Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:19
Static task
static1
Behavioral task
behavioral1
Sample
86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe
Resource
win10v2004-20230220-en
General
-
Target
86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe
-
Size
685KB
-
MD5
865d650f69b8daebede29980033cc134
-
SHA1
97e638fe665f50c890d8745be70188425ad3676a
-
SHA256
86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47
-
SHA512
bb461592df7cb5c505004307073806c23c365d7e360a8c70783757b9c7e33df1f3161bdc7070fa4612e609f22f5cb001ee0d291e3f19e431b12f22c85517fd29
-
SSDEEP
12288:CMrEy901T2BmiOpKH5HdCoDa6E7aIBHvY7B2ooEC5Qxo65b2pFWf:qyxBm9CFdCYExPYcooEN6be
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2189.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2189.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/668-191-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-190-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-193-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-195-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-197-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-199-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-201-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-203-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-205-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-209-0x0000000004CA0000-0x0000000004CB0000-memory.dmp family_redline behavioral1/memory/668-208-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-212-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-215-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-217-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-219-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-221-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-223-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-225-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/668-227-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4344 un564908.exe 2036 pro2189.exe 668 qu1431.exe 3228 si920800.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2189.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un564908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un564908.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 824 2036 WerFault.exe 85 552 668 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 pro2189.exe 2036 pro2189.exe 668 qu1431.exe 668 qu1431.exe 3228 si920800.exe 3228 si920800.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2036 pro2189.exe Token: SeDebugPrivilege 668 qu1431.exe Token: SeDebugPrivilege 3228 si920800.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4344 4400 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe 84 PID 4400 wrote to memory of 4344 4400 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe 84 PID 4400 wrote to memory of 4344 4400 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe 84 PID 4344 wrote to memory of 2036 4344 un564908.exe 85 PID 4344 wrote to memory of 2036 4344 un564908.exe 85 PID 4344 wrote to memory of 2036 4344 un564908.exe 85 PID 4344 wrote to memory of 668 4344 un564908.exe 91 PID 4344 wrote to memory of 668 4344 un564908.exe 91 PID 4344 wrote to memory of 668 4344 un564908.exe 91 PID 4400 wrote to memory of 3228 4400 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe 94 PID 4400 wrote to memory of 3228 4400 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe 94 PID 4400 wrote to memory of 3228 4400 86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe"C:\Users\Admin\AppData\Local\Temp\86db90ca0a7fdf7345bfad3d66ccb669435fe851bbcda1b8e81e52639e814b47.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564908.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2189.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 10844⤵
- Program crash
PID:824
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1431.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 19244⤵
- Program crash
PID:552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920800.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920800.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2036 -ip 20361⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 668 -ip 6681⤵PID:4756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5eeea717363f021977c79499974bf19f6
SHA1037ff896535a970f9d6fe4a290d4cea6e3e51cab
SHA25635d0f2a729e7d37eb14eb0edde8d6ee3c2f09a091a03af0214569fba63999f83
SHA512e15087626b2694d487550ee8e50afd28472680aa9cdb9c545dbe42b853130477a0a87f88824c9087c47f5a1d1332bb978f699ac2ac9d53d6662cdc1d8a478281
-
Filesize
175KB
MD5eeea717363f021977c79499974bf19f6
SHA1037ff896535a970f9d6fe4a290d4cea6e3e51cab
SHA25635d0f2a729e7d37eb14eb0edde8d6ee3c2f09a091a03af0214569fba63999f83
SHA512e15087626b2694d487550ee8e50afd28472680aa9cdb9c545dbe42b853130477a0a87f88824c9087c47f5a1d1332bb978f699ac2ac9d53d6662cdc1d8a478281
-
Filesize
543KB
MD5371114236553fe05373bc51c44a097f2
SHA1f67bd59ecaa6a0a430c2b57bb231f5538e733b03
SHA256b7900213bdda7cf85a74d6889326d6057eec4f6ef97a8146c6e161dbcbe4ea09
SHA5125a9bb6bf1165f23cb0de15088405cadb18a52da8982df4c28923bf820e3c36f908030883c00dde9993512071b7eefdfbadd8773b96006b9e5ea7a649f1234ee4
-
Filesize
543KB
MD5371114236553fe05373bc51c44a097f2
SHA1f67bd59ecaa6a0a430c2b57bb231f5538e733b03
SHA256b7900213bdda7cf85a74d6889326d6057eec4f6ef97a8146c6e161dbcbe4ea09
SHA5125a9bb6bf1165f23cb0de15088405cadb18a52da8982df4c28923bf820e3c36f908030883c00dde9993512071b7eefdfbadd8773b96006b9e5ea7a649f1234ee4
-
Filesize
292KB
MD5c4793ccbdb298fa7f50815066fc8c02b
SHA14e83ff122f9120d268fe6f29243b266036bd9f64
SHA2561532f4c9626059b5925c90aee8d3913c784382fa019d6a1e3de0df30ae01e48b
SHA512bdbac624f1b714536096e535a24064adb797e2d6df5f87ca4c22b1ab0de4af833dd3f7578cbce5ab3366ca783e49f7095099dca74a4f278dbd5264135b11e3dd
-
Filesize
292KB
MD5c4793ccbdb298fa7f50815066fc8c02b
SHA14e83ff122f9120d268fe6f29243b266036bd9f64
SHA2561532f4c9626059b5925c90aee8d3913c784382fa019d6a1e3de0df30ae01e48b
SHA512bdbac624f1b714536096e535a24064adb797e2d6df5f87ca4c22b1ab0de4af833dd3f7578cbce5ab3366ca783e49f7095099dca74a4f278dbd5264135b11e3dd
-
Filesize
350KB
MD5ca338b830549a00e5fe93d7f278b94b4
SHA1c06e7af56a06af961a89c070003b2be6284834e8
SHA2565f09c241ba48fccc65e7cc4930031447bcdd284b957bbe834f886fb10b093054
SHA512acca0130b6ecdc0ab7b56adf9dceeb5b56baa0e864142be223cee262d8350c298964817866936d8fcdf54534fc0663ed8c98e89fdb414dc59f264b53dfa7816b
-
Filesize
350KB
MD5ca338b830549a00e5fe93d7f278b94b4
SHA1c06e7af56a06af961a89c070003b2be6284834e8
SHA2565f09c241ba48fccc65e7cc4930031447bcdd284b957bbe834f886fb10b093054
SHA512acca0130b6ecdc0ab7b56adf9dceeb5b56baa0e864142be223cee262d8350c298964817866936d8fcdf54534fc0663ed8c98e89fdb414dc59f264b53dfa7816b