Analysis
-
max time kernel
135s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:30
Static task
static1
Behavioral task
behavioral1
Sample
836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe
Resource
win10v2004-20230220-en
General
-
Target
836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe
-
Size
685KB
-
MD5
c7118b63ec3dc9d927ebeedf8dc6ee51
-
SHA1
c1e9b3f89b7930d7ce90e19f30932ecbae3544af
-
SHA256
836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323
-
SHA512
baf03d5d801ce1105864106ec63f4670ce395afb6d1f5cfaa3c1bf5d132baa94f2c842a79bc1dec003307194e614cb59ccf8c454cf181fe998ca55b66be81564
-
SSDEEP
12288:vMrRy90kGJhSLQIH7W9g3cuePV7lAVoJ8SkWwD4vxKh7BwaTEes41BX9d:yyoJsD75f27lAywWwEvxmiaTEeL
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7007.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4760-190-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-192-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-189-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-194-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-196-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-198-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-200-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-202-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-204-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-206-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-208-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-210-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-212-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-214-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-216-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-218-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-220-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-222-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4760-1110-0x00000000023B0000-0x00000000023C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 856 un515762.exe 4424 pro7007.exe 4760 qu1814.exe 3488 si762672.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7007.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un515762.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un515762.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 640 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3484 4424 WerFault.exe 85 4884 4760 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4424 pro7007.exe 4424 pro7007.exe 4760 qu1814.exe 4760 qu1814.exe 3488 si762672.exe 3488 si762672.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4424 pro7007.exe Token: SeDebugPrivilege 4760 qu1814.exe Token: SeDebugPrivilege 3488 si762672.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4784 wrote to memory of 856 4784 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe 84 PID 4784 wrote to memory of 856 4784 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe 84 PID 4784 wrote to memory of 856 4784 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe 84 PID 856 wrote to memory of 4424 856 un515762.exe 85 PID 856 wrote to memory of 4424 856 un515762.exe 85 PID 856 wrote to memory of 4424 856 un515762.exe 85 PID 856 wrote to memory of 4760 856 un515762.exe 91 PID 856 wrote to memory of 4760 856 un515762.exe 91 PID 856 wrote to memory of 4760 856 un515762.exe 91 PID 4784 wrote to memory of 3488 4784 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe 95 PID 4784 wrote to memory of 3488 4784 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe 95 PID 4784 wrote to memory of 3488 4784 836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe"C:\Users\Admin\AppData\Local\Temp\836c94243ef52ba133f26223a49c35d61ee4e28833568c47b1ef5051d5561323.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515762.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7007.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 10844⤵
- Program crash
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1814.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 17924⤵
- Program crash
PID:4884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si762672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si762672.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4424 -ip 44241⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4760 -ip 47601⤵PID:1552
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56dc69623c5db82d7d3805c6838393906
SHA19977ba29c70169e3095725f588966bf1bfbb0fcd
SHA256617476f2dd523ffb5daf5914cffdf2644c33834cbe0e5367d746f1049b055e0e
SHA512e993884f20f45d20002b4d04a8b2b8936f6536d9f880c3db8014af6341139c689d334b683a20c66ed35e70b99f2bb8de8627f618e4d957d3ce84986640b9b73f
-
Filesize
175KB
MD56dc69623c5db82d7d3805c6838393906
SHA19977ba29c70169e3095725f588966bf1bfbb0fcd
SHA256617476f2dd523ffb5daf5914cffdf2644c33834cbe0e5367d746f1049b055e0e
SHA512e993884f20f45d20002b4d04a8b2b8936f6536d9f880c3db8014af6341139c689d334b683a20c66ed35e70b99f2bb8de8627f618e4d957d3ce84986640b9b73f
-
Filesize
543KB
MD523a8ae2a86a89e40cfb2b5ff3e689e69
SHA15e8cd0bc8cb40f4c953daa5fc1117494140f531c
SHA25640fe79f152f17e403e864b98ab78a455f4bf7ebbe38e6a17750d6217ab6e3e11
SHA51253c2543dd77ba5049e37595589b74085e9b812b143a58f02226d3d986428ff08dd2608df8f74ba83034947e0964ae4ad6529dcfa63616e91f2cdcd7d00df97a9
-
Filesize
543KB
MD523a8ae2a86a89e40cfb2b5ff3e689e69
SHA15e8cd0bc8cb40f4c953daa5fc1117494140f531c
SHA25640fe79f152f17e403e864b98ab78a455f4bf7ebbe38e6a17750d6217ab6e3e11
SHA51253c2543dd77ba5049e37595589b74085e9b812b143a58f02226d3d986428ff08dd2608df8f74ba83034947e0964ae4ad6529dcfa63616e91f2cdcd7d00df97a9
-
Filesize
292KB
MD57e5a9fada50fbb89355e09865d234f8a
SHA1db8f6c00ca8b82d9264b72af41c46834d362181f
SHA256565f3fde779c36310bdad6103f14323658d84ed8f027ce8f9da9353fb40de9ae
SHA512af8f9bd1ddd7cf52389fb59d9a6d345172bc6b3e4968517bb231d1fa9cc5e634e8537bcdb3c3e7d7e50d10ba96b23634dfc7395ec8ea3732e550242405cd74e4
-
Filesize
292KB
MD57e5a9fada50fbb89355e09865d234f8a
SHA1db8f6c00ca8b82d9264b72af41c46834d362181f
SHA256565f3fde779c36310bdad6103f14323658d84ed8f027ce8f9da9353fb40de9ae
SHA512af8f9bd1ddd7cf52389fb59d9a6d345172bc6b3e4968517bb231d1fa9cc5e634e8537bcdb3c3e7d7e50d10ba96b23634dfc7395ec8ea3732e550242405cd74e4
-
Filesize
350KB
MD5dd234a8fdee991fda9986574b63ad1ca
SHA1d6250d7fba67512bc2e251540722fb6f115ca12f
SHA2563b2add90e9adde10c4151194547127f496cc941f3e640934d9bc9b22c6d6b126
SHA5120d345008c4bab2f84ed82c3833c37525047b071fc90267008957c9307e100e7865bf2a0ee707de87a9c674fc863888ff104f7f1f150c2d26f3b19eb227f18dfa
-
Filesize
350KB
MD5dd234a8fdee991fda9986574b63ad1ca
SHA1d6250d7fba67512bc2e251540722fb6f115ca12f
SHA2563b2add90e9adde10c4151194547127f496cc941f3e640934d9bc9b22c6d6b126
SHA5120d345008c4bab2f84ed82c3833c37525047b071fc90267008957c9307e100e7865bf2a0ee707de87a9c674fc863888ff104f7f1f150c2d26f3b19eb227f18dfa