Analysis
-
max time kernel
54s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:17
Static task
static1
Behavioral task
behavioral1
Sample
8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe
Resource
win10-20230220-en
General
-
Target
8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe
-
Size
685KB
-
MD5
ad15acdf392a4201debebbc63ffe61e7
-
SHA1
6528da395b830aa2a2d7ebccea63b2c5d20e7497
-
SHA256
8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1
-
SHA512
83d6bf918dec111dc9bc9fe493f376a2c48692e461d6066462f1560c73354470e2572e75c7fb364da73a28810dba3d042dc114f974cd657971a63367c224a21a
-
SSDEEP
12288:7MrZy90E/ON35FWiztJOkAYD/W5pN172KBT/WEi7LGWBJd0:Oym35k89W77vd/WEuGWXd0
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4649.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4556-181-0x00000000026B0000-0x00000000026F6000-memory.dmp family_redline behavioral1/memory/4556-182-0x0000000004C80000-0x0000000004CC4000-memory.dmp family_redline behavioral1/memory/4556-183-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-184-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-186-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-188-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-190-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-192-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-194-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-196-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-198-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-200-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-202-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-204-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-206-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-208-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-210-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-212-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-214-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-216-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4556-1102-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline behavioral1/memory/4556-1104-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1592 un780062.exe 1972 pro4649.exe 4556 qu0542.exe 3680 si045073.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4649.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un780062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un780062.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1972 pro4649.exe 1972 pro4649.exe 4556 qu0542.exe 4556 qu0542.exe 3680 si045073.exe 3680 si045073.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1972 pro4649.exe Token: SeDebugPrivilege 4556 qu0542.exe Token: SeDebugPrivilege 3680 si045073.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1592 1436 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe 66 PID 1436 wrote to memory of 1592 1436 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe 66 PID 1436 wrote to memory of 1592 1436 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe 66 PID 1592 wrote to memory of 1972 1592 un780062.exe 67 PID 1592 wrote to memory of 1972 1592 un780062.exe 67 PID 1592 wrote to memory of 1972 1592 un780062.exe 67 PID 1592 wrote to memory of 4556 1592 un780062.exe 68 PID 1592 wrote to memory of 4556 1592 un780062.exe 68 PID 1592 wrote to memory of 4556 1592 un780062.exe 68 PID 1436 wrote to memory of 3680 1436 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe 70 PID 1436 wrote to memory of 3680 1436 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe 70 PID 1436 wrote to memory of 3680 1436 8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe"C:\Users\Admin\AppData\Local\Temp\8bbe1a2d422737d3221a92d79d2ee2491fc1cd23a70a45bbf5b3df1cf4a8f9a1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un780062.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un780062.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4649.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0542.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si045073.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si045073.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57f76b727432f30debe45d7ce6cd23764
SHA16373548e941294da52ff1a6521b0830fa2d8436d
SHA256c19f1f1b5949ef86306d9fda49e4f863dd969a667db72a904633d756fcd84e7e
SHA5129cdec82580ed96bd846901cb4bd4e7a876bb9b0fc5db194a3497e5f3f341c0949d4f9b909fd8d400674f52bb13a256fe66289e8b1b127f537002ea8e63cff7f9
-
Filesize
175KB
MD57f76b727432f30debe45d7ce6cd23764
SHA16373548e941294da52ff1a6521b0830fa2d8436d
SHA256c19f1f1b5949ef86306d9fda49e4f863dd969a667db72a904633d756fcd84e7e
SHA5129cdec82580ed96bd846901cb4bd4e7a876bb9b0fc5db194a3497e5f3f341c0949d4f9b909fd8d400674f52bb13a256fe66289e8b1b127f537002ea8e63cff7f9
-
Filesize
543KB
MD5c4d54132642126effe6f992652a74f2e
SHA1d9c0d744b49b1c3908a2e6ab373c73f56b31a2de
SHA256608e515d35a23bfa2a78905025d3e79131636e8f72e7506a5e6d8a636f70ef4f
SHA51289fbcea17f073b9065c5d2df701e8dcb39bc56c89a90afc386058386e3ce37a9b6f235ad586c808cf73b03b0fc46dad01b5bc979c1c8d5417586f289eba17e73
-
Filesize
543KB
MD5c4d54132642126effe6f992652a74f2e
SHA1d9c0d744b49b1c3908a2e6ab373c73f56b31a2de
SHA256608e515d35a23bfa2a78905025d3e79131636e8f72e7506a5e6d8a636f70ef4f
SHA51289fbcea17f073b9065c5d2df701e8dcb39bc56c89a90afc386058386e3ce37a9b6f235ad586c808cf73b03b0fc46dad01b5bc979c1c8d5417586f289eba17e73
-
Filesize
292KB
MD517f216efdebe7c2ea35cafaac5a99d41
SHA1e08d699f99c5ea7d16eea7d27ec389755162385f
SHA256199eb693504703cf421b794e9ec609b22ca16ddddf790ece5857d82a23b228d6
SHA512f9add6e25b1bb72e72bd9f46f9cee4c46687da2048c63e75b3e4f5b0f477e4dc33c8a64b3649efe3c99f6a4b3392891b8f236b22b52d14bfc9769a0fda7635cb
-
Filesize
292KB
MD517f216efdebe7c2ea35cafaac5a99d41
SHA1e08d699f99c5ea7d16eea7d27ec389755162385f
SHA256199eb693504703cf421b794e9ec609b22ca16ddddf790ece5857d82a23b228d6
SHA512f9add6e25b1bb72e72bd9f46f9cee4c46687da2048c63e75b3e4f5b0f477e4dc33c8a64b3649efe3c99f6a4b3392891b8f236b22b52d14bfc9769a0fda7635cb
-
Filesize
350KB
MD5e33587c9c2b495afebaab9fbe2df2420
SHA10725fd007d37c520ae9e436130d5b9b95891d46f
SHA25648e411f9708e8350a73b7ca4f9c345301c2be42e1d0e87e11badfd75bc55b47f
SHA512a20096f1dbf27b3ba030534248f60d3c066bbefe0b2f4a2113cc106d0e5daf8368365a419a64eaad44bc9369a12a88273209f42345d3a9ba8c9944d2f52b0de2
-
Filesize
350KB
MD5e33587c9c2b495afebaab9fbe2df2420
SHA10725fd007d37c520ae9e436130d5b9b95891d46f
SHA25648e411f9708e8350a73b7ca4f9c345301c2be42e1d0e87e11badfd75bc55b47f
SHA512a20096f1dbf27b3ba030534248f60d3c066bbefe0b2f4a2113cc106d0e5daf8368365a419a64eaad44bc9369a12a88273209f42345d3a9ba8c9944d2f52b0de2