Analysis
-
max time kernel
53s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 15:40
Static task
static1
Behavioral task
behavioral1
Sample
6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe
Resource
win10-20230220-en
General
-
Target
6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe
-
Size
701KB
-
MD5
feb5d63ab995af8b7df7b53a8bd07ff7
-
SHA1
d141af780f240ae779817424b2b5a5dcec5152da
-
SHA256
6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641
-
SHA512
f4aa0362f6e0dc9459c40daa48663c27f1f3114a9ce77980c71720475fdeff0ff59f578a3bbf21cc231814566cdaefa35870700890b7409d45f65929ae1cf0cb
-
SSDEEP
12288:PMrNy90lFBk+ZYajKxTzxNQl1n/VZnOqk4jrLKHjGH+H2zTBRv7u6Zpk:6yYBzGxTFkBVZnO6jrLYCXzTGQe
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5070.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3620-181-0x0000000004AD0000-0x0000000004B16000-memory.dmp family_redline behavioral1/memory/3620-184-0x0000000005190000-0x00000000051D4000-memory.dmp family_redline behavioral1/memory/3620-187-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-188-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-190-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-192-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-194-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-196-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-198-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-200-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-202-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-204-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-206-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-208-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-210-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-212-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-214-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-216-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-218-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3620-220-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3364 un733459.exe 4236 pro5070.exe 3620 qu1136.exe 1632 si004667.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5070.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un733459.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un733459.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4236 pro5070.exe 4236 pro5070.exe 3620 qu1136.exe 3620 qu1136.exe 1632 si004667.exe 1632 si004667.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4236 pro5070.exe Token: SeDebugPrivilege 3620 qu1136.exe Token: SeDebugPrivilege 1632 si004667.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3364 4044 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe 66 PID 4044 wrote to memory of 3364 4044 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe 66 PID 4044 wrote to memory of 3364 4044 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe 66 PID 3364 wrote to memory of 4236 3364 un733459.exe 67 PID 3364 wrote to memory of 4236 3364 un733459.exe 67 PID 3364 wrote to memory of 4236 3364 un733459.exe 67 PID 3364 wrote to memory of 3620 3364 un733459.exe 68 PID 3364 wrote to memory of 3620 3364 un733459.exe 68 PID 3364 wrote to memory of 3620 3364 un733459.exe 68 PID 4044 wrote to memory of 1632 4044 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe 70 PID 4044 wrote to memory of 1632 4044 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe 70 PID 4044 wrote to memory of 1632 4044 6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe"C:\Users\Admin\AppData\Local\Temp\6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733459.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733459.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5070.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1136.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004667.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004667.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5d755a640757b566b5420dd3e34a607
SHA18a23743d0856cb03aa934c19db54f4b859ef56e6
SHA256d77c63e0904826af0438497ca0eed6b0dd70fd0e31f428cca0b8fd8ffc5c291a
SHA512b335e99bd0910f80c61556b67e8e0839f012f8ece842e3defb55c8cbcf42d89993300c76648b834cefbab2b24e5d7c83f841032dfbe5876bae9a6dbf754cca45
-
Filesize
175KB
MD5a5d755a640757b566b5420dd3e34a607
SHA18a23743d0856cb03aa934c19db54f4b859ef56e6
SHA256d77c63e0904826af0438497ca0eed6b0dd70fd0e31f428cca0b8fd8ffc5c291a
SHA512b335e99bd0910f80c61556b67e8e0839f012f8ece842e3defb55c8cbcf42d89993300c76648b834cefbab2b24e5d7c83f841032dfbe5876bae9a6dbf754cca45
-
Filesize
558KB
MD51cc3831e9721945e4ac857f34d1bf3d5
SHA141ee9466c2b130456ca7a2cb4fa9b2e3d5b9fb61
SHA256f5e8e735c4f0de2727ea8469772cc2c4b01c843cb8e8ed9a83351504d02d10b8
SHA512f8064c3065f76d763e3de692cc9ecf8d8a10a72a6135c019070831e966f048117d1888701eecca1f30194ee071cc3ae52e0c5d13a8e8a057d011f30db2cebab3
-
Filesize
558KB
MD51cc3831e9721945e4ac857f34d1bf3d5
SHA141ee9466c2b130456ca7a2cb4fa9b2e3d5b9fb61
SHA256f5e8e735c4f0de2727ea8469772cc2c4b01c843cb8e8ed9a83351504d02d10b8
SHA512f8064c3065f76d763e3de692cc9ecf8d8a10a72a6135c019070831e966f048117d1888701eecca1f30194ee071cc3ae52e0c5d13a8e8a057d011f30db2cebab3
-
Filesize
308KB
MD577e574ee207940a9a6684c3607898f41
SHA1a35f4a2741b273f35e3b37619ec682af71abf3bc
SHA256af2811ff175f7ae75950539763d5912c37e296853671fd5760ec982362f24a7c
SHA5122cb4cc16c2c07a0625651b170d16a53d219735abdd6d9a5b8c42932b1962db6856888ba356b13b49841d9b16b02a0b31c661dcc5c242176b5a807f695e122c3f
-
Filesize
308KB
MD577e574ee207940a9a6684c3607898f41
SHA1a35f4a2741b273f35e3b37619ec682af71abf3bc
SHA256af2811ff175f7ae75950539763d5912c37e296853671fd5760ec982362f24a7c
SHA5122cb4cc16c2c07a0625651b170d16a53d219735abdd6d9a5b8c42932b1962db6856888ba356b13b49841d9b16b02a0b31c661dcc5c242176b5a807f695e122c3f
-
Filesize
366KB
MD5087a003d2d5c5059d3e4c502484488a0
SHA1003623db0090179179afc4fd37b6647476b23c9a
SHA256dffb6a7cd8646f4f3b21f13a03fef2b37c8f8fd2693f05bc9c27fc842b5f4f4e
SHA512c5abcf1d2078ee2d7832f11d17ed566f06f4bb712c684e58bba0a85ec103ddd0f5b6fd2dc52c210682414081dcc4c74ac2dd0986f1ca3014002d6ba5e889827a
-
Filesize
366KB
MD5087a003d2d5c5059d3e4c502484488a0
SHA1003623db0090179179afc4fd37b6647476b23c9a
SHA256dffb6a7cd8646f4f3b21f13a03fef2b37c8f8fd2693f05bc9c27fc842b5f4f4e
SHA512c5abcf1d2078ee2d7832f11d17ed566f06f4bb712c684e58bba0a85ec103ddd0f5b6fd2dc52c210682414081dcc4c74ac2dd0986f1ca3014002d6ba5e889827a