Analysis
-
max time kernel
106s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:42
Static task
static1
Behavioral task
behavioral1
Sample
313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe
Resource
win10v2004-20230220-en
General
-
Target
313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe
-
Size
699KB
-
MD5
19b0f87b079dfaef8f3679fa89dad42d
-
SHA1
37297cc3c87dca448479440e1e7b98af2dbfcf17
-
SHA256
313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7
-
SHA512
895b617d2fbc3af85c3cad1371a8fa20b0a7ee23fd05b94a2a961a499ea58f53dacc68075e747db1ae2176b6fee4305d3e9c0466f8424818f146ca843c5be3d5
-
SSDEEP
12288:BMrKy903ex6VS9n6kk6YI7AYq1Fmxueo+IOgZZxX9BRvDkXRYPa0xLd:nyPOS0krPlmW7IOg5X93kYaQ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2209.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2209.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4784-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-201-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-226-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/4784-228-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3368 un636152.exe 3352 pro2209.exe 4784 qu3992.exe 4368 si865092.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2209.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un636152.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un636152.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4188 3352 WerFault.exe 86 4400 4784 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3352 pro2209.exe 3352 pro2209.exe 4784 qu3992.exe 4784 qu3992.exe 4368 si865092.exe 4368 si865092.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3352 pro2209.exe Token: SeDebugPrivilege 4784 qu3992.exe Token: SeDebugPrivilege 4368 si865092.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3368 1760 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe 85 PID 1760 wrote to memory of 3368 1760 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe 85 PID 1760 wrote to memory of 3368 1760 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe 85 PID 3368 wrote to memory of 3352 3368 un636152.exe 86 PID 3368 wrote to memory of 3352 3368 un636152.exe 86 PID 3368 wrote to memory of 3352 3368 un636152.exe 86 PID 3368 wrote to memory of 4784 3368 un636152.exe 95 PID 3368 wrote to memory of 4784 3368 un636152.exe 95 PID 3368 wrote to memory of 4784 3368 un636152.exe 95 PID 1760 wrote to memory of 4368 1760 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe 99 PID 1760 wrote to memory of 4368 1760 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe 99 PID 1760 wrote to memory of 4368 1760 313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe"C:\Users\Admin\AppData\Local\Temp\313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636152.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2209.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 10844⤵
- Program crash
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3992.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3992.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 17084⤵
- Program crash
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si865092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si865092.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3352 -ip 33521⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4784 -ip 47841⤵PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD521ef22541c551e90c5d1fe0641a0709f
SHA17fd0983f7bb04a3f74514c6bf8f4ab856b86af97
SHA256a4456f35f6759628f6a2de4d05934708193763a9ba477d49608c8943b49d315b
SHA512a36178a7874d078c99112f60e7aa16940d0ac6ed2ef9d72153aa07b4c1a82db6306f92deecc93f1d53c234614fd997138fff2cbe3fdd18bbf61133656a6a1203
-
Filesize
175KB
MD521ef22541c551e90c5d1fe0641a0709f
SHA17fd0983f7bb04a3f74514c6bf8f4ab856b86af97
SHA256a4456f35f6759628f6a2de4d05934708193763a9ba477d49608c8943b49d315b
SHA512a36178a7874d078c99112f60e7aa16940d0ac6ed2ef9d72153aa07b4c1a82db6306f92deecc93f1d53c234614fd997138fff2cbe3fdd18bbf61133656a6a1203
-
Filesize
557KB
MD5e21216c624e0b283017e9b76170477c5
SHA17ea9c000a32a262d44583f02aa4230a5d132ab6d
SHA256caf5c75c6b99c3603b070ccb0a0ab6bb7317df6911dec1027ea51689e2c880a9
SHA512d9e0ba57d93e5c931360a29bd9d775a80134ac103fc6482b5dc11c9c1db3f818d445354e72c40d9775a401b69472027d33d09815e1135fa1ec5ee8c72fd16bd8
-
Filesize
557KB
MD5e21216c624e0b283017e9b76170477c5
SHA17ea9c000a32a262d44583f02aa4230a5d132ab6d
SHA256caf5c75c6b99c3603b070ccb0a0ab6bb7317df6911dec1027ea51689e2c880a9
SHA512d9e0ba57d93e5c931360a29bd9d775a80134ac103fc6482b5dc11c9c1db3f818d445354e72c40d9775a401b69472027d33d09815e1135fa1ec5ee8c72fd16bd8
-
Filesize
308KB
MD544432e929ab253442ec18646a0082b24
SHA1a9970827339bf32c010efc59c1ddb47e180d39d1
SHA2569541eec81f3676d67bae0501b7176e283ce633e9872c9ac40e98a3461dcde6b1
SHA512e563b7af49c7b5c79435603bdc47fd598b6a588ef7ec751aa2c26267ce7c29eb1bfe3a8b9538b849dc3a3ef4d5a57a8cd738f56c13bce1d316633f0ea1ad1ded
-
Filesize
308KB
MD544432e929ab253442ec18646a0082b24
SHA1a9970827339bf32c010efc59c1ddb47e180d39d1
SHA2569541eec81f3676d67bae0501b7176e283ce633e9872c9ac40e98a3461dcde6b1
SHA512e563b7af49c7b5c79435603bdc47fd598b6a588ef7ec751aa2c26267ce7c29eb1bfe3a8b9538b849dc3a3ef4d5a57a8cd738f56c13bce1d316633f0ea1ad1ded
-
Filesize
366KB
MD50e80a38becfcb1c9876b0655ec1675b2
SHA1ad70b9f8713bd43c01da4daedc1d445590b5eda5
SHA25611d41787418436b29629c69cbde69baef53aeb0a2c2c991da49ced62de356532
SHA512ceaa237eddfd062ec7a2df28123e63949e77965078faa5b8b52745cd663442956e8d6c9035e22b96bbc3125eab17b22c34e8fd894cd0a3cf2392fceea131bf40
-
Filesize
366KB
MD50e80a38becfcb1c9876b0655ec1675b2
SHA1ad70b9f8713bd43c01da4daedc1d445590b5eda5
SHA25611d41787418436b29629c69cbde69baef53aeb0a2c2c991da49ced62de356532
SHA512ceaa237eddfd062ec7a2df28123e63949e77965078faa5b8b52745cd663442956e8d6c9035e22b96bbc3125eab17b22c34e8fd894cd0a3cf2392fceea131bf40