Analysis
-
max time kernel
50s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 15:45
Static task
static1
Behavioral task
behavioral1
Sample
fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe
Resource
win10-20230220-en
General
-
Target
fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe
-
Size
700KB
-
MD5
84e46a9e66351df9b074939253181e94
-
SHA1
edd2c7de01d448f37995ccbcae30c5b63209f0f0
-
SHA256
fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23
-
SHA512
83387c35316a39c98adc6dc106da89b9b71070518bdeee21760420615e91c5c3c59f7a90f393c06fc15bb06466d5980213f9e4e653be3ac5328026ef8f57b391
-
SSDEEP
12288:hMr5y90LwjjMcUA7qXcK4ufxw4FPkpTNG+it1m0pI2BRvXbW4/EZ3p:cysIUmYRO4FPETNGBt/I2lMp
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2083.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2068-181-0x00000000027C0000-0x0000000002806000-memory.dmp family_redline behavioral1/memory/2068-182-0x0000000002840000-0x0000000002884000-memory.dmp family_redline behavioral1/memory/2068-184-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-183-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-188-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-190-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-192-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-196-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-198-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-194-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-186-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-200-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-204-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-206-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-202-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-208-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-211-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-215-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-218-0x0000000002840000-0x000000000287E000-memory.dmp family_redline behavioral1/memory/2068-220-0x0000000002840000-0x000000000287E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2296 un027866.exe 2604 pro2083.exe 2068 qu5363.exe 3640 si037293.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2083.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un027866.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un027866.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2604 pro2083.exe 2604 pro2083.exe 2068 qu5363.exe 2068 qu5363.exe 3640 si037293.exe 3640 si037293.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 pro2083.exe Token: SeDebugPrivilege 2068 qu5363.exe Token: SeDebugPrivilege 3640 si037293.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2296 2076 fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe 66 PID 2076 wrote to memory of 2296 2076 fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe 66 PID 2076 wrote to memory of 2296 2076 fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe 66 PID 2296 wrote to memory of 2604 2296 un027866.exe 67 PID 2296 wrote to memory of 2604 2296 un027866.exe 67 PID 2296 wrote to memory of 2604 2296 un027866.exe 67 PID 2296 wrote to memory of 2068 2296 un027866.exe 68 PID 2296 wrote to memory of 2068 2296 un027866.exe 68 PID 2296 wrote to memory of 2068 2296 un027866.exe 68 PID 2076 wrote to memory of 3640 2076 fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe 70 PID 2076 wrote to memory of 3640 2076 fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe 70 PID 2076 wrote to memory of 3640 2076 fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe"C:\Users\Admin\AppData\Local\Temp\fcf96f37337f9956c431c8c0eb56462067901858f5f0e1b4a7e99a3a1fa88b23.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027866.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027866.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2083.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5363.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037293.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58fce7f7247b6db8d2ff387282ecc0903
SHA1d26510d13e4fbc15e6a7ac76e612b9aaddaa563f
SHA2564c859edf6e4c72a2783126aeeb08225e5cf8cb5910159dc7c1496c732d52e988
SHA5121ff6fcc16ea9e6411611dff146fad965cb3417aef9e3c2aefdd649beb16bf2faea96572c60b62a4de5caafcf20e711750ac9c86a576430066c65d40822f3a453
-
Filesize
175KB
MD58fce7f7247b6db8d2ff387282ecc0903
SHA1d26510d13e4fbc15e6a7ac76e612b9aaddaa563f
SHA2564c859edf6e4c72a2783126aeeb08225e5cf8cb5910159dc7c1496c732d52e988
SHA5121ff6fcc16ea9e6411611dff146fad965cb3417aef9e3c2aefdd649beb16bf2faea96572c60b62a4de5caafcf20e711750ac9c86a576430066c65d40822f3a453
-
Filesize
558KB
MD58fe6b20cb0b3cc8d055b1081b1c804b4
SHA15af32108e9fb7ba631336ade1be64d32440b9593
SHA256d95d238ceb5f56eee82f6bef75ccfef19489807350baee0f19b49da5253d9e0c
SHA5124edad37c4f9653fa28a97f5a700c06e19d6b00c8297f411cbb03c0dd36cd70ed814ae50606b168865f3e05827aef59f27923e2744eca4edae2ac7957f788aba9
-
Filesize
558KB
MD58fe6b20cb0b3cc8d055b1081b1c804b4
SHA15af32108e9fb7ba631336ade1be64d32440b9593
SHA256d95d238ceb5f56eee82f6bef75ccfef19489807350baee0f19b49da5253d9e0c
SHA5124edad37c4f9653fa28a97f5a700c06e19d6b00c8297f411cbb03c0dd36cd70ed814ae50606b168865f3e05827aef59f27923e2744eca4edae2ac7957f788aba9
-
Filesize
308KB
MD53fc676548c3361a7efe096dc670d2ca4
SHA1ed7626310740fc3bc517e89aef3c64de8c3993f2
SHA256b5ede589955931c68a1454f5a3815e1c3e57de0f5a1c406303a6d97c4cd5c669
SHA5120f621f2403a2f682c335d6d5d16e4a22ad5cd36aa043e962f31f8f32554ae0ee14789733a17f206b9b4d39ac0ed1e6b3aad4d5ab009d53684d6663a6ed47bb70
-
Filesize
308KB
MD53fc676548c3361a7efe096dc670d2ca4
SHA1ed7626310740fc3bc517e89aef3c64de8c3993f2
SHA256b5ede589955931c68a1454f5a3815e1c3e57de0f5a1c406303a6d97c4cd5c669
SHA5120f621f2403a2f682c335d6d5d16e4a22ad5cd36aa043e962f31f8f32554ae0ee14789733a17f206b9b4d39ac0ed1e6b3aad4d5ab009d53684d6663a6ed47bb70
-
Filesize
366KB
MD5bf2393dfa83eb6c4d6b4ec7ae82f24bc
SHA1041c46a5b2fabaff29b033a4f86cc5489693e032
SHA2568c89ad3d3cc8f9d8fa133797144c0e5a0cf12c4f4364c1c3730aa4071dd93f04
SHA512c49f496e9fd1e3dd59d0aefec98e6f60affdea54321b54f30133aebad82cd6a567ac3f256b0c6b1338bef8af27dac89de059bf2e243a9cb709f8a0788ca62efc
-
Filesize
366KB
MD5bf2393dfa83eb6c4d6b4ec7ae82f24bc
SHA1041c46a5b2fabaff29b033a4f86cc5489693e032
SHA2568c89ad3d3cc8f9d8fa133797144c0e5a0cf12c4f4364c1c3730aa4071dd93f04
SHA512c49f496e9fd1e3dd59d0aefec98e6f60affdea54321b54f30133aebad82cd6a567ac3f256b0c6b1338bef8af27dac89de059bf2e243a9cb709f8a0788ca62efc