Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:36
Static task
static1
Behavioral task
behavioral1
Sample
17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe
Resource
win10v2004-20230221-en
General
-
Target
17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe
-
Size
685KB
-
MD5
1997fdc45a4bc939df03dae80e794462
-
SHA1
26ebfebacd4e81ba9eee827b37ded1caf0bbaba9
-
SHA256
17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee
-
SHA512
4d70f5108ba1d0263f956c3b7f81e6031449fce482107f8ad22872fccd1db299c54231e4543d661fac6086d4175e25b46dac3cb4ba889318e81b16f4588386f1
-
SSDEEP
12288:VMryy90NeWIT2FFnoh+BlNoop8SsWSJ4tNexF7Bud6EJXnOzlCISX2:3yjUFo4BlNjoWSafAUd6EhOzYIj
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2506.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2506.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2700-195-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-198-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-196-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-200-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-202-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-204-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-206-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-208-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-210-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-212-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-214-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-216-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-218-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-220-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-222-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-224-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-226-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/2700-228-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4228 un474895.exe 1904 pro2506.exe 2700 qu3606.exe 2892 si402383.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2506.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un474895.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un474895.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3220 1904 WerFault.exe 86 956 2700 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1904 pro2506.exe 1904 pro2506.exe 2700 qu3606.exe 2700 qu3606.exe 2892 si402383.exe 2892 si402383.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1904 pro2506.exe Token: SeDebugPrivilege 2700 qu3606.exe Token: SeDebugPrivilege 2892 si402383.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4228 3100 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe 85 PID 3100 wrote to memory of 4228 3100 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe 85 PID 3100 wrote to memory of 4228 3100 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe 85 PID 4228 wrote to memory of 1904 4228 un474895.exe 86 PID 4228 wrote to memory of 1904 4228 un474895.exe 86 PID 4228 wrote to memory of 1904 4228 un474895.exe 86 PID 4228 wrote to memory of 2700 4228 un474895.exe 92 PID 4228 wrote to memory of 2700 4228 un474895.exe 92 PID 4228 wrote to memory of 2700 4228 un474895.exe 92 PID 3100 wrote to memory of 2892 3100 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe 95 PID 3100 wrote to memory of 2892 3100 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe 95 PID 3100 wrote to memory of 2892 3100 17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe"C:\Users\Admin\AppData\Local\Temp\17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474895.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474895.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2506.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 10844⤵
- Program crash
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3606.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 17444⤵
- Program crash
PID:956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402383.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1904 -ip 19041⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2700 -ip 27001⤵PID:1196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD562dcc9a94bdc2fde1b3d9a21c08b1917
SHA15a8bafa057eaa555bd3166044ba9621879d2e8a6
SHA256e1436c9221c24f05a0e96582e0380ba7e96a69eb3e55030fec206ba927f11c8a
SHA512940bf7aefa41e09ae7d47e783d8a2a81397a0281d39389bf5f7c876003c6f0820fcb5ac20c6c4fd84ce7e7dcfcb2f7c9fb815002da71c55b35a7e1cc0a1ea778
-
Filesize
175KB
MD562dcc9a94bdc2fde1b3d9a21c08b1917
SHA15a8bafa057eaa555bd3166044ba9621879d2e8a6
SHA256e1436c9221c24f05a0e96582e0380ba7e96a69eb3e55030fec206ba927f11c8a
SHA512940bf7aefa41e09ae7d47e783d8a2a81397a0281d39389bf5f7c876003c6f0820fcb5ac20c6c4fd84ce7e7dcfcb2f7c9fb815002da71c55b35a7e1cc0a1ea778
-
Filesize
543KB
MD5fbf0aafbbf0262ec85ec03b1ee5d41a6
SHA1ff45629dd90fcfac4bd0d9f6fcade75da61c2b82
SHA2566b5b5e6e141378de2fb9cc97624a8ac3a81c8ab28400eb71e30cf6d39401eda0
SHA512b9262fa1e63a19ced735abd0413a8497e7874280fb40a21057107a510c516f74440161bfedd6f15238c279761a063a88ca5ba5d962f965aca9de34bea8340502
-
Filesize
543KB
MD5fbf0aafbbf0262ec85ec03b1ee5d41a6
SHA1ff45629dd90fcfac4bd0d9f6fcade75da61c2b82
SHA2566b5b5e6e141378de2fb9cc97624a8ac3a81c8ab28400eb71e30cf6d39401eda0
SHA512b9262fa1e63a19ced735abd0413a8497e7874280fb40a21057107a510c516f74440161bfedd6f15238c279761a063a88ca5ba5d962f965aca9de34bea8340502
-
Filesize
292KB
MD52150011b64d3ca2c417a0e1dcc900535
SHA17b88d2a6022ce5405b34d00fda437871f4bed7ca
SHA256e746984c5934c2ceeac66bdce8f13a81a7c6e051a51668e724e6b19c4f29569e
SHA5129d49b45ded82da6c3bb972934753b7dea285747522fe96ce5fd23cab770e298bb4631b867a49982078624f9968e18c7ca115405b2a106c60ae174462f090de12
-
Filesize
292KB
MD52150011b64d3ca2c417a0e1dcc900535
SHA17b88d2a6022ce5405b34d00fda437871f4bed7ca
SHA256e746984c5934c2ceeac66bdce8f13a81a7c6e051a51668e724e6b19c4f29569e
SHA5129d49b45ded82da6c3bb972934753b7dea285747522fe96ce5fd23cab770e298bb4631b867a49982078624f9968e18c7ca115405b2a106c60ae174462f090de12
-
Filesize
350KB
MD51ead7dc1c4434af7d8057b1f3c02af72
SHA15b72f1c3f3231ec07c961f1ee0d081cb95f32a1f
SHA25673aa418ca82c5f0608c1c9768cf7abbeb530a1cadb0afba1bdf735a79b56973d
SHA5127292dcb1dd0c299652f37544fde91055245604a7333dddf6390b5c2a1e133449cf21d6e763ec68b40ebeed09d3ed1e95963de5b3ee710fb6031726e81c97da4c
-
Filesize
350KB
MD51ead7dc1c4434af7d8057b1f3c02af72
SHA15b72f1c3f3231ec07c961f1ee0d081cb95f32a1f
SHA25673aa418ca82c5f0608c1c9768cf7abbeb530a1cadb0afba1bdf735a79b56973d
SHA5127292dcb1dd0c299652f37544fde91055245604a7333dddf6390b5c2a1e133449cf21d6e763ec68b40ebeed09d3ed1e95963de5b3ee710fb6031726e81c97da4c