Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:23
Static task
static1
Behavioral task
behavioral1
Sample
0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe
Resource
win10v2004-20230221-en
General
-
Target
0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe
-
Size
685KB
-
MD5
a53f9e3ec2003da8bb8fb5a609e3be1a
-
SHA1
8a35459795b6bd42bb8b24cccd884986d618133a
-
SHA256
0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66
-
SHA512
e4376f2278bcfd9c9ae806a578b54298074fde607306feed1f41328ce228a004432cabfca2ceb74f433323245defa4eeaaeb1316123dfc22999753fa44a2a1d1
-
SSDEEP
12288:nMray90RS4SnLPh+Rbw4BGJJkGEBVaeYB74I1OhVlHvzBD0KEVSXTv1bw:1y7LMdwnQBQzUlb50KE4dbw
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2853.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4492-191-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-192-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-194-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-197-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-200-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-204-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-206-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-208-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-210-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-212-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-214-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-216-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-218-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-220-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-222-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-224-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-226-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-228-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4492-1112-0x0000000002530000-0x0000000002540000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2332 un698388.exe 3284 pro2853.exe 4492 qu5281.exe 4124 si629913.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2853.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2853.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un698388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un698388.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2336 3284 WerFault.exe 86 1696 4492 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3284 pro2853.exe 3284 pro2853.exe 4492 qu5281.exe 4492 qu5281.exe 4124 si629913.exe 4124 si629913.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3284 pro2853.exe Token: SeDebugPrivilege 4492 qu5281.exe Token: SeDebugPrivilege 4124 si629913.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3980 wrote to memory of 2332 3980 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe 85 PID 3980 wrote to memory of 2332 3980 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe 85 PID 3980 wrote to memory of 2332 3980 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe 85 PID 2332 wrote to memory of 3284 2332 un698388.exe 86 PID 2332 wrote to memory of 3284 2332 un698388.exe 86 PID 2332 wrote to memory of 3284 2332 un698388.exe 86 PID 2332 wrote to memory of 4492 2332 un698388.exe 89 PID 2332 wrote to memory of 4492 2332 un698388.exe 89 PID 2332 wrote to memory of 4492 2332 un698388.exe 89 PID 3980 wrote to memory of 4124 3980 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe 92 PID 3980 wrote to memory of 4124 3980 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe 92 PID 3980 wrote to memory of 4124 3980 0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe"C:\Users\Admin\AppData\Local\Temp\0748e96b333f70826ab809b4b781f707268c76b0ea66383e4324e4240bfd0b66.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698388.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2853.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 11004⤵
- Program crash
PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5281.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 16684⤵
- Program crash
PID:1696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si629913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si629913.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3284 -ip 32841⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4492 -ip 44921⤵PID:3756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD590025106ebc1e42210fe1530aa3ed3bf
SHA1ff7e9597ba32b01b4b5f4f03c6552807c1e4f615
SHA2569033ee56c345d559a2a61793418834a1151f69670ddc2c5c9e9d118ade0c34e3
SHA512cda8d1c7c0e987630f946758c484b0b9fd6378cc03a566e036c9c60dd547096592753f48c62415f2598451e180292d9b8e5d129bb668e84356dbfa4622f6506a
-
Filesize
175KB
MD590025106ebc1e42210fe1530aa3ed3bf
SHA1ff7e9597ba32b01b4b5f4f03c6552807c1e4f615
SHA2569033ee56c345d559a2a61793418834a1151f69670ddc2c5c9e9d118ade0c34e3
SHA512cda8d1c7c0e987630f946758c484b0b9fd6378cc03a566e036c9c60dd547096592753f48c62415f2598451e180292d9b8e5d129bb668e84356dbfa4622f6506a
-
Filesize
543KB
MD5c4bc03ce88a7be4205ee82eb49cee70a
SHA143dd7f3dac2820014c94b264f25f0c8ef32dbef6
SHA25662255c04c13c912fbe1b755d80c5bdb17808a409772059820d7f999803aa8661
SHA51215e168324dc4727a600b84228cd791bcb7589b97bf67c695c0fd67cfb71d383654a06b9d91be3e14ef208cd37224d68ab7decf76b5f86ef32674ada997330d19
-
Filesize
543KB
MD5c4bc03ce88a7be4205ee82eb49cee70a
SHA143dd7f3dac2820014c94b264f25f0c8ef32dbef6
SHA25662255c04c13c912fbe1b755d80c5bdb17808a409772059820d7f999803aa8661
SHA51215e168324dc4727a600b84228cd791bcb7589b97bf67c695c0fd67cfb71d383654a06b9d91be3e14ef208cd37224d68ab7decf76b5f86ef32674ada997330d19
-
Filesize
292KB
MD56a43666e13c138152875af05dba49952
SHA135988629073e245947a5a100fc3311e2681f3835
SHA256c5df71ced417f714e40839a35e666fc0f45931aa73fd618e095d199fdf3e639b
SHA5128085027b5acd0beb0fdcd88c941f80ba9684877e2552d0f4d56c7cb7fdbbb2da1a323d90464c0429e6fbc73f11b82f471d1fe297eb20aa998d1ee7d767097639
-
Filesize
292KB
MD56a43666e13c138152875af05dba49952
SHA135988629073e245947a5a100fc3311e2681f3835
SHA256c5df71ced417f714e40839a35e666fc0f45931aa73fd618e095d199fdf3e639b
SHA5128085027b5acd0beb0fdcd88c941f80ba9684877e2552d0f4d56c7cb7fdbbb2da1a323d90464c0429e6fbc73f11b82f471d1fe297eb20aa998d1ee7d767097639
-
Filesize
350KB
MD572ee3c79a50689fe5fde863ec7b1b3de
SHA191a97649811ce26336a3b46327cbb87d606fc875
SHA25689b70c32b6f64028aadbd52cf7732e30d2ee77242cd19a1b98e8eb8edbd4e505
SHA51202ba08786050e2a35c9689de93b255ca6c2b99add36d6b9a90f6b0018e381b3375fde27ae1b8ec54f5d499117802bdb466aab462544838f07c6084c64ef90685
-
Filesize
350KB
MD572ee3c79a50689fe5fde863ec7b1b3de
SHA191a97649811ce26336a3b46327cbb87d606fc875
SHA25689b70c32b6f64028aadbd52cf7732e30d2ee77242cd19a1b98e8eb8edbd4e505
SHA51202ba08786050e2a35c9689de93b255ca6c2b99add36d6b9a90f6b0018e381b3375fde27ae1b8ec54f5d499117802bdb466aab462544838f07c6084c64ef90685