Analysis
-
max time kernel
61s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:56
Static task
static1
Behavioral task
behavioral1
Sample
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe
Resource
win10v2004-20230221-en
General
-
Target
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe
-
Size
685KB
-
MD5
a5cf88acab030eb4e8f2df5317d0dc1d
-
SHA1
d9c3db480350bea34c7538804cca1449abf193b7
-
SHA256
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9
-
SHA512
9ef971e6e3fd8647d0c9333eab1483bde51eb6821a0c91c0c310f0a1e1db19add061281f55c663a9312f655d494b573f2fc822c98c012c55973c728c084867cd
-
SSDEEP
12288:SMryy90AAJeB00t6ZykDzcUomnkVIErYNzTH/YOICkzBbNMExK44ztowhTo8KEd:0yQo1XkMlmbKYNzTgOIFRNMExKbBowhT
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0141.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0141.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4676-189-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-190-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-192-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-194-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-196-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-198-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-200-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-202-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-204-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-206-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-208-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-210-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-212-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-214-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-216-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-218-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-220-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline behavioral1/memory/4676-222-0x0000000002780000-0x00000000027BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1528 un432797.exe 2344 pro0141.exe 4676 qu0920.exe 3336 si355100.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0141.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un432797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un432797.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3964 2344 WerFault.exe 83 4812 4676 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2344 pro0141.exe 2344 pro0141.exe 4676 qu0920.exe 4676 qu0920.exe 3336 si355100.exe 3336 si355100.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 pro0141.exe Token: SeDebugPrivilege 4676 qu0920.exe Token: SeDebugPrivilege 3336 si355100.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1528 2680 f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe 82 PID 2680 wrote to memory of 1528 2680 f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe 82 PID 2680 wrote to memory of 1528 2680 f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe 82 PID 1528 wrote to memory of 2344 1528 un432797.exe 83 PID 1528 wrote to memory of 2344 1528 un432797.exe 83 PID 1528 wrote to memory of 2344 1528 un432797.exe 83 PID 1528 wrote to memory of 4676 1528 un432797.exe 89 PID 1528 wrote to memory of 4676 1528 un432797.exe 89 PID 1528 wrote to memory of 4676 1528 un432797.exe 89 PID 2680 wrote to memory of 3336 2680 f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe 92 PID 2680 wrote to memory of 3336 2680 f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe 92 PID 2680 wrote to memory of 3336 2680 f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe"C:\Users\Admin\AppData\Local\Temp\f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un432797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un432797.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0141.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0141.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 10844⤵
- Program crash
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0920.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 18124⤵
- Program crash
PID:4812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355100.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355100.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2344 -ip 23441⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4676 -ip 46761⤵PID:2536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD500a40d2cd948ec977a6be305333a3f5e
SHA1a02cd74d5602adc04e5591e51b630fcfc01164ee
SHA25630ac9d615571ca81c5355c339299816d320906126aa8d63aa0da3e602d4596eb
SHA512e68273f0c954a40f26904123dedfb6eaf4c2eb6ebaa45f42d850c00755f21a1c48210538b0824b2c60f22d2814730fa5714ad94540894b318e7b519b93918039
-
Filesize
175KB
MD500a40d2cd948ec977a6be305333a3f5e
SHA1a02cd74d5602adc04e5591e51b630fcfc01164ee
SHA25630ac9d615571ca81c5355c339299816d320906126aa8d63aa0da3e602d4596eb
SHA512e68273f0c954a40f26904123dedfb6eaf4c2eb6ebaa45f42d850c00755f21a1c48210538b0824b2c60f22d2814730fa5714ad94540894b318e7b519b93918039
-
Filesize
543KB
MD59d053ab48cab0df4ec87a6336dbd7866
SHA1a9749cbdb398b9fb2091034c8fdf69485a557a13
SHA256bc5be5480ad65594a744b1e0931f9308f614b3c7a6a81e85ed37ab8341f3b609
SHA512ce5ee86bccaef109644468d561ef85c6f6a364fe13ef2206539188ec8d635eb0944edcfbaf90f042a7431999bbc49f92e8a542cb61459aead90e7a9cb47bb6dd
-
Filesize
543KB
MD59d053ab48cab0df4ec87a6336dbd7866
SHA1a9749cbdb398b9fb2091034c8fdf69485a557a13
SHA256bc5be5480ad65594a744b1e0931f9308f614b3c7a6a81e85ed37ab8341f3b609
SHA512ce5ee86bccaef109644468d561ef85c6f6a364fe13ef2206539188ec8d635eb0944edcfbaf90f042a7431999bbc49f92e8a542cb61459aead90e7a9cb47bb6dd
-
Filesize
292KB
MD5004db8c6e46f44a9e1ecac1108dfe2ad
SHA1b5c01592549ca96a72f18e59910a245d6512f1a8
SHA2560af2bdb95980cfbd1b3ac50129aa72e847f731b35dd1f0f651f420fe9e6c1e45
SHA512bf949b7ac879717cbc5e4ad9f62cc0c9e7aa8768f76f78ece7ad90d10206a7301944bcb569928584b12a7df4196d885ceab9a7afd2dbe2a86381c3ee2975592b
-
Filesize
292KB
MD5004db8c6e46f44a9e1ecac1108dfe2ad
SHA1b5c01592549ca96a72f18e59910a245d6512f1a8
SHA2560af2bdb95980cfbd1b3ac50129aa72e847f731b35dd1f0f651f420fe9e6c1e45
SHA512bf949b7ac879717cbc5e4ad9f62cc0c9e7aa8768f76f78ece7ad90d10206a7301944bcb569928584b12a7df4196d885ceab9a7afd2dbe2a86381c3ee2975592b
-
Filesize
350KB
MD5868f7172f064937bb02d743412a813ac
SHA10a6604b04b0e8a984e00b526cbb15eea62da9f1c
SHA25697709ed93d0de473bd33c48fc15f2c4d11681380b87467d74a013b069e1c1d94
SHA512dc1a7ab53020cc672837a96251dc3ec5ba800cb0721bbca7188afa43f835a6226e4214acdf8e1f267620ec7f82968af68be44f79c70eb86007cab116dbf0c046
-
Filesize
350KB
MD5868f7172f064937bb02d743412a813ac
SHA10a6604b04b0e8a984e00b526cbb15eea62da9f1c
SHA25697709ed93d0de473bd33c48fc15f2c4d11681380b87467d74a013b069e1c1d94
SHA512dc1a7ab53020cc672837a96251dc3ec5ba800cb0721bbca7188afa43f835a6226e4214acdf8e1f267620ec7f82968af68be44f79c70eb86007cab116dbf0c046