Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:31
Static task
static1
Behavioral task
behavioral1
Sample
800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe
Resource
win10v2004-20230220-en
General
-
Target
800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe
-
Size
685KB
-
MD5
f82eda0f3e5d9bfcb80ff1ab992f50c5
-
SHA1
22a3a350216a5482fa0a19f541bf341eec7870e1
-
SHA256
800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920
-
SHA512
bcbe050dc98b042b7546b14c144ec71e9cefa5dd068f7438de0f10a490d14d70ec7bd1a77b2eb4138113d5883a246cc922cbf7d3a4f1542cef31bdcd8197e010
-
SSDEEP
12288:/Mriy90k6J3v+DUXERhbEXJAkc3lqSL3v8nRRNAglWqlB0arE0XThDxAA:NyCf+wXERh4XOd3UFH7OarEEhD
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5477.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5477.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3900-191-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-190-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-193-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-195-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-197-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-199-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-201-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-203-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-205-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-207-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-209-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-211-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-213-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-215-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-217-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-219-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-221-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-223-0x00000000028A0000-0x00000000028DE000-memory.dmp family_redline behavioral1/memory/3900-1112-0x0000000004EF0000-0x0000000004F00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2152 un256619.exe 632 pro5477.exe 3900 qu9342.exe 3728 si593775.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5477.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un256619.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un256619.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2100 632 WerFault.exe 85 3276 3900 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 632 pro5477.exe 632 pro5477.exe 3900 qu9342.exe 3900 qu9342.exe 3728 si593775.exe 3728 si593775.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 632 pro5477.exe Token: SeDebugPrivilege 3900 qu9342.exe Token: SeDebugPrivilege 3728 si593775.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2152 4980 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe 84 PID 4980 wrote to memory of 2152 4980 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe 84 PID 4980 wrote to memory of 2152 4980 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe 84 PID 2152 wrote to memory of 632 2152 un256619.exe 85 PID 2152 wrote to memory of 632 2152 un256619.exe 85 PID 2152 wrote to memory of 632 2152 un256619.exe 85 PID 2152 wrote to memory of 3900 2152 un256619.exe 92 PID 2152 wrote to memory of 3900 2152 un256619.exe 92 PID 2152 wrote to memory of 3900 2152 un256619.exe 92 PID 4980 wrote to memory of 3728 4980 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe 95 PID 4980 wrote to memory of 3728 4980 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe 95 PID 4980 wrote to memory of 3728 4980 800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe"C:\Users\Admin\AppData\Local\Temp\800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un256619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un256619.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5477.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 10844⤵
- Program crash
PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9342.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 11804⤵
- Program crash
PID:3276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si593775.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si593775.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 632 -ip 6321⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 39001⤵PID:2184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5de42b31ecf33cf304b73f39f4105ded7
SHA123c6fbf540f850c1f5fb702f7708a6bf482ef2ea
SHA2564eade413a46ce86ec10920cf7b85cb79d46f608501a1dcef0ccd1f1e8762c9df
SHA5128e627213a3d19862fd4bb4c4ceb2ec779131a5cb3a41365055db85f7c388464f154675beff142ff329e5902e9a859ab4c3a1da1499a0a1097c600b1ec407ddc4
-
Filesize
175KB
MD5de42b31ecf33cf304b73f39f4105ded7
SHA123c6fbf540f850c1f5fb702f7708a6bf482ef2ea
SHA2564eade413a46ce86ec10920cf7b85cb79d46f608501a1dcef0ccd1f1e8762c9df
SHA5128e627213a3d19862fd4bb4c4ceb2ec779131a5cb3a41365055db85f7c388464f154675beff142ff329e5902e9a859ab4c3a1da1499a0a1097c600b1ec407ddc4
-
Filesize
543KB
MD5ffd0ab068a373865fb70f27cf4491206
SHA15a166326bf87dac72ba57d5fdf768ba236d98858
SHA25661f283ee97281a9e6f7e1fb6ba81bd80fdff4fb70afeb002b423217edc3b7e04
SHA512992f5109e8f16ad0eab5650c2403688e502672aaf3242c83e3bbe62120f5a0ae6853db9e6fec38ef496aef5cc5704f0fbfed0218e5af3d5415b79210767de816
-
Filesize
543KB
MD5ffd0ab068a373865fb70f27cf4491206
SHA15a166326bf87dac72ba57d5fdf768ba236d98858
SHA25661f283ee97281a9e6f7e1fb6ba81bd80fdff4fb70afeb002b423217edc3b7e04
SHA512992f5109e8f16ad0eab5650c2403688e502672aaf3242c83e3bbe62120f5a0ae6853db9e6fec38ef496aef5cc5704f0fbfed0218e5af3d5415b79210767de816
-
Filesize
292KB
MD53bbc06e967039231521293af10c17437
SHA12b7c411625a6b970281fffe999daaf0bf592b189
SHA25637f1b120670e3683df5bd2e42fb94bc0e195f8bbcb09a4b61115cb1a42b2ef0b
SHA5123b074453b3f80dc3ac9dff78cd8220f45ace4039bbe187557824080be8d911bd20b850ba9cf97c1b0ed6d8b6b3456554fe2f7eef1ae23f5a167554c0b35100ce
-
Filesize
292KB
MD53bbc06e967039231521293af10c17437
SHA12b7c411625a6b970281fffe999daaf0bf592b189
SHA25637f1b120670e3683df5bd2e42fb94bc0e195f8bbcb09a4b61115cb1a42b2ef0b
SHA5123b074453b3f80dc3ac9dff78cd8220f45ace4039bbe187557824080be8d911bd20b850ba9cf97c1b0ed6d8b6b3456554fe2f7eef1ae23f5a167554c0b35100ce
-
Filesize
350KB
MD5ba39203dbd4b02231f31effc6cbc5761
SHA1fcae7dbdd96381fe4400108369c4a054703af55a
SHA256767dc899bcff2bb93c5dbfb66f64d202136c18b46ff850b30be7b74a93ebee38
SHA512ffcee2f5bcbcf851ff4807af6bafb67dbe8c1fc191ba0f3fa2c3eb79e968d00a8cd751486170f5f56c8a4545dc17d61ff884a475ad1979c8545e6330038bdf78
-
Filesize
350KB
MD5ba39203dbd4b02231f31effc6cbc5761
SHA1fcae7dbdd96381fe4400108369c4a054703af55a
SHA256767dc899bcff2bb93c5dbfb66f64d202136c18b46ff850b30be7b74a93ebee38
SHA512ffcee2f5bcbcf851ff4807af6bafb67dbe8c1fc191ba0f3fa2c3eb79e968d00a8cd751486170f5f56c8a4545dc17d61ff884a475ad1979c8545e6330038bdf78