Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:44
Static task
static1
Behavioral task
behavioral1
Sample
fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe
Resource
win10v2004-20230220-en
General
-
Target
fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe
-
Size
700KB
-
MD5
601e5fabf6d9ddf1dac7172a41ae10e9
-
SHA1
d8a34ef5be5152899dc4b58f6f3034d02391d97b
-
SHA256
fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167
-
SHA512
2605e0be946e8207a8fcf322ec811272241714e61b061112eda9bd0fe30bb24b0f92f83ebae8d055128d598bc73c9f8cb492bd021521ac31634ad01689b06c94
-
SSDEEP
12288:rMrpy90e/k0JDKmAsmNjrYK6LZuaiuSxptXpBP5cBRvnWMPx6mfhsx4cg:6yhJGmAsmNgBZ0XZcykx6Ysx49
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9041.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2756-190-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-191-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-193-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-195-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-197-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-200-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-204-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-207-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-209-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-211-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-213-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-215-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-217-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-219-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-221-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-223-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-225-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-227-0x0000000002880000-0x00000000028BE000-memory.dmp family_redline behavioral1/memory/2756-1110-0x0000000002750000-0x0000000002760000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2836 un830861.exe 3336 pro9041.exe 2756 qu2629.exe 3584 si868742.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9041.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un830861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un830861.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1996 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5028 3336 WerFault.exe 87 3856 2756 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3336 pro9041.exe 3336 pro9041.exe 2756 qu2629.exe 2756 qu2629.exe 3584 si868742.exe 3584 si868742.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3336 pro9041.exe Token: SeDebugPrivilege 2756 qu2629.exe Token: SeDebugPrivilege 3584 si868742.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2836 2976 fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe 86 PID 2976 wrote to memory of 2836 2976 fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe 86 PID 2976 wrote to memory of 2836 2976 fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe 86 PID 2836 wrote to memory of 3336 2836 un830861.exe 87 PID 2836 wrote to memory of 3336 2836 un830861.exe 87 PID 2836 wrote to memory of 3336 2836 un830861.exe 87 PID 2836 wrote to memory of 2756 2836 un830861.exe 93 PID 2836 wrote to memory of 2756 2836 un830861.exe 93 PID 2836 wrote to memory of 2756 2836 un830861.exe 93 PID 2976 wrote to memory of 3584 2976 fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe 96 PID 2976 wrote to memory of 3584 2976 fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe 96 PID 2976 wrote to memory of 3584 2976 fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe"C:\Users\Admin\AppData\Local\Temp\fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830861.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830861.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9041.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9041.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 10844⤵
- Program crash
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2629.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 13764⤵
- Program crash
PID:3856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868742.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3336 -ip 33361⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2756 -ip 27561⤵PID:1988
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52dc21863acb672b9ca6fb924dd91cdc3
SHA1d2c56ca91df761660f9642d1eee2838f9a34b64f
SHA25645c5aa743ff460b8469c7f3ee0c038fe66eae084fed2460790e3625766a3adb6
SHA512d4fa88f957e7046598d6d7a06910eff6e902b0cca065f256fd3830a51b9ca86c84328c538f3357592bab3f4372ba0c2ddc332b2d4b8314a9cfffd1b788679af2
-
Filesize
175KB
MD52dc21863acb672b9ca6fb924dd91cdc3
SHA1d2c56ca91df761660f9642d1eee2838f9a34b64f
SHA25645c5aa743ff460b8469c7f3ee0c038fe66eae084fed2460790e3625766a3adb6
SHA512d4fa88f957e7046598d6d7a06910eff6e902b0cca065f256fd3830a51b9ca86c84328c538f3357592bab3f4372ba0c2ddc332b2d4b8314a9cfffd1b788679af2
-
Filesize
558KB
MD5b32fdc16b397e23dd363aa8c4fd01d83
SHA197066b66164b87ba62036b42f4d70cf87b851312
SHA256aefadadeb22c389b3d8e01e331fb479d7f20cf893a767a770de95c7ccef02645
SHA5123d091345b6a837fe2f6de3e1bfd03aeb528e7c8af98506efb8dc60622cb3f0730f8adacbca6475bbbc1d3d9962a61088db1a9909459c0537e6ebb7bf902f7ea3
-
Filesize
558KB
MD5b32fdc16b397e23dd363aa8c4fd01d83
SHA197066b66164b87ba62036b42f4d70cf87b851312
SHA256aefadadeb22c389b3d8e01e331fb479d7f20cf893a767a770de95c7ccef02645
SHA5123d091345b6a837fe2f6de3e1bfd03aeb528e7c8af98506efb8dc60622cb3f0730f8adacbca6475bbbc1d3d9962a61088db1a9909459c0537e6ebb7bf902f7ea3
-
Filesize
308KB
MD5d4d57cbc4f2537dd884fe3299aaf8836
SHA15e20f3bfce36740451aa660553be4f0ea4fa26ba
SHA2566fb827859f8679000c4b2e037997e58de5c400bc3250555f85238f2a952848bd
SHA5124c9bed981d1b580eb71f2182c0e7a2df05faa6c5acdfa6450bde01314c939e4810d59cebda026ecb77892d1d579bf8d54ce202adb89e4b307c31e82c79247e49
-
Filesize
308KB
MD5d4d57cbc4f2537dd884fe3299aaf8836
SHA15e20f3bfce36740451aa660553be4f0ea4fa26ba
SHA2566fb827859f8679000c4b2e037997e58de5c400bc3250555f85238f2a952848bd
SHA5124c9bed981d1b580eb71f2182c0e7a2df05faa6c5acdfa6450bde01314c939e4810d59cebda026ecb77892d1d579bf8d54ce202adb89e4b307c31e82c79247e49
-
Filesize
366KB
MD5a225e8b3a342fbd28459c85591840c23
SHA17e07de7d528e87bd659a2bc76d64b995e4adbf7a
SHA256a33944fd5489f481cd33f368cc6e95c8706d5e134e434c7efc0df51a49c9293e
SHA512a688667c710ab4137b99a01bba7ba4fdc8ca8c44bd556af24a7845bc970cceaab61418abddfe86448bbc4aeb9d62cda474bc6a0ab4dfc70f7fcbebf298902b39
-
Filesize
366KB
MD5a225e8b3a342fbd28459c85591840c23
SHA17e07de7d528e87bd659a2bc76d64b995e4adbf7a
SHA256a33944fd5489f481cd33f368cc6e95c8706d5e134e434c7efc0df51a49c9293e
SHA512a688667c710ab4137b99a01bba7ba4fdc8ca8c44bd556af24a7845bc970cceaab61418abddfe86448bbc4aeb9d62cda474bc6a0ab4dfc70f7fcbebf298902b39