Analysis
-
max time kernel
71s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:16
Static task
static1
Behavioral task
behavioral1
Sample
856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe
Resource
win10-20230220-en
General
-
Target
856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe
-
Size
685KB
-
MD5
18fa5994fe0a4e1b5ecadf4339035bcd
-
SHA1
30092438ffb30146d244f6ad8d95c9e1319664f8
-
SHA256
856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93
-
SHA512
4e666583b32c3a310a4efe02ba882cb3e9f638ee6452b572ba2e71154ad737132b5d3fe37b6ad1d9dfeb62976e352ab2f07bdf4866be9887327ec2f7b337bd95
-
SSDEEP
12288:/Mrwy90T/w5bEl1X5RJSkPKyz0GmfqwwvvwUBKYiEnVBZ8UN:DyM/JVRrKy7mfqLXYYiEvZBN
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3990.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2052-178-0x0000000002290000-0x00000000022D6000-memory.dmp family_redline behavioral1/memory/2052-179-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/2052-180-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-181-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-183-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-185-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-187-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-189-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-191-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-193-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-195-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-197-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-199-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-201-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-208-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-204-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-210-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-212-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-214-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2052-216-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4180 un377617.exe 3916 pro3990.exe 2052 qu3742.exe 4364 si601983.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3990.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un377617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un377617.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3916 pro3990.exe 3916 pro3990.exe 2052 qu3742.exe 2052 qu3742.exe 4364 si601983.exe 4364 si601983.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3916 pro3990.exe Token: SeDebugPrivilege 2052 qu3742.exe Token: SeDebugPrivilege 4364 si601983.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4180 3640 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 66 PID 3640 wrote to memory of 4180 3640 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 66 PID 3640 wrote to memory of 4180 3640 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 66 PID 4180 wrote to memory of 3916 4180 un377617.exe 67 PID 4180 wrote to memory of 3916 4180 un377617.exe 67 PID 4180 wrote to memory of 3916 4180 un377617.exe 67 PID 4180 wrote to memory of 2052 4180 un377617.exe 68 PID 4180 wrote to memory of 2052 4180 un377617.exe 68 PID 4180 wrote to memory of 2052 4180 un377617.exe 68 PID 3640 wrote to memory of 4364 3640 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 70 PID 3640 wrote to memory of 4364 3640 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 70 PID 3640 wrote to memory of 4364 3640 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe"C:\Users\Admin\AppData\Local\Temp\856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un377617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un377617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3990.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3742.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si601983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si601983.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD533c5f6bde5c4d4e5858a1cb1cdc1acb0
SHA1c42ec4e2a50509a701a03909b0c8ab9598681f2b
SHA256f0ff773dcc12eaeb98e902d235fbcf19d79e0ef82d3735fa763d130e076b2b51
SHA51273f3054084795b28259db4e9188690c41677a1e6c5cea7676182e5ecea70c712b8bfa454154a08a35f596329765347a392b0fd222ebda8fc6d8ffaea229cde7d
-
Filesize
175KB
MD533c5f6bde5c4d4e5858a1cb1cdc1acb0
SHA1c42ec4e2a50509a701a03909b0c8ab9598681f2b
SHA256f0ff773dcc12eaeb98e902d235fbcf19d79e0ef82d3735fa763d130e076b2b51
SHA51273f3054084795b28259db4e9188690c41677a1e6c5cea7676182e5ecea70c712b8bfa454154a08a35f596329765347a392b0fd222ebda8fc6d8ffaea229cde7d
-
Filesize
543KB
MD574abde217ee41cd2d5fcaf45077a1393
SHA13ffe9a660bc1f0da66e7e57426d222041c65867b
SHA2569aabec782378d100e34a24357b8589fd94ef21629d623780bc22fcc046023e9e
SHA512b4d7586d75bf75b76114e4421e3e403c97a171b362adb4d24a6d18877379861c8c60fea50f2bd9ec2318fe1de29e2d45f608bc0c4c640844aa1052f0a5d88b4d
-
Filesize
543KB
MD574abde217ee41cd2d5fcaf45077a1393
SHA13ffe9a660bc1f0da66e7e57426d222041c65867b
SHA2569aabec782378d100e34a24357b8589fd94ef21629d623780bc22fcc046023e9e
SHA512b4d7586d75bf75b76114e4421e3e403c97a171b362adb4d24a6d18877379861c8c60fea50f2bd9ec2318fe1de29e2d45f608bc0c4c640844aa1052f0a5d88b4d
-
Filesize
292KB
MD520e9652e47b2cbb64e87953d6c03c943
SHA1c4d4e8eb05152932ed50c2f7338609bcab61b3f2
SHA256fd06cad2551968f58c060292ac16e11373727ed82ff6ead5079207e80fbca1d0
SHA512d0548df90fca251d304afe52ba835e74648ca7070e7dee9e610910f63a55f4428c7b8b5c7262b45ae32642dfee64ec71ded31c7cb1e21ebb01c194e211b15eca
-
Filesize
292KB
MD520e9652e47b2cbb64e87953d6c03c943
SHA1c4d4e8eb05152932ed50c2f7338609bcab61b3f2
SHA256fd06cad2551968f58c060292ac16e11373727ed82ff6ead5079207e80fbca1d0
SHA512d0548df90fca251d304afe52ba835e74648ca7070e7dee9e610910f63a55f4428c7b8b5c7262b45ae32642dfee64ec71ded31c7cb1e21ebb01c194e211b15eca
-
Filesize
350KB
MD5dccd45a8ef6d57ab657f8ab2d86a06b1
SHA12c3f7af875f3716cff348f3c0204fd219f3a10e5
SHA25611f91c7b26911bda11c70e53db97d10452920fbbdb94e9dde4c18ebe444d1863
SHA5129974513ac5d5cc4994b6c588483aeee8748d2e1570d8124200498d0087aaffc7c6872519267bb8136498b7cdc539044638a94f797fbfe83f1239b8386c8209e8
-
Filesize
350KB
MD5dccd45a8ef6d57ab657f8ab2d86a06b1
SHA12c3f7af875f3716cff348f3c0204fd219f3a10e5
SHA25611f91c7b26911bda11c70e53db97d10452920fbbdb94e9dde4c18ebe444d1863
SHA5129974513ac5d5cc4994b6c588483aeee8748d2e1570d8124200498d0087aaffc7c6872519267bb8136498b7cdc539044638a94f797fbfe83f1239b8386c8209e8