Analysis
-
max time kernel
50s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 14:35
Static task
static1
Behavioral task
behavioral1
Sample
5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe
Resource
win10-20230220-en
General
-
Target
5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe
-
Size
685KB
-
MD5
f650cfcfd7eb78e8559a58c02a82cd27
-
SHA1
467bca90ba8486da5b2c7e687863d881d5fd0229
-
SHA256
5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c
-
SHA512
bfcc2b349aab647b5a5164f89b43b6cc7b7dfa42e7dbe7307ce345f030cd19d11b8b2c6b58e4006f3731604b59ded883f9b4f9d181431a143642d907b1bd3b34
-
SSDEEP
12288:3MrSy90GpymuAtp6i7qv7mL8JSkKrf9PG0L4makxF2BPpSEAUuEQxbwmCPK:RyVt0eeizM0V7YNpSEAJvxbwPK
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4998.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4400-178-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/4400-179-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/4400-181-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-180-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-183-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-185-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-187-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-189-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-191-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-193-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-195-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-197-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-199-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-201-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-203-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-205-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-207-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-211-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-215-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4400-217-0x0000000002750000-0x000000000278E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2328 un528454.exe 2572 pro4998.exe 4400 qu3591.exe 2848 si904967.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4998.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4998.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un528454.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un528454.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2572 pro4998.exe 2572 pro4998.exe 4400 qu3591.exe 4400 qu3591.exe 2848 si904967.exe 2848 si904967.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2572 pro4998.exe Token: SeDebugPrivilege 4400 qu3591.exe Token: SeDebugPrivilege 2848 si904967.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2328 2076 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe 66 PID 2076 wrote to memory of 2328 2076 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe 66 PID 2076 wrote to memory of 2328 2076 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe 66 PID 2328 wrote to memory of 2572 2328 un528454.exe 67 PID 2328 wrote to memory of 2572 2328 un528454.exe 67 PID 2328 wrote to memory of 2572 2328 un528454.exe 67 PID 2328 wrote to memory of 4400 2328 un528454.exe 68 PID 2328 wrote to memory of 4400 2328 un528454.exe 68 PID 2328 wrote to memory of 4400 2328 un528454.exe 68 PID 2076 wrote to memory of 2848 2076 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe 70 PID 2076 wrote to memory of 2848 2076 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe 70 PID 2076 wrote to memory of 2848 2076 5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe"C:\Users\Admin\AppData\Local\Temp\5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528454.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4998.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4998.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3591.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3591.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si904967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si904967.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58e39d93cc15b1c63746ae755693b52f2
SHA1c5f24086b3e71a6c35eb89acac0d1fc13b3fa0a9
SHA256ccc07487bd040aecac3420ef82b0e0497959423b83574d19e00bb0b6aa6ccfed
SHA5126b4107ed476d3d04dcb73a4307f4edfd904b4cf6266714218c90bb69a5e06a69a073a73c10498c0c6c445902333297485cd1956dff827df4b562a10d8b0df568
-
Filesize
175KB
MD58e39d93cc15b1c63746ae755693b52f2
SHA1c5f24086b3e71a6c35eb89acac0d1fc13b3fa0a9
SHA256ccc07487bd040aecac3420ef82b0e0497959423b83574d19e00bb0b6aa6ccfed
SHA5126b4107ed476d3d04dcb73a4307f4edfd904b4cf6266714218c90bb69a5e06a69a073a73c10498c0c6c445902333297485cd1956dff827df4b562a10d8b0df568
-
Filesize
543KB
MD5b33ff468d6e28f01aa803c0aa2724bf7
SHA1bc05817b5a7599f8bd54baf498ee85e6f4a0d79d
SHA256703975d2a62f264c47e4e77ae4d3c71f0594a5033f4a07a72aa47ee8dee1c1a5
SHA5126c8d6924344ee0a4c96b6aeb5038e2ab4a6ce45bedde9751d77031dc3b47f62216354fa55ca268ff2eeeac22d42d19f022fc7e6bb0b29d44e94103d0a7418b44
-
Filesize
543KB
MD5b33ff468d6e28f01aa803c0aa2724bf7
SHA1bc05817b5a7599f8bd54baf498ee85e6f4a0d79d
SHA256703975d2a62f264c47e4e77ae4d3c71f0594a5033f4a07a72aa47ee8dee1c1a5
SHA5126c8d6924344ee0a4c96b6aeb5038e2ab4a6ce45bedde9751d77031dc3b47f62216354fa55ca268ff2eeeac22d42d19f022fc7e6bb0b29d44e94103d0a7418b44
-
Filesize
292KB
MD50d75b0237daabe9b26b5473a7329db33
SHA167d1931de01721fc2e2f72352a08e9452575ce53
SHA25638edcc5c4b6e8d88d2b15f33e5afe009a7bbebeffbd52097d97bf6ab766e1edb
SHA51253354761c1e18ef5d71452892de088073f06f5fba89bc0dd9887d191ed248f7d504a848b92bb6f92fa1f73ec877ab1fd6008197d407eaa0f20a41de0cb27a232
-
Filesize
292KB
MD50d75b0237daabe9b26b5473a7329db33
SHA167d1931de01721fc2e2f72352a08e9452575ce53
SHA25638edcc5c4b6e8d88d2b15f33e5afe009a7bbebeffbd52097d97bf6ab766e1edb
SHA51253354761c1e18ef5d71452892de088073f06f5fba89bc0dd9887d191ed248f7d504a848b92bb6f92fa1f73ec877ab1fd6008197d407eaa0f20a41de0cb27a232
-
Filesize
350KB
MD520c514ab5c80c5776f61831f1c31d6ba
SHA144388155d74081bd1ceefd36c5d9271cf25d638d
SHA25670273e97f5fd8c895442fc717da6a6b1c4ca49e70bb98d028eec8b2e0d81c479
SHA5121b29e05ae363d1cd8a663129d3f236cdfdd469c885fc3f4d6fbef739dd1495dd3cf16aff910a49fa4a887d3f17ebe746620756dc0f2b1879f9256fc0e2ed66e6
-
Filesize
350KB
MD520c514ab5c80c5776f61831f1c31d6ba
SHA144388155d74081bd1ceefd36c5d9271cf25d638d
SHA25670273e97f5fd8c895442fc717da6a6b1c4ca49e70bb98d028eec8b2e0d81c479
SHA5121b29e05ae363d1cd8a663129d3f236cdfdd469c885fc3f4d6fbef739dd1495dd3cf16aff910a49fa4a887d3f17ebe746620756dc0f2b1879f9256fc0e2ed66e6