Analysis
-
max time kernel
50s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:13
Static task
static1
Behavioral task
behavioral1
Sample
b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe
Resource
win10-20230220-en
General
-
Target
b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe
-
Size
685KB
-
MD5
7e2b34aadb9fd130f3f8a7ba7baf5156
-
SHA1
6e951d942dd81108c2899b5d2ca81df5b6b33487
-
SHA256
b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2
-
SHA512
9d66c1b02d3ce56f0f587c62f734d80bad1b5a3d122b766a90a1dbc7b714b29c8c938cd34f0c9cf5892c4666beb9cb05a1f5dfb75492c5e66750bc243edf2202
-
SSDEEP
12288:hMr6y90GPZ7+MKWyHRCkHsflpvCXrHdIcz1bdJk8U7BNQhEzrdxRUHwUit:jyZ7+MW7HsflYXrHGG1pJktDQhEzX/9t
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7961.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4876-178-0x00000000023B0000-0x00000000023F6000-memory.dmp family_redline behavioral1/memory/4876-179-0x0000000002930000-0x0000000002974000-memory.dmp family_redline behavioral1/memory/4876-180-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-181-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-183-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-185-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-187-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-189-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-191-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-193-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-195-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-197-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-199-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-201-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-203-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-205-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-207-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-209-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-213-0x0000000002930000-0x000000000296E000-memory.dmp family_redline behavioral1/memory/4876-211-0x0000000002930000-0x000000000296E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4268 un202531.exe 2396 pro7961.exe 4876 qu4815.exe 4272 si247051.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7961.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7961.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un202531.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un202531.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2396 pro7961.exe 2396 pro7961.exe 4876 qu4815.exe 4876 qu4815.exe 4272 si247051.exe 4272 si247051.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2396 pro7961.exe Token: SeDebugPrivilege 4876 qu4815.exe Token: SeDebugPrivilege 4272 si247051.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 400 wrote to memory of 4268 400 b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe 66 PID 400 wrote to memory of 4268 400 b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe 66 PID 400 wrote to memory of 4268 400 b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe 66 PID 4268 wrote to memory of 2396 4268 un202531.exe 67 PID 4268 wrote to memory of 2396 4268 un202531.exe 67 PID 4268 wrote to memory of 2396 4268 un202531.exe 67 PID 4268 wrote to memory of 4876 4268 un202531.exe 68 PID 4268 wrote to memory of 4876 4268 un202531.exe 68 PID 4268 wrote to memory of 4876 4268 un202531.exe 68 PID 400 wrote to memory of 4272 400 b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe 70 PID 400 wrote to memory of 4272 400 b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe 70 PID 400 wrote to memory of 4272 400 b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe"C:\Users\Admin\AppData\Local\Temp\b1e853811e9b4dd2ae3d19346b9d7ffbdd7d96fa531a231f6942e24480fb1eb2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un202531.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un202531.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7961.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7961.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4815.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247051.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52f3c577e2064c8cf015fd297c9549805
SHA1c862f01f616aef2d0be1dab14b378b144710f15c
SHA256ec8fe623530b129a94ddd4c8eadc1480ea63a274434b49b7cc5479ca3cf8af67
SHA5126256875474b06a9592a7d6bd463ce04501becda5a776a7a81c4b6afd95ecb80f84467d6c36a4c83fd2a7b4d2c9a24fee4e89bb1356d49cef9025fc68edcae896
-
Filesize
175KB
MD52f3c577e2064c8cf015fd297c9549805
SHA1c862f01f616aef2d0be1dab14b378b144710f15c
SHA256ec8fe623530b129a94ddd4c8eadc1480ea63a274434b49b7cc5479ca3cf8af67
SHA5126256875474b06a9592a7d6bd463ce04501becda5a776a7a81c4b6afd95ecb80f84467d6c36a4c83fd2a7b4d2c9a24fee4e89bb1356d49cef9025fc68edcae896
-
Filesize
543KB
MD5e580f4896df0a3f5cc84dcab955164c1
SHA1e1567b1a6787af6ae91679bbb2ffe74dc9714fba
SHA256487a88a800d919e7f5ab37610cc4dafa1a9ae4a3846b3bf985d0714865ccdc06
SHA512cfebf1e263054b1b2962550843bc5cb3b5e3f7618252543b08be52985c805834f389104ebe00bada99a0a939b06c742ab8ee457d36a47d60dfdc45dd0297051d
-
Filesize
543KB
MD5e580f4896df0a3f5cc84dcab955164c1
SHA1e1567b1a6787af6ae91679bbb2ffe74dc9714fba
SHA256487a88a800d919e7f5ab37610cc4dafa1a9ae4a3846b3bf985d0714865ccdc06
SHA512cfebf1e263054b1b2962550843bc5cb3b5e3f7618252543b08be52985c805834f389104ebe00bada99a0a939b06c742ab8ee457d36a47d60dfdc45dd0297051d
-
Filesize
292KB
MD55381aea605144f11376e2a670aa1fe68
SHA1135f6d4e46701dc425086f0c188f28e246214678
SHA25644ad3f22651840453180cc605dc7e51556309da2e4abb754022b8bd83b9dbc87
SHA512d1d73e95b0ef396f7927351e38fd059831eba70123e0420298ebbc4225adf49021a575b78b204fcb87f3dd55f8426ae7b9f9b5b849ad5b2290db9babe23998aa
-
Filesize
292KB
MD55381aea605144f11376e2a670aa1fe68
SHA1135f6d4e46701dc425086f0c188f28e246214678
SHA25644ad3f22651840453180cc605dc7e51556309da2e4abb754022b8bd83b9dbc87
SHA512d1d73e95b0ef396f7927351e38fd059831eba70123e0420298ebbc4225adf49021a575b78b204fcb87f3dd55f8426ae7b9f9b5b849ad5b2290db9babe23998aa
-
Filesize
350KB
MD5a0f1ed83998b8b34813fbe55ee55b47f
SHA19023b633299fa5493e7b178542b15e74766fadc7
SHA25636797c00280f77d26154f07d9e2433a9a38d630864180cd234f11a4bbfd91703
SHA5125e45e8aed4a430fef5484a290b2045922f134e246843be1634523942bc96ce928a017b54a4a7f71539e0aafae1ec760df3508ca7fe5ba971d37540229c991bc7
-
Filesize
350KB
MD5a0f1ed83998b8b34813fbe55ee55b47f
SHA19023b633299fa5493e7b178542b15e74766fadc7
SHA25636797c00280f77d26154f07d9e2433a9a38d630864180cd234f11a4bbfd91703
SHA5125e45e8aed4a430fef5484a290b2045922f134e246843be1634523942bc96ce928a017b54a4a7f71539e0aafae1ec760df3508ca7fe5ba971d37540229c991bc7