a4ea95dd7b08ed9aafba72736a59
SHA2564bd3013c9fe2c7be8c4ce5adb45376f723772eb473e5b4580b6fb3d03ef882b9
SHA512cfa756e4a8c9dca6cebe33ac5fb9d884d9be9a9bc16b2c0ce02f39b4182d4f7385fbc78c2efca7df74c0c5cae969f0d45571ec49d5daaf1c286d135c00d1a965
-
Filesize
292KB
MD53fe420846125ba4306a98f9f936caed8
SHA1248e91007d89a4ea95dd7b08ed9aafba72736a59
SHA2564bd3013c9fe2c7be8c4ce5adb45376f723772eb473e5b4580b6fb3d03ef882b9
SHA512cfa756e4a8c9dca6cebe33ac5fb9d884d9be9a9bc16b2c0ce02f39b4182d4f7385fbc78c2efca7df74c0c5cae969f0d45571ec49d5daaf1c286d135c00d1a965
-
Filesize
350KB
MD5c5b367757a79b285169a4748fd0832c7
SHA1c13068d7fde1c9415abf72808594802a717d8153
SHA25656240f806bd9a922ac41b0e19e1848dd6e751f0c60550378b507f9f9103d220d
SHA51237d952296e71143c0495642877be3c3859b7ccee17214ab9d5138eb84b8a578c683e5bd137818cbc6e4bbac79b37d99024760a8ab3d538b8c0b582f27e504e80
-
Filesize
350KB
MD5c5b367757a79b285169a4748fd0832c7
SHA1c13068d7fde1c9415abf72808594802a717d8153
SHA25656240f806bd9a922ac41b0e19e1848dd6e751f0c60550378b507f9f9103d220d
SHA51237d952296e71143c0495642877be3c3859b7ccee17214ab9d5138eb84b8a578c683e5bd137818cbc6e4bbac79b37d99024760a8ab3d538b8c0b582f27e504e80