Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:39
Static task
static1
Behavioral task
behavioral1
Sample
aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe
Resource
win10v2004-20230220-en
General
-
Target
aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe
-
Size
701KB
-
MD5
e01591c3a9aed43001ce521b4c3e9a99
-
SHA1
9718f87249ec21e0ec8e0cfe6d6d906e2ce24b9b
-
SHA256
aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814
-
SHA512
dd63efd383e7778f8036d12249c6adb85d96f5a2ec39734a6a6ddfdb2a1d4238eb0d4747f7cd616fb99340f6c0f8c3ae9886abac5b8a01dd041e8b630ea1eee5
-
SSDEEP
12288:WMrmy90oF0Zt99gamgHqueRpNijA4mOHdggGQIuV//BAEQiMQ5T7BRvyikryKQZT:AyLKZtw17NijA2HOgGu3BAEQiVh7cryJ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4416.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4416.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4344-194-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-195-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-197-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-199-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-201-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-203-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-207-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-205-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-209-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-211-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-215-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-213-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-217-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-219-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-221-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-223-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-225-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline behavioral1/memory/4344-227-0x00000000029E0000-0x0000000002A1E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3624 un011911.exe 3132 pro4416.exe 4344 qu4265.exe 4792 si173865.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4416.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4416.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un011911.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un011911.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1676 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4568 3132 WerFault.exe 84 4632 4344 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3132 pro4416.exe 3132 pro4416.exe 4344 qu4265.exe 4344 qu4265.exe 4792 si173865.exe 4792 si173865.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3132 pro4416.exe Token: SeDebugPrivilege 4344 qu4265.exe Token: SeDebugPrivilege 4792 si173865.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3388 wrote to memory of 3624 3388 aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe 83 PID 3388 wrote to memory of 3624 3388 aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe 83 PID 3388 wrote to memory of 3624 3388 aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe 83 PID 3624 wrote to memory of 3132 3624 un011911.exe 84 PID 3624 wrote to memory of 3132 3624 un011911.exe 84 PID 3624 wrote to memory of 3132 3624 un011911.exe 84 PID 3624 wrote to memory of 4344 3624 un011911.exe 90 PID 3624 wrote to memory of 4344 3624 un011911.exe 90 PID 3624 wrote to memory of 4344 3624 un011911.exe 90 PID 3388 wrote to memory of 4792 3388 aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe 93 PID 3388 wrote to memory of 4792 3388 aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe 93 PID 3388 wrote to memory of 4792 3388 aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe"C:\Users\Admin\AppData\Local\Temp\aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011911.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4416.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4416.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10844⤵
- Program crash
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4265.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 17924⤵
- Program crash
PID:4632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si173865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si173865.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3132 -ip 31321⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4344 -ip 43441⤵PID:4408
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD545490597b0dbfd2c9eb82397bd685fbf
SHA1b5bde8795fac9f5562a287ea2352335958671e85
SHA256d89ffbe8fb2b6e897523e1af90d9145eb5db7a6da63e0c362941a68c13712fa5
SHA512a32907237948d4faa07dbc01599df829c9562f659eb76300553636963e64a198b382a0e65d9997fe160e75586b2f6e6e8426f6d51691aa447719591127624dd2
-
Filesize
175KB
MD545490597b0dbfd2c9eb82397bd685fbf
SHA1b5bde8795fac9f5562a287ea2352335958671e85
SHA256d89ffbe8fb2b6e897523e1af90d9145eb5db7a6da63e0c362941a68c13712fa5
SHA512a32907237948d4faa07dbc01599df829c9562f659eb76300553636963e64a198b382a0e65d9997fe160e75586b2f6e6e8426f6d51691aa447719591127624dd2
-
Filesize
558KB
MD58abfe1a74e5f71da855e224f5b976e3f
SHA1a3adf869eba7ccd5ae6191de8b7bcba1c5725d2a
SHA256932a5b790ef3c27316ec12315a2318ee56ce7c82b1fa26cf59458d30e6ed24d8
SHA512242fd1336c8252c2345f9f8c7405a4a6455fe55ae4ee059ea518e3d3c0a91932a2f89e7908a3c96585c12675bdf4c90eab823a447d48117d6a91d5019278cbea
-
Filesize
558KB
MD58abfe1a74e5f71da855e224f5b976e3f
SHA1a3adf869eba7ccd5ae6191de8b7bcba1c5725d2a
SHA256932a5b790ef3c27316ec12315a2318ee56ce7c82b1fa26cf59458d30e6ed24d8
SHA512242fd1336c8252c2345f9f8c7405a4a6455fe55ae4ee059ea518e3d3c0a91932a2f89e7908a3c96585c12675bdf4c90eab823a447d48117d6a91d5019278cbea
-
Filesize
308KB
MD533d5668292708d22f1aeef274a69f536
SHA1a08415b31bbc3b56a4eb385f11159e1295ad5745
SHA2569222edeaa8bba53acfa2f0bd7a8e0d5e8851275dfdc6049d3c20d890039841a3
SHA512db082673f5398366d36cc973f935ebc9ccb51dc08fb6cfac13af7e674606aa2acc77b74f011834ec807f788b86181a5b77e031f92b369adb2a22d618c609905e
-
Filesize
308KB
MD533d5668292708d22f1aeef274a69f536
SHA1a08415b31bbc3b56a4eb385f11159e1295ad5745
SHA2569222edeaa8bba53acfa2f0bd7a8e0d5e8851275dfdc6049d3c20d890039841a3
SHA512db082673f5398366d36cc973f935ebc9ccb51dc08fb6cfac13af7e674606aa2acc77b74f011834ec807f788b86181a5b77e031f92b369adb2a22d618c609905e
-
Filesize
366KB
MD58a33bf438fe1c9a4e7bad07751a5d7e8
SHA19db74aa9ffa4b26602f5a8db99b26fee3e0a0d3a
SHA2562ae6875c18933f0fe405c0b46db759cb88502927668bd854eca37c3c169c3d72
SHA51278d5437eba7b29ab1942c18ffb34b714f01ff8c3e80e7c72e2ca6ddcbb50f7125eeb25abdc5ad7b71de3898cd673a1d53c9367cfac7df553a4f6e3426dd806b3
-
Filesize
366KB
MD58a33bf438fe1c9a4e7bad07751a5d7e8
SHA19db74aa9ffa4b26602f5a8db99b26fee3e0a0d3a
SHA2562ae6875c18933f0fe405c0b46db759cb88502927668bd854eca37c3c169c3d72
SHA51278d5437eba7b29ab1942c18ffb34b714f01ff8c3e80e7c72e2ca6ddcbb50f7125eeb25abdc5ad7b71de3898cd673a1d53c9367cfac7df553a4f6e3426dd806b3