Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:31
Static task
static1
Behavioral task
behavioral1
Sample
185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe
Resource
win10v2004-20230220-en
General
-
Target
185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe
-
Size
682KB
-
MD5
e47967be40afcc6d7fd71d2c26b5cee2
-
SHA1
807dfee1d294f6031d04f6d1ee7ea473a2eae2d6
-
SHA256
185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4
-
SHA512
845b18eb318ed4b18cbce4951fbc22a778b116bffff942d179006bb05af41e9eadc8c8e18d0f82535b84276b6da9e10f3d71397484d635f99a36d14687d93616
-
SSDEEP
12288:mK7KRc/2qg5H3fNrHqZ99foYUtoBsaUleNc8EfSzAON8ymWJtMsOYyBu:RmI2tH3fBHqZnfoYUt4rUleNECGy54bB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr806405.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3856-159-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-160-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-162-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-164-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-166-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-168-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-170-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-172-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-174-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-176-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-181-0x00000000025A0000-0x00000000025B0000-memory.dmp family_redline behavioral1/memory/3856-180-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-183-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-185-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-187-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-189-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-191-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-193-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-195-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-197-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-199-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-201-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-203-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-207-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-205-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-211-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-209-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-213-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-215-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-217-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-219-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-221-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3856-223-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1332 zieN6673.exe 4144 jr806405.exe 3856 ku081645.exe 880 lr730710.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr806405.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieN6673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieN6673.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2672 3856 WerFault.exe 87 1456 4400 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4144 jr806405.exe 4144 jr806405.exe 3856 ku081645.exe 3856 ku081645.exe 880 lr730710.exe 880 lr730710.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4144 jr806405.exe Token: SeDebugPrivilege 3856 ku081645.exe Token: SeDebugPrivilege 880 lr730710.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1332 4400 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe 85 PID 4400 wrote to memory of 1332 4400 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe 85 PID 4400 wrote to memory of 1332 4400 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe 85 PID 1332 wrote to memory of 4144 1332 zieN6673.exe 86 PID 1332 wrote to memory of 4144 1332 zieN6673.exe 86 PID 1332 wrote to memory of 3856 1332 zieN6673.exe 87 PID 1332 wrote to memory of 3856 1332 zieN6673.exe 87 PID 1332 wrote to memory of 3856 1332 zieN6673.exe 87 PID 4400 wrote to memory of 880 4400 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe 91 PID 4400 wrote to memory of 880 4400 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe 91 PID 4400 wrote to memory of 880 4400 185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe"C:\Users\Admin\AppData\Local\Temp\185e9a0db2e74a635afc870f4af8f5d1e09d3b3e6f3d909875becb93292ec8b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 17444⤵
- Program crash
PID:2672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 4842⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3856 -ip 38561⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4400 -ip 44001⤵PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd