Analysis
-
max time kernel
98s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:11
Static task
static1
Behavioral task
behavioral1
Sample
42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe
Resource
win10v2004-20230220-en
General
-
Target
42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe
-
Size
685KB
-
MD5
829244a07bf8e95ec1ad56e02f6af583
-
SHA1
450b1764ed74fb1228f8c0e2875070ead8d55bf5
-
SHA256
42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108
-
SHA512
cfc41b9a301624e32bd6f0ff456c46a501763c1cd9f94c013074f366cdd7f724c90be1e2385b198d3b2490775a98a749ae3fb8a4fd28e6528a589b4a17c2230b
-
SSDEEP
12288:FMrIy90yIq3LPmlPzJRkXuS391adL3vBn78hKWwBIM5EYLI2ENN:Nyv3albOuMQ3J426M5ECEn
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7222.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1456-188-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-189-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-191-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-193-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-195-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-197-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-199-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-201-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-203-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-205-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-211-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-207-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-214-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline behavioral1/memory/1456-217-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-215-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-219-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-221-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-223-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-225-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1456-1108-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1064 un145151.exe 2724 pro7222.exe 1456 qu8442.exe 4940 si507048.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7222.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un145151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un145151.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4828 2724 WerFault.exe 85 4900 1456 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2724 pro7222.exe 2724 pro7222.exe 1456 qu8442.exe 1456 qu8442.exe 4940 si507048.exe 4940 si507048.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2724 pro7222.exe Token: SeDebugPrivilege 1456 qu8442.exe Token: SeDebugPrivilege 4940 si507048.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2788 wrote to memory of 1064 2788 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe 84 PID 2788 wrote to memory of 1064 2788 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe 84 PID 2788 wrote to memory of 1064 2788 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe 84 PID 1064 wrote to memory of 2724 1064 un145151.exe 85 PID 1064 wrote to memory of 2724 1064 un145151.exe 85 PID 1064 wrote to memory of 2724 1064 un145151.exe 85 PID 1064 wrote to memory of 1456 1064 un145151.exe 89 PID 1064 wrote to memory of 1456 1064 un145151.exe 89 PID 1064 wrote to memory of 1456 1064 un145151.exe 89 PID 2788 wrote to memory of 4940 2788 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe 94 PID 2788 wrote to memory of 4940 2788 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe 94 PID 2788 wrote to memory of 4940 2788 42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe"C:\Users\Admin\AppData\Local\Temp\42088bf15756ae47ffa07aed7e6e45211eed99afb88863d376c409114e5be108.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un145151.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un145151.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7222.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 10844⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8442.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 9764⤵
- Program crash
PID:4900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si507048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si507048.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2724 -ip 27241⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1456 -ip 14561⤵PID:4152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD581944bb2a9ca466b8c29fed14598efb8
SHA1f2daab0c8a798c25fde2580faa23dcc852332109
SHA2564a40a21fb6559c953aea2ea1d670122f796d47fe2a6badbe6ef7c14c29ebde13
SHA5128f617d9b22b447efdb6bae6806d7b3172678f47e4e0b878f95298b9dec6a10ef7ee7888fb190253b76b190ea451a1f64204d0ccf3c0cbcc0a72c5569f9663a77
-
Filesize
175KB
MD581944bb2a9ca466b8c29fed14598efb8
SHA1f2daab0c8a798c25fde2580faa23dcc852332109
SHA2564a40a21fb6559c953aea2ea1d670122f796d47fe2a6badbe6ef7c14c29ebde13
SHA5128f617d9b22b447efdb6bae6806d7b3172678f47e4e0b878f95298b9dec6a10ef7ee7888fb190253b76b190ea451a1f64204d0ccf3c0cbcc0a72c5569f9663a77
-
Filesize
543KB
MD5935975534f884e89c4c1d6d566a6d6ae
SHA1d764df02eb5ff7cbcc4568817bfbce294fbd22c2
SHA256baea3ed5a392326d65835eb546c43933c1a6b96e8e638eb3742e48c4b2f268ca
SHA5128e76784bbf701ffbfabc5fb7bc7a36308140afad8c9b0027af83e0a158db5f42843e8ed12a72c64d9b10f5d8a62877abb361ac85c036c248864cfcabd7e8cda7
-
Filesize
543KB
MD5935975534f884e89c4c1d6d566a6d6ae
SHA1d764df02eb5ff7cbcc4568817bfbce294fbd22c2
SHA256baea3ed5a392326d65835eb546c43933c1a6b96e8e638eb3742e48c4b2f268ca
SHA5128e76784bbf701ffbfabc5fb7bc7a36308140afad8c9b0027af83e0a158db5f42843e8ed12a72c64d9b10f5d8a62877abb361ac85c036c248864cfcabd7e8cda7
-
Filesize
292KB
MD5bef2ec89675e727388d6ce1bb0064e4a
SHA19ca5cbf3b83fed6fca89ee37b21ad4866188d924
SHA2563f478422f6e752e50f23f1d7d45c275a32bdaeec336bddd280bf4c465f1618f3
SHA512c7c8a3eba22c322a213ebf3ef0131a488363b4ce7ba817d0918205505dc9a5d09c63c7ad955197c8e0afd31f20f7a57ccc2b5e2b5ad22c858dbccb789b281289
-
Filesize
292KB
MD5bef2ec89675e727388d6ce1bb0064e4a
SHA19ca5cbf3b83fed6fca89ee37b21ad4866188d924
SHA2563f478422f6e752e50f23f1d7d45c275a32bdaeec336bddd280bf4c465f1618f3
SHA512c7c8a3eba22c322a213ebf3ef0131a488363b4ce7ba817d0918205505dc9a5d09c63c7ad955197c8e0afd31f20f7a57ccc2b5e2b5ad22c858dbccb789b281289
-
Filesize
350KB
MD5659916490f037c88a02b2de01c4731a7
SHA10cbda35447e9e61942ead8125b87bc10bdeedd3e
SHA256fc78f9410df00769c99d771b8ddb6b37af79fde9153158a5853327fca6c63d0f
SHA5124df17afe4d2fe8f04e4ee97c16fea042f5d3603182db3de6e3d753db5a549bbc1dec58c577972ff631229cbb4417fcf38f0b4e3f067d36ddc1b40c31573fc70e
-
Filesize
350KB
MD5659916490f037c88a02b2de01c4731a7
SHA10cbda35447e9e61942ead8125b87bc10bdeedd3e
SHA256fc78f9410df00769c99d771b8ddb6b37af79fde9153158a5853327fca6c63d0f
SHA5124df17afe4d2fe8f04e4ee97c16fea042f5d3603182db3de6e3d753db5a549bbc1dec58c577972ff631229cbb4417fcf38f0b4e3f067d36ddc1b40c31573fc70e