Analysis
-
max time kernel
85s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:37
Static task
static1
Behavioral task
behavioral1
Sample
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe
Resource
win10v2004-20230220-en
General
-
Target
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe
-
Size
700KB
-
MD5
f1c16aa5c55ec117d98707f82e6b7e4a
-
SHA1
db3fde46739a664ad211c7f484f9ef61d970dbd4
-
SHA256
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050
-
SHA512
28626164ed74ef2e7bff04b3064e464172913b66218c8411bc531453e649b808c1e182f8a4a219df9a4e75713d988bfd53e17dc631bcc5ff0b52d8b42cc59276
-
SSDEEP
12288:MMrWy90AEFAka7oxJgOC9EOFYj+cm+4LBRvrllO5kLWScaoh:6yzEMozg79zWj+cB4LVlO5kLWJaC
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7509.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7509.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4552-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-195-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-226-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4552-228-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 856 un760132.exe 1424 pro7509.exe 4552 qu2971.exe 4860 si668588.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7509.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un760132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un760132.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4432 1424 WerFault.exe 85 3380 4552 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1424 pro7509.exe 1424 pro7509.exe 4552 qu2971.exe 4552 qu2971.exe 4860 si668588.exe 4860 si668588.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1424 pro7509.exe Token: SeDebugPrivilege 4552 qu2971.exe Token: SeDebugPrivilege 4860 si668588.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3736 wrote to memory of 856 3736 e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe 84 PID 3736 wrote to memory of 856 3736 e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe 84 PID 3736 wrote to memory of 856 3736 e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe 84 PID 856 wrote to memory of 1424 856 un760132.exe 85 PID 856 wrote to memory of 1424 856 un760132.exe 85 PID 856 wrote to memory of 1424 856 un760132.exe 85 PID 856 wrote to memory of 4552 856 un760132.exe 91 PID 856 wrote to memory of 4552 856 un760132.exe 91 PID 856 wrote to memory of 4552 856 un760132.exe 91 PID 3736 wrote to memory of 4860 3736 e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe 94 PID 3736 wrote to memory of 4860 3736 e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe 94 PID 3736 wrote to memory of 4860 3736 e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe"C:\Users\Admin\AppData\Local\Temp\e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760132.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7509.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7509.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 10844⤵
- Program crash
PID:4432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2971.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2971.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 17124⤵
- Program crash
PID:3380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si668588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si668588.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 14241⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 45521⤵PID:3956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cac20b2f17675161d904b1eceb1d58f8
SHA1165eb622fe1d6fa15b24efbde4fbac1eac2b6bc1
SHA256294c454c84143ede5d8563ad07911c35e51f797c653c51552559cac4986eb6a4
SHA51274b8a99f047b4984c8f02c0ce6bccbe87102198d1fc45018f454fc6cb9e778783c93d93ec80347ff8f8f01da64994f04288ff0f178eaeba027f3336630e351b8
-
Filesize
175KB
MD5cac20b2f17675161d904b1eceb1d58f8
SHA1165eb622fe1d6fa15b24efbde4fbac1eac2b6bc1
SHA256294c454c84143ede5d8563ad07911c35e51f797c653c51552559cac4986eb6a4
SHA51274b8a99f047b4984c8f02c0ce6bccbe87102198d1fc45018f454fc6cb9e778783c93d93ec80347ff8f8f01da64994f04288ff0f178eaeba027f3336630e351b8
-
Filesize
558KB
MD5c90fafba75fea619e786feed31ab1606
SHA1b56fd5e42a2a1c257db7ba89e5e713cc27047343
SHA25634bec5631110a6b984b434e1b694884cf73f140c9df6a0cd09a10a6c6ba3ce8b
SHA51210af53a1a5cf099b990519f4ed7d7d8a46c1cb9d01a0d7bbde098e1bc5939aef70c7d33255ab6bd9c794482db296b853278453d1ccf1b04c0c75cbd1c6c592f5
-
Filesize
558KB
MD5c90fafba75fea619e786feed31ab1606
SHA1b56fd5e42a2a1c257db7ba89e5e713cc27047343
SHA25634bec5631110a6b984b434e1b694884cf73f140c9df6a0cd09a10a6c6ba3ce8b
SHA51210af53a1a5cf099b990519f4ed7d7d8a46c1cb9d01a0d7bbde098e1bc5939aef70c7d33255ab6bd9c794482db296b853278453d1ccf1b04c0c75cbd1c6c592f5
-
Filesize
308KB
MD5c3ad64b27c6c1736fc67a222ff589365
SHA14ecb4abe988cc0b8cfde4c23353784eeaad8d308
SHA2561f0d9a1d44d521894b1f8786dffb72d8f33b119e61841b11955542c1ce36285b
SHA51295bba1ccbd9d769026faa0e3eaed3b6051a5a424b75bbecf64c257ba75b03e8076e86873a8029da4f736defe6f3fa6c6eaf954e6ef95af060cc340106d7e0d0b
-
Filesize
308KB
MD5c3ad64b27c6c1736fc67a222ff589365
SHA14ecb4abe988cc0b8cfde4c23353784eeaad8d308
SHA2561f0d9a1d44d521894b1f8786dffb72d8f33b119e61841b11955542c1ce36285b
SHA51295bba1ccbd9d769026faa0e3eaed3b6051a5a424b75bbecf64c257ba75b03e8076e86873a8029da4f736defe6f3fa6c6eaf954e6ef95af060cc340106d7e0d0b
-
Filesize
366KB
MD55ad97f923d1a87e2c92c1ac00f429620
SHA1ef58b86aa61002bed07532fb1517c14665da85af
SHA256ce7edcf0d620cde4be8a2d1345044c059b3df3348a0bf6224f298f9b2f692402
SHA512ff24d30acf431acc94b596655d9d688c89e9c2db14dc1e7f675a3b16dd6224d2383be5382d955e1cba3cb96cbf90b80ff6b927fe84a9cfe684d4c130d5889a9b
-
Filesize
366KB
MD55ad97f923d1a87e2c92c1ac00f429620
SHA1ef58b86aa61002bed07532fb1517c14665da85af
SHA256ce7edcf0d620cde4be8a2d1345044c059b3df3348a0bf6224f298f9b2f692402
SHA512ff24d30acf431acc94b596655d9d688c89e9c2db14dc1e7f675a3b16dd6224d2383be5382d955e1cba3cb96cbf90b80ff6b927fe84a9cfe684d4c130d5889a9b