Analysis
-
max time kernel
82s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:33
Static task
static1
Behavioral task
behavioral1
Sample
ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe
Resource
win10v2004-20230221-en
General
-
Target
ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe
-
Size
685KB
-
MD5
ced5a33995353bf952bf75ba999c3dbd
-
SHA1
281d0c51f5e8b0000726f151410a6044652dd785
-
SHA256
ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17
-
SHA512
e41c4aecc72941aaa4777fb2fa26185686a05caf7a1efc20fb2bd52b10787bede2f2d678c691d8b85c5665fd10997e85b754ed36f648f840c2af7ea281a3a9fd
-
SSDEEP
12288:YMrWy90A6ON9DVb4GUdYe6bYPWsQ8BCDZScDZVdlC7PR7BgVDEGWZlHuNsPW3zgw:OyJVK1YJbsWHZdScDZVXCzJSVDEHP2n
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7362.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7362.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2444-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-214-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-213-0x0000000004D80000-0x0000000004D90000-memory.dmp family_redline behavioral1/memory/2444-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-218-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-220-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-222-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-224-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-226-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/2444-228-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4512 un122277.exe 4908 pro7362.exe 2444 qu1418.exe 4908 si185660.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7362.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un122277.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un122277.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2916 4908 WerFault.exe 86 1792 2444 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4908 pro7362.exe 4908 pro7362.exe 2444 qu1418.exe 2444 qu1418.exe 4908 si185660.exe 4908 si185660.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4908 pro7362.exe Token: SeDebugPrivilege 2444 qu1418.exe Token: SeDebugPrivilege 4908 si185660.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4512 4656 ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe 85 PID 4656 wrote to memory of 4512 4656 ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe 85 PID 4656 wrote to memory of 4512 4656 ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe 85 PID 4512 wrote to memory of 4908 4512 un122277.exe 86 PID 4512 wrote to memory of 4908 4512 un122277.exe 86 PID 4512 wrote to memory of 4908 4512 un122277.exe 86 PID 4512 wrote to memory of 2444 4512 un122277.exe 95 PID 4512 wrote to memory of 2444 4512 un122277.exe 95 PID 4512 wrote to memory of 2444 4512 un122277.exe 95 PID 4656 wrote to memory of 4908 4656 ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe 99 PID 4656 wrote to memory of 4908 4656 ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe 99 PID 4656 wrote to memory of 4908 4656 ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe"C:\Users\Admin\AppData\Local\Temp\ffbd9b01e5fa35d283f1839e22b59332eff62e8dfda8b93cdfdd41e54e5b4b17.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un122277.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un122277.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7362.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7362.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 10844⤵
- Program crash
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1418.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 9964⤵
- Program crash
PID:1792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si185660.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si185660.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4908 -ip 49081⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2444 -ip 24441⤵PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb3244bb4a2a10af9ade440e2e28946e
SHA1fb1f288b4216101c7cdbf5d41e044e040f92d576
SHA2563a4224e99de1c734fa1427cec0306c20abb045567a449de21962cc461e4b7d9c
SHA5120fe4ae747cccfffde69deadd3b8c974c0b9a3e2cf5124707e4ea4191ba15ae36efb5c319f9fc95c545f1fda60ff069f8dcae36e33f5e82578ff30d35fbdcb5f2
-
Filesize
175KB
MD5fb3244bb4a2a10af9ade440e2e28946e
SHA1fb1f288b4216101c7cdbf5d41e044e040f92d576
SHA2563a4224e99de1c734fa1427cec0306c20abb045567a449de21962cc461e4b7d9c
SHA5120fe4ae747cccfffde69deadd3b8c974c0b9a3e2cf5124707e4ea4191ba15ae36efb5c319f9fc95c545f1fda60ff069f8dcae36e33f5e82578ff30d35fbdcb5f2
-
Filesize
543KB
MD54cb2925788fe7a4e68082b242749c4de
SHA15d4336a871a46d2736e7f7c2d1ccb071072afe49
SHA2566347de72d6c325e549d7f0c98e8adbf623a290df5854cbcb31212d7a8c7475c9
SHA51259df004cbef38d7fdb3c60259c611c9569a06c8a6ea0556049469ca6b05d81fe5723e31151a8adace30658f7372ed68376005f57ae15921dbacb6ebbd83ec0a0
-
Filesize
543KB
MD54cb2925788fe7a4e68082b242749c4de
SHA15d4336a871a46d2736e7f7c2d1ccb071072afe49
SHA2566347de72d6c325e549d7f0c98e8adbf623a290df5854cbcb31212d7a8c7475c9
SHA51259df004cbef38d7fdb3c60259c611c9569a06c8a6ea0556049469ca6b05d81fe5723e31151a8adace30658f7372ed68376005f57ae15921dbacb6ebbd83ec0a0
-
Filesize
292KB
MD51754073d4a19989e25b6abcf32950416
SHA1902405f84b433b239569253bbc88a16843a9975b
SHA25628ee2236b6238a9d69f2ade3521acbbf03d20bd58929f30d91cac99f7ef89343
SHA512e78bc57f9d1c67f8df2f1992bab1ab879d6e170a93bad86832862f19dd588d0a9b53b866602977794d8bb1516c29e117011643fa522f0a0c2abbeda87b3a927b
-
Filesize
292KB
MD51754073d4a19989e25b6abcf32950416
SHA1902405f84b433b239569253bbc88a16843a9975b
SHA25628ee2236b6238a9d69f2ade3521acbbf03d20bd58929f30d91cac99f7ef89343
SHA512e78bc57f9d1c67f8df2f1992bab1ab879d6e170a93bad86832862f19dd588d0a9b53b866602977794d8bb1516c29e117011643fa522f0a0c2abbeda87b3a927b
-
Filesize
350KB
MD5d10aed75048848e4cabba4d119236654
SHA142ff54fa1ff321d2683fea5369ad3d0fc8ce4312
SHA2569abf0f6cb9e6f5475b032b9d7f69f09a2a8a7f8b9fbb70d8933173fe73ea54bd
SHA5122e53e6eebed5393344d1e094bb215d9ef58465102127d62c4c11c127a74889e1457777a52d722485fb7c6f23d959737802ac09cd22a9ddbb16ae3e47abd6254e
-
Filesize
350KB
MD5d10aed75048848e4cabba4d119236654
SHA142ff54fa1ff321d2683fea5369ad3d0fc8ce4312
SHA2569abf0f6cb9e6f5475b032b9d7f69f09a2a8a7f8b9fbb70d8933173fe73ea54bd
SHA5122e53e6eebed5393344d1e094bb215d9ef58465102127d62c4c11c127a74889e1457777a52d722485fb7c6f23d959737802ac09cd22a9ddbb16ae3e47abd6254e