Analysis
-
max time kernel
53s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe
Resource
win10v2004-20230220-en
General
-
Target
0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe
-
Size
685KB
-
MD5
ad0fd263ea0e013e439af99a17466e76
-
SHA1
6ae7b50d751181db7aec116d147cdf7f92af5626
-
SHA256
0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd
-
SHA512
0abb38d7b083627acedcaae9d50820790ffeb82db47af78fc15980e0d372170fbcd50d5a1ad515413524d069e105db0d343c15ef9ba0cd351c86b8062f3b5712
-
SSDEEP
12288:rMrqy90MaezgqRlTqB/sDV5TgIWD9kd3Aa1YGNx77BQyWEj2AvvT0Uo:ByfzVTqB/q5TvWDOtAa1bx/CyWEj1TC
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5632.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4140-191-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-201-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-199-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-209-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-215-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-223-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-221-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-219-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-217-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-213-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-211-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-207-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-205-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-203-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-197-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-195-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-193-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-190-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4140-1108-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4320 un014336.exe 3636 pro5632.exe 4140 qu7884.exe 3236 si941816.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5632.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5632.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un014336.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un014336.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 884 3636 WerFault.exe 83 1532 4140 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3636 pro5632.exe 3636 pro5632.exe 4140 qu7884.exe 4140 qu7884.exe 3236 si941816.exe 3236 si941816.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3636 pro5632.exe Token: SeDebugPrivilege 4140 qu7884.exe Token: SeDebugPrivilege 3236 si941816.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2504 wrote to memory of 4320 2504 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe 82 PID 2504 wrote to memory of 4320 2504 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe 82 PID 2504 wrote to memory of 4320 2504 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe 82 PID 4320 wrote to memory of 3636 4320 un014336.exe 83 PID 4320 wrote to memory of 3636 4320 un014336.exe 83 PID 4320 wrote to memory of 3636 4320 un014336.exe 83 PID 4320 wrote to memory of 4140 4320 un014336.exe 90 PID 4320 wrote to memory of 4140 4320 un014336.exe 90 PID 4320 wrote to memory of 4140 4320 un014336.exe 90 PID 2504 wrote to memory of 3236 2504 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe 93 PID 2504 wrote to memory of 3236 2504 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe 93 PID 2504 wrote to memory of 3236 2504 0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe"C:\Users\Admin\AppData\Local\Temp\0b7f31324c9b1d496a06fb286aa8e46aa97c94b6aab2617abe1510a8d389a8fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un014336.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un014336.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5632.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 10844⤵
- Program crash
PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7884.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 11044⤵
- Program crash
PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si941816.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si941816.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3636 -ip 36361⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4140 -ip 41401⤵PID:3972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f9d6322c9af04ac120a81a6be2057850
SHA1efe094605768e81d703b7ccd30ce7f443aa367df
SHA25699f70f6dde0e5422f87bf61cabd71dce748d7b4a9e35f249b1f9de132df32c4f
SHA512449a99e2515f28e2be9e5e40dc571dfe51451996494c1a526accfea11112748c1a3c0272b71ea8dfdf9555c64c3bf667c67ab22d2a7e6f9709c6b721e57a89b6
-
Filesize
175KB
MD5f9d6322c9af04ac120a81a6be2057850
SHA1efe094605768e81d703b7ccd30ce7f443aa367df
SHA25699f70f6dde0e5422f87bf61cabd71dce748d7b4a9e35f249b1f9de132df32c4f
SHA512449a99e2515f28e2be9e5e40dc571dfe51451996494c1a526accfea11112748c1a3c0272b71ea8dfdf9555c64c3bf667c67ab22d2a7e6f9709c6b721e57a89b6
-
Filesize
543KB
MD5e68eacbf98939c57d880a112336d662d
SHA1ab1de1590ce72c59da005cc131db3e345e9fa160
SHA256f1e9b53ae35e82e0cefb6104137c46090cd7c80b232cabe09e4b69559a19532c
SHA51279af2df7fba6fed33c574a54a2f2006e2cdcaa50fb4f3c0f61cb651cf2d5bdb6f63fbb6c763fab940ed591680034f7ce0bbccfd8df105e2008438586a77eaf38
-
Filesize
543KB
MD5e68eacbf98939c57d880a112336d662d
SHA1ab1de1590ce72c59da005cc131db3e345e9fa160
SHA256f1e9b53ae35e82e0cefb6104137c46090cd7c80b232cabe09e4b69559a19532c
SHA51279af2df7fba6fed33c574a54a2f2006e2cdcaa50fb4f3c0f61cb651cf2d5bdb6f63fbb6c763fab940ed591680034f7ce0bbccfd8df105e2008438586a77eaf38
-
Filesize
292KB
MD5fd522af8d190abf0a2adc1069f4b0cd4
SHA1023f7a45f5aad871e087ecf5ea319ea93614e883
SHA25646d0c464ec80824fb5cd57f2421deadd04bafe1e0d9fa8b7d268d1b4f9cef3b3
SHA51206d905352061be50e8fcdceecd421f20bb7ef5af645135607e08598a22f8258f4631edb8f35da81e83b87e39d1078b4f5eb6d41f428d6450d595c3a648ef7a59
-
Filesize
292KB
MD5fd522af8d190abf0a2adc1069f4b0cd4
SHA1023f7a45f5aad871e087ecf5ea319ea93614e883
SHA25646d0c464ec80824fb5cd57f2421deadd04bafe1e0d9fa8b7d268d1b4f9cef3b3
SHA51206d905352061be50e8fcdceecd421f20bb7ef5af645135607e08598a22f8258f4631edb8f35da81e83b87e39d1078b4f5eb6d41f428d6450d595c3a648ef7a59
-
Filesize
350KB
MD528772a9d487a7e8d048b7985f46e0f8b
SHA14206e69b1652ef30936bddf22201655ae1654d47
SHA256871bc012ade866c2532e631801efca3860827cb0f1cf2beacbc5aedaea903c88
SHA512c1f29c64cb9b4b53c344a487e872b270e468fad22a71130d056ed8871e6dfc09f3b1fdb837f83ab17548786a0451a7d2ecc9d2a0db09fa0b46f370aaa7f2cbd2
-
Filesize
350KB
MD528772a9d487a7e8d048b7985f46e0f8b
SHA14206e69b1652ef30936bddf22201655ae1654d47
SHA256871bc012ade866c2532e631801efca3860827cb0f1cf2beacbc5aedaea903c88
SHA512c1f29c64cb9b4b53c344a487e872b270e468fad22a71130d056ed8871e6dfc09f3b1fdb837f83ab17548786a0451a7d2ecc9d2a0db09fa0b46f370aaa7f2cbd2