Analysis
-
max time kernel
50s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:20
Static task
static1
Behavioral task
behavioral1
Sample
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe
Resource
win10-20230220-en
General
-
Target
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe
-
Size
685KB
-
MD5
aa77576942aa2ce7e15b6ea9acdabbea
-
SHA1
fae9454d59260cf08ac466cd41f312309dc6b9bf
-
SHA256
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980
-
SHA512
9470f84ebb0f66b02792252716179254cebc20b3a6e85f3f4271978e386d634acdaa71381465ba26994ddfaca030d6f0ccf595dbbc8ce4c52b4480ece66fa1a7
-
SSDEEP
12288:EMrZy90TkaZbVdUsfbvXGEXZKHLs2PmyeWnynORwdrXe7a0B9q0EX4ah+tMRB8:Nyukgb3UsfbvPpKlPmbWnSOadrXed/qG
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2112.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2784-181-0x0000000004C40000-0x0000000004C86000-memory.dmp family_redline behavioral1/memory/2784-182-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/2784-183-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-184-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-186-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-188-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-190-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-192-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-194-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-196-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-198-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-200-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-203-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-207-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-209-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-211-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-213-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-215-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-217-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline behavioral1/memory/2784-219-0x00000000051D0000-0x000000000520E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2260 un437476.exe 2536 pro2112.exe 2784 qu5115.exe 4360 si657708.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2112.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un437476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un437476.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2536 pro2112.exe 2536 pro2112.exe 2784 qu5115.exe 2784 qu5115.exe 4360 si657708.exe 4360 si657708.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2536 pro2112.exe Token: SeDebugPrivilege 2784 qu5115.exe Token: SeDebugPrivilege 4360 si657708.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2260 1444 b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe 66 PID 1444 wrote to memory of 2260 1444 b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe 66 PID 1444 wrote to memory of 2260 1444 b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe 66 PID 2260 wrote to memory of 2536 2260 un437476.exe 67 PID 2260 wrote to memory of 2536 2260 un437476.exe 67 PID 2260 wrote to memory of 2536 2260 un437476.exe 67 PID 2260 wrote to memory of 2784 2260 un437476.exe 68 PID 2260 wrote to memory of 2784 2260 un437476.exe 68 PID 2260 wrote to memory of 2784 2260 un437476.exe 68 PID 1444 wrote to memory of 4360 1444 b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe 70 PID 1444 wrote to memory of 4360 1444 b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe 70 PID 1444 wrote to memory of 4360 1444 b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe"C:\Users\Admin\AppData\Local\Temp\b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437476.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2112.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2112.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5115.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657708.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50aa9734c1d8a1cc212a5a378ed3c2c95
SHA1359935a3bb3626d9e6a813b713bf2db07402b348
SHA256ebbbdcce674769f94a0818a20630791e4210cb244f0b99c1bf73d14ac4339d69
SHA5126eb3efd5ce93b5fcd992d686064df76af9e506affa1760b14b790df9af622ddf8c82fc925748c398558e016075ce9f23bf022e107b05cd25a41cbf4c43676a5c
-
Filesize
175KB
MD50aa9734c1d8a1cc212a5a378ed3c2c95
SHA1359935a3bb3626d9e6a813b713bf2db07402b348
SHA256ebbbdcce674769f94a0818a20630791e4210cb244f0b99c1bf73d14ac4339d69
SHA5126eb3efd5ce93b5fcd992d686064df76af9e506affa1760b14b790df9af622ddf8c82fc925748c398558e016075ce9f23bf022e107b05cd25a41cbf4c43676a5c
-
Filesize
543KB
MD5edc64e047c464130503c26b2d710b303
SHA1a80c06d686baf503e17e04c629c0b2a694b892f7
SHA256d4f0ee19cd656c10e5c42d057d928549b5e0ac35e344aa13008d44a5f119b24a
SHA512f69547d515850938c8b758642fc53cad84573ae9ea7609ec7a9ad99f3bd426582ebf2718608c55ad1243238d49e6ae43a0940ba16111442a8acabef2c164b767
-
Filesize
543KB
MD5edc64e047c464130503c26b2d710b303
SHA1a80c06d686baf503e17e04c629c0b2a694b892f7
SHA256d4f0ee19cd656c10e5c42d057d928549b5e0ac35e344aa13008d44a5f119b24a
SHA512f69547d515850938c8b758642fc53cad84573ae9ea7609ec7a9ad99f3bd426582ebf2718608c55ad1243238d49e6ae43a0940ba16111442a8acabef2c164b767
-
Filesize
292KB
MD55b525ee866150fe697405543470cd190
SHA1bcd7cffaa72d8717bb0cbed46450fca3ec9b8533
SHA2568126b2fa7dd38667fd750c0503d30a342a8c5c3a98846c1f2110fede434d2493
SHA512ff8e0717bd7545aa0b8a3e48385581aba786253df111b2deabf277809429e551f82ff7461cf3e188280f888200a35c73225612baf604b637a163fdc10cd1da89
-
Filesize
292KB
MD55b525ee866150fe697405543470cd190
SHA1bcd7cffaa72d8717bb0cbed46450fca3ec9b8533
SHA2568126b2fa7dd38667fd750c0503d30a342a8c5c3a98846c1f2110fede434d2493
SHA512ff8e0717bd7545aa0b8a3e48385581aba786253df111b2deabf277809429e551f82ff7461cf3e188280f888200a35c73225612baf604b637a163fdc10cd1da89
-
Filesize
350KB
MD551dd23f91e414a8500f707bbd4dadd33
SHA1462f0f517986b8597f361e34e2703887b1b99fb5
SHA256c834b38a220bee4f8212080de11158a58903c0a19e35a44abe4479974f44ca1a
SHA5128ebc7b2f8cce813edc96d022de8e510b377e4b6259ae7e343cfbf5088ca9600d161b60be01f8463c6ad21f417d14c01d47c8cf188a4b6e9e1f9d6d9753c5f4b5
-
Filesize
350KB
MD551dd23f91e414a8500f707bbd4dadd33
SHA1462f0f517986b8597f361e34e2703887b1b99fb5
SHA256c834b38a220bee4f8212080de11158a58903c0a19e35a44abe4479974f44ca1a
SHA5128ebc7b2f8cce813edc96d022de8e510b377e4b6259ae7e343cfbf5088ca9600d161b60be01f8463c6ad21f417d14c01d47c8cf188a4b6e9e1f9d6d9753c5f4b5