Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:25
Static task
static1
Behavioral task
behavioral1
Sample
db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe
Resource
win10v2004-20230220-en
General
-
Target
db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe
-
Size
685KB
-
MD5
cd05a9321f574f713dca0f349e11290f
-
SHA1
78bc1f0a648a587c425d9cda1a270608e4cecd15
-
SHA256
db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0
-
SHA512
c321f63f0577a0fb39eee57cf924b22b856d1cc9f4caa604f8a0c8465014a28d9c125886aa4ac90f67dc5225de29f622e9825db632a6360cac5a2c5591316575
-
SSDEEP
12288:0MrNy90tUsafP0WT7/12UjJ+knjGD9fdskqO3JnlVa4BJ4kEwEAmL/Fc:pyHNN2AzCD5dGGJnl3T4kEwHcc
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0484.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0484.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4280-190-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-191-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-193-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-195-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-197-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-199-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-201-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-203-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-205-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-207-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-209-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-211-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-213-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-215-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-217-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-219-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-221-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-223-0x0000000005300000-0x000000000533E000-memory.dmp family_redline behavioral1/memory/4280-496-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline behavioral1/memory/4280-1108-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 684 un427921.exe 1696 pro0484.exe 4280 qu1671.exe 2164 si834007.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0484.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0484.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un427921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un427921.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4416 1696 WerFault.exe 78 1056 4280 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1696 pro0484.exe 1696 pro0484.exe 4280 qu1671.exe 4280 qu1671.exe 2164 si834007.exe 2164 si834007.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1696 pro0484.exe Token: SeDebugPrivilege 4280 qu1671.exe Token: SeDebugPrivilege 2164 si834007.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 980 wrote to memory of 684 980 db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe 77 PID 980 wrote to memory of 684 980 db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe 77 PID 980 wrote to memory of 684 980 db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe 77 PID 684 wrote to memory of 1696 684 un427921.exe 78 PID 684 wrote to memory of 1696 684 un427921.exe 78 PID 684 wrote to memory of 1696 684 un427921.exe 78 PID 684 wrote to memory of 4280 684 un427921.exe 83 PID 684 wrote to memory of 4280 684 un427921.exe 83 PID 684 wrote to memory of 4280 684 un427921.exe 83 PID 980 wrote to memory of 2164 980 db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe 88 PID 980 wrote to memory of 2164 980 db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe 88 PID 980 wrote to memory of 2164 980 db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe"C:\Users\Admin\AppData\Local\Temp\db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un427921.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un427921.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0484.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0484.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 10364⤵
- Program crash
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1671.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1671.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 17324⤵
- Program crash
PID:1056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834007.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1696 -ip 16961⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4280 -ip 42801⤵PID:1908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c1b29eb99c7369cef99811eb0fe1a983
SHA1af7272aebee628374ea6ae73c9a505bdbb388625
SHA25657ea9aced307cd8a35c7767aaeb59745bbcee22175c490d3d880e230ede15da3
SHA51219ac9917cd20436748c6d285a69b85ffa6e6089bae9630360fd798c8554bd6aa415bd0048bb78b8e18ea59d7de1a641533ddafaed9f7655773e3f58b993de1bd
-
Filesize
175KB
MD5c1b29eb99c7369cef99811eb0fe1a983
SHA1af7272aebee628374ea6ae73c9a505bdbb388625
SHA25657ea9aced307cd8a35c7767aaeb59745bbcee22175c490d3d880e230ede15da3
SHA51219ac9917cd20436748c6d285a69b85ffa6e6089bae9630360fd798c8554bd6aa415bd0048bb78b8e18ea59d7de1a641533ddafaed9f7655773e3f58b993de1bd
-
Filesize
543KB
MD54d4b81b4434139744dd636db1b2f6960
SHA1b7f8655861c832b25e65471dfafa6515afdb5950
SHA25657cbfb80d5a0efff92f63665110dc39b0525f1e755bdada8b1bbe32f6ff45864
SHA512d33b7849ed1ecc2d1dd3945c72f75cb5d249ba263046c4459232a1ecc19c56184f7b2d9bf61e34a7d2ee4f1fccd06432cb7e0aaeb8417ca08fc47363fdf0275f
-
Filesize
543KB
MD54d4b81b4434139744dd636db1b2f6960
SHA1b7f8655861c832b25e65471dfafa6515afdb5950
SHA25657cbfb80d5a0efff92f63665110dc39b0525f1e755bdada8b1bbe32f6ff45864
SHA512d33b7849ed1ecc2d1dd3945c72f75cb5d249ba263046c4459232a1ecc19c56184f7b2d9bf61e34a7d2ee4f1fccd06432cb7e0aaeb8417ca08fc47363fdf0275f
-
Filesize
292KB
MD58d3caddb8ddf8a68ef01c59727ed86d2
SHA15457fe449bfcb490707d9fe46316313ac1df450f
SHA256f1b959afa2a47ca72e4bc147d0024c0a158e6c74c8deb248e8fb704e6e149c59
SHA512c230dd988d16722f92329dd5116bcb4688cb9a658b51f4fbe435c7c2b20bb2396419ee13e6eb06ef5a626fc4badeab8b5ceaca7149b48dcfdda4e3c3e228265e
-
Filesize
292KB
MD58d3caddb8ddf8a68ef01c59727ed86d2
SHA15457fe449bfcb490707d9fe46316313ac1df450f
SHA256f1b959afa2a47ca72e4bc147d0024c0a158e6c74c8deb248e8fb704e6e149c59
SHA512c230dd988d16722f92329dd5116bcb4688cb9a658b51f4fbe435c7c2b20bb2396419ee13e6eb06ef5a626fc4badeab8b5ceaca7149b48dcfdda4e3c3e228265e
-
Filesize
350KB
MD5a86c85fb40ea044f9af6a9b789167b56
SHA1d42502d19df768c9d08da0acdbad9bfe530dfdb8
SHA2566c99bcd499fb9b5465ca382b2013c903cb7a7215e8da4e24bdff6d8a51e73439
SHA5120c8fffde8861200a889d6a33da959b45e686471cb97435cc469981b40b709852a61a5de620f02cd63272d376916b3832591323c9b027f6cbd6eb0c11ccbd0f8e
-
Filesize
350KB
MD5a86c85fb40ea044f9af6a9b789167b56
SHA1d42502d19df768c9d08da0acdbad9bfe530dfdb8
SHA2566c99bcd499fb9b5465ca382b2013c903cb7a7215e8da4e24bdff6d8a51e73439
SHA5120c8fffde8861200a889d6a33da959b45e686471cb97435cc469981b40b709852a61a5de620f02cd63272d376916b3832591323c9b027f6cbd6eb0c11ccbd0f8e