Analysis
-
max time kernel
109s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:23
Static task
static1
Behavioral task
behavioral1
Sample
93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe
Resource
win10v2004-20230221-en
General
-
Target
93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe
-
Size
682KB
-
MD5
7c077959b0b326d153e478097729a77b
-
SHA1
a6dcbbb01023be4a7f59f16538496bfac51ba962
-
SHA256
93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721
-
SHA512
4f8daeca7d50498e8ace374dcd0bd237ac6e71a1a07b2998429e146f858de71c27efc8ca8b8b80d59c3e0a03b105b5c71fef47aab72962f6469828a8742265fa
-
SSDEEP
12288:AK7KRc/2qg5H3fNrHqZ99foYUtoBsaUleNc8EfSzAON8ymWJtMsOYyBu:LmI2tH3fBHqZnfoYUt4rUleNECGy54bB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr806405.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
resource yara_rule behavioral1/memory/4420-157-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-160-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-162-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-158-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-164-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-166-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-168-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-170-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-172-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-174-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-176-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-178-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-182-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-186-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-188-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-190-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-192-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-194-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-196-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-198-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-200-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-202-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-204-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-206-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-208-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-210-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-212-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-214-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-216-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-218-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-220-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/4420-222-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5108 zieN6673.exe 4192 jr806405.exe 4420 ku081645.exe 3660 lr730710.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr806405.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieN6673.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieN6673.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1948 4420 WerFault.exe 88 2220 4352 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4192 jr806405.exe 4192 jr806405.exe 4420 ku081645.exe 4420 ku081645.exe 3660 lr730710.exe 3660 lr730710.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4192 jr806405.exe Token: SeDebugPrivilege 4420 ku081645.exe Token: SeDebugPrivilege 3660 lr730710.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4352 wrote to memory of 5108 4352 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe 86 PID 4352 wrote to memory of 5108 4352 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe 86 PID 4352 wrote to memory of 5108 4352 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe 86 PID 5108 wrote to memory of 4192 5108 zieN6673.exe 87 PID 5108 wrote to memory of 4192 5108 zieN6673.exe 87 PID 5108 wrote to memory of 4420 5108 zieN6673.exe 88 PID 5108 wrote to memory of 4420 5108 zieN6673.exe 88 PID 5108 wrote to memory of 4420 5108 zieN6673.exe 88 PID 4352 wrote to memory of 3660 4352 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe 91 PID 4352 wrote to memory of 3660 4352 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe 91 PID 4352 wrote to memory of 3660 4352 93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe"C:\Users\Admin\AppData\Local\Temp\93f75d4fc8b38b01e9bb77d0851a8b078386b72fb13c5233c94ef978857de721.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 16324⤵
- Program crash
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 2762⤵
- Program crash
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4420 -ip 44201⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4352 -ip 43521⤵PID:2308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd