Analysis
-
max time kernel
105s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe
Resource
win10v2004-20230220-en
General
-
Target
d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe
-
Size
700KB
-
MD5
d202a361df49f361f3830a8048e026d9
-
SHA1
0ab53ab6f7782852e80becb175293710d1e3d14c
-
SHA256
d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6
-
SHA512
891b49172f5ce7003732eb879dfecd97e0ca467997d0bd3ab39a5bd0d3461ed4ccf0e5f87c3a224df7bdd8b276fce18b1279038a6424ffc222ce5ded85876f2f
-
SSDEEP
12288:tMr0y90t+1Yn7eF+/PZYFXFjfyJkfK2gWuo2fSXjxBRvqCgvl1e9:Ry+pn6QOfby4iYjxB089
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
Processes:
pro7041.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7041.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7041.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/696-190-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-195-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-191-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-197-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-199-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-201-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-203-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-205-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-207-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-209-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-211-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-213-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-215-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-217-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-219-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-221-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-223-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/696-225-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un081158.exepro7041.exequ8767.exesi433743.exepid process 1900 un081158.exe 3252 pro7041.exe 696 qu8767.exe 2544 si433743.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7041.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7041.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exeun081158.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un081158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un081158.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3048 3252 WerFault.exe pro7041.exe 3364 696 WerFault.exe qu8767.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7041.exequ8767.exesi433743.exepid process 3252 pro7041.exe 3252 pro7041.exe 696 qu8767.exe 696 qu8767.exe 2544 si433743.exe 2544 si433743.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7041.exequ8767.exesi433743.exedescription pid process Token: SeDebugPrivilege 3252 pro7041.exe Token: SeDebugPrivilege 696 qu8767.exe Token: SeDebugPrivilege 2544 si433743.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exeun081158.exedescription pid process target process PID 1876 wrote to memory of 1900 1876 d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe un081158.exe PID 1876 wrote to memory of 1900 1876 d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe un081158.exe PID 1876 wrote to memory of 1900 1876 d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe un081158.exe PID 1900 wrote to memory of 3252 1900 un081158.exe pro7041.exe PID 1900 wrote to memory of 3252 1900 un081158.exe pro7041.exe PID 1900 wrote to memory of 3252 1900 un081158.exe pro7041.exe PID 1900 wrote to memory of 696 1900 un081158.exe qu8767.exe PID 1900 wrote to memory of 696 1900 un081158.exe qu8767.exe PID 1900 wrote to memory of 696 1900 un081158.exe qu8767.exe PID 1876 wrote to memory of 2544 1876 d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe si433743.exe PID 1876 wrote to memory of 2544 1876 d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe si433743.exe PID 1876 wrote to memory of 2544 1876 d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe si433743.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe"C:\Users\Admin\AppData\Local\Temp\d026236c3502a695d6d3275f30cc598db1e08bef2d2ce354ea06fd760d9331e6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081158.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7041.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7041.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8767.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 17684⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433743.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3252 -ip 32521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 696 -ip 6961⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433743.exeFilesize
175KB
MD53fb49cfe2cb049894651902bb5593727
SHA103934dba9e940d0bd3c75d2de4fd0ef9e086e14b
SHA25690ed12c4b1d88180a0809e7428b896d6b11231b0792fb5e6f0aa589670ca90c4
SHA512628ec9442e6d7b24b3b7d8c9d7fa8ad5f3b675dd020088269b2dee561d8c96b43e1fc9513504145ffb83a839804140a594e3882fa0e723bb3de594efb407f195
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433743.exeFilesize
175KB
MD53fb49cfe2cb049894651902bb5593727
SHA103934dba9e940d0bd3c75d2de4fd0ef9e086e14b
SHA25690ed12c4b1d88180a0809e7428b896d6b11231b0792fb5e6f0aa589670ca90c4
SHA512628ec9442e6d7b24b3b7d8c9d7fa8ad5f3b675dd020088269b2dee561d8c96b43e1fc9513504145ffb83a839804140a594e3882fa0e723bb3de594efb407f195
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081158.exeFilesize
558KB
MD5d39c96bf431fa669585e88337cf894f0
SHA14700fe188ef876b7d279cc1a77cc200bb0b08f90
SHA256f2b638e3eacdb360d0492cb58b0da28a277f00af7d0a51fb5dc2517baa0f68d4
SHA512b354b3657a33e4c9ea648543ae6dfde1829426f5e482251a9ff377e91332578e26cdbe67c596a17731de6351f9aec2c78771ed44227782230fea829a78976a96
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081158.exeFilesize
558KB
MD5d39c96bf431fa669585e88337cf894f0
SHA14700fe188ef876b7d279cc1a77cc200bb0b08f90
SHA256f2b638e3eacdb360d0492cb58b0da28a277f00af7d0a51fb5dc2517baa0f68d4
SHA512b354b3657a33e4c9ea648543ae6dfde1829426f5e482251a9ff377e91332578e26cdbe67c596a17731de6351f9aec2c78771ed44227782230fea829a78976a96
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7041.exeFilesize
308KB
MD5f9220de627e8d1985b1cf05b2046042a
SHA1fb515d5547ca8e237a2d0509df54ae68431be217
SHA256163bd2e6d3c0a0a8e4093e62ca4b82521d2d3741e2eda35b9e74d695ebf4c863
SHA51255f3563a8d4dbbfcc08ed20615aed3684d79b3f9cf9b90b9d79f8198480351e137fc2ed53efcd3f517329b3ac5a40f7e154e32018bb778bbf0e699f4f2dca6ed
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7041.exeFilesize
308KB
MD5f9220de627e8d1985b1cf05b2046042a
SHA1fb515d5547ca8e237a2d0509df54ae68431be217
SHA256163bd2e6d3c0a0a8e4093e62ca4b82521d2d3741e2eda35b9e74d695ebf4c863
SHA51255f3563a8d4dbbfcc08ed20615aed3684d79b3f9cf9b90b9d79f8198480351e137fc2ed53efcd3f517329b3ac5a40f7e154e32018bb778bbf0e699f4f2dca6ed
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8767.exeFilesize
366KB
MD5a3e207efbee7bf49d0dc9be6138d14f4
SHA1de68a69d4971b83fd219d738b9e17e0a2864e063
SHA2564598464ce947b98ad00dd827071c1b2976cf2129a7ca54bda981bab78d21217d
SHA5126be1a4a3c37d1f07aecacf6dcb0d71e18505e3d189442467ab9fcec8e8c25f8b1fd04d514ecf567a5508173441f2ea769498264ce1b300b4b8918f78ae397389
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8767.exeFilesize
366KB
MD5a3e207efbee7bf49d0dc9be6138d14f4
SHA1de68a69d4971b83fd219d738b9e17e0a2864e063
SHA2564598464ce947b98ad00dd827071c1b2976cf2129a7ca54bda981bab78d21217d
SHA5126be1a4a3c37d1f07aecacf6dcb0d71e18505e3d189442467ab9fcec8e8c25f8b1fd04d514ecf567a5508173441f2ea769498264ce1b300b4b8918f78ae397389
-
memory/696-1099-0x0000000005B00000-0x0000000005C0A000-memory.dmpFilesize
1.0MB
-
memory/696-1102-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-1113-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-1112-0x0000000006D60000-0x000000000728C000-memory.dmpFilesize
5.2MB
-
memory/696-1111-0x0000000006B80000-0x0000000006D42000-memory.dmpFilesize
1.8MB
-
memory/696-1110-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-1109-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-1108-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-1106-0x00000000069C0000-0x0000000006A10000-memory.dmpFilesize
320KB
-
memory/696-1105-0x0000000006930000-0x00000000069A6000-memory.dmpFilesize
472KB
-
memory/696-1104-0x0000000005FF0000-0x0000000006056000-memory.dmpFilesize
408KB
-
memory/696-1103-0x0000000005F50000-0x0000000005FE2000-memory.dmpFilesize
584KB
-
memory/696-1101-0x0000000005C60000-0x0000000005C9C000-memory.dmpFilesize
240KB
-
memory/696-1100-0x0000000005C40000-0x0000000005C52000-memory.dmpFilesize
72KB
-
memory/696-1098-0x0000000005460000-0x0000000005A78000-memory.dmpFilesize
6.1MB
-
memory/696-225-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-223-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-221-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-219-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-217-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-188-0x0000000000900000-0x000000000094B000-memory.dmpFilesize
300KB
-
memory/696-190-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-192-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-195-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-194-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-191-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-189-0x0000000002780000-0x0000000002790000-memory.dmpFilesize
64KB
-
memory/696-197-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-199-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-201-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-203-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-205-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-207-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-209-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-211-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-213-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/696-215-0x00000000052C0000-0x00000000052FE000-memory.dmpFilesize
248KB
-
memory/2544-1119-0x00000000001D0000-0x0000000000202000-memory.dmpFilesize
200KB
-
memory/2544-1120-0x0000000004A70000-0x0000000004A80000-memory.dmpFilesize
64KB
-
memory/3252-168-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-180-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-166-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-178-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-151-0x00000000050A0000-0x0000000005644000-memory.dmpFilesize
5.6MB
-
memory/3252-176-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-174-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-153-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-164-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-170-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-149-0x0000000005090000-0x00000000050A0000-memory.dmpFilesize
64KB
-
memory/3252-181-0x0000000000400000-0x0000000000710000-memory.dmpFilesize
3.1MB
-
memory/3252-172-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-162-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-160-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-158-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-156-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-154-0x0000000002600000-0x0000000002612000-memory.dmpFilesize
72KB
-
memory/3252-150-0x0000000005090000-0x00000000050A0000-memory.dmpFilesize
64KB
-
memory/3252-148-0x0000000000710000-0x000000000073D000-memory.dmpFilesize
180KB
-
memory/3252-183-0x0000000000400000-0x0000000000710000-memory.dmpFilesize
3.1MB
-
memory/3252-152-0x0000000005090000-0x00000000050A0000-memory.dmpFilesize
64KB