Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:54
Static task
static1
Behavioral task
behavioral1
Sample
83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe
Resource
win10v2004-20230220-en
General
-
Target
83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe
-
Size
685KB
-
MD5
78bbd61bdc1abd514dadd0b55b686f4e
-
SHA1
141bdb17cc7d48e5fc997230c80e0a807f73de8e
-
SHA256
83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc
-
SHA512
471e4efcfaf430109544013b91ac825c5141b0dc7ada0663438a87a05f69b48a8a20ac4986b8e163b7b4104f415b0ce04a3a66b36b6d114400fb96c1a372c861
-
SSDEEP
12288:GMrjy90Yzn3P9vJ9TCCmm99sniuYUtvGG5DE0B1mHEv6gWlsVRVVr:pyZ3P5J9TCCmmf2i05GG5bXmHEvjfB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4503.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4503.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4488-189-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-188-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-191-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-193-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-195-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-197-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-199-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-201-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-203-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-205-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-207-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-209-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-211-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-216-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-219-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-221-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-223-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4488-225-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4808 un043966.exe 4248 pro4503.exe 4488 qu9151.exe 3920 si017317.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4503.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4503.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un043966.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un043966.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1500 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 60 4248 WerFault.exe 85 4948 4488 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4248 pro4503.exe 4248 pro4503.exe 4488 qu9151.exe 4488 qu9151.exe 3920 si017317.exe 3920 si017317.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4248 pro4503.exe Token: SeDebugPrivilege 4488 qu9151.exe Token: SeDebugPrivilege 3920 si017317.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4808 4536 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe 84 PID 4536 wrote to memory of 4808 4536 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe 84 PID 4536 wrote to memory of 4808 4536 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe 84 PID 4808 wrote to memory of 4248 4808 un043966.exe 85 PID 4808 wrote to memory of 4248 4808 un043966.exe 85 PID 4808 wrote to memory of 4248 4808 un043966.exe 85 PID 4808 wrote to memory of 4488 4808 un043966.exe 91 PID 4808 wrote to memory of 4488 4808 un043966.exe 91 PID 4808 wrote to memory of 4488 4808 un043966.exe 91 PID 4536 wrote to memory of 3920 4536 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe 95 PID 4536 wrote to memory of 3920 4536 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe 95 PID 4536 wrote to memory of 3920 4536 83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe"C:\Users\Admin\AppData\Local\Temp\83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043966.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043966.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4503.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4503.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 10844⤵
- Program crash
PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 17284⤵
- Program crash
PID:4948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si017317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si017317.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4248 -ip 42481⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4488 -ip 44881⤵PID:1412
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58192332adf17ab7fa959000e8fcced48
SHA1df1c474fd2a2ba26e2ebec138a6d5db8dfe489a6
SHA2564c888abb20d8d164f96b719554f2a02bc9efd4faae9787977c3b0efac26ba633
SHA5127f77fe1436d825bf740954b99c8cc5f6870190c53580b41c1f280983e0d2fa20d5584fb487e6f7a265cb7a602047a03f2adc659917e1a422ad0d63b9022c7489
-
Filesize
175KB
MD58192332adf17ab7fa959000e8fcced48
SHA1df1c474fd2a2ba26e2ebec138a6d5db8dfe489a6
SHA2564c888abb20d8d164f96b719554f2a02bc9efd4faae9787977c3b0efac26ba633
SHA5127f77fe1436d825bf740954b99c8cc5f6870190c53580b41c1f280983e0d2fa20d5584fb487e6f7a265cb7a602047a03f2adc659917e1a422ad0d63b9022c7489
-
Filesize
543KB
MD5c304f8ffb26f9082ec48c5ecd913b089
SHA12509bec4d1816bfc8e806bc49804cdbc8d025939
SHA256f7bd4325fbe413daf3f59188dd10516d69fd1bb0fe9db261f60d9abe0f089403
SHA5120b5f7c7bff9b17203f174ecf6bf02bdc305317b5443aea16cf079c121232b9b424c77071b9e9c62683b5501ef6288dbd85a2b410cc8e5b9863135afc4a8957f1
-
Filesize
543KB
MD5c304f8ffb26f9082ec48c5ecd913b089
SHA12509bec4d1816bfc8e806bc49804cdbc8d025939
SHA256f7bd4325fbe413daf3f59188dd10516d69fd1bb0fe9db261f60d9abe0f089403
SHA5120b5f7c7bff9b17203f174ecf6bf02bdc305317b5443aea16cf079c121232b9b424c77071b9e9c62683b5501ef6288dbd85a2b410cc8e5b9863135afc4a8957f1
-
Filesize
292KB
MD54069bc4370b9fee09fc2af2caece5d48
SHA103de3f40ce47aa5f99dd6b879b81b9d318f0d22e
SHA2566db068ef7f55e3b3c2cd7fde980cbc45ca800d44c9b6c8321d426e00c9d710e9
SHA512a4ccaef341a407b44a5b246fca101a232e508059ea4329434f67bf27729b9494dfa442fd7f780b522140a2924bf275e1c5d5377931c89d118aff1a5a6fb65c40
-
Filesize
292KB
MD54069bc4370b9fee09fc2af2caece5d48
SHA103de3f40ce47aa5f99dd6b879b81b9d318f0d22e
SHA2566db068ef7f55e3b3c2cd7fde980cbc45ca800d44c9b6c8321d426e00c9d710e9
SHA512a4ccaef341a407b44a5b246fca101a232e508059ea4329434f67bf27729b9494dfa442fd7f780b522140a2924bf275e1c5d5377931c89d118aff1a5a6fb65c40
-
Filesize
350KB
MD50778eb3cc8c0c7a3f8954f081370e482
SHA19a15619497448c18877503697e17d4364c46131b
SHA25670551ba8678e7664e621741ca8bb34d8888cbb8d35922fc82eb3dd94074c1247
SHA512b72945fbbbc3c9be8f3ac1417d60f9ac74b23c246bcacd822439412f5fd03db6f78eb95a2a530021217ce755ff0daa5196976a600f99ae64cff2ba8c0a17d849
-
Filesize
350KB
MD50778eb3cc8c0c7a3f8954f081370e482
SHA19a15619497448c18877503697e17d4364c46131b
SHA25670551ba8678e7664e621741ca8bb34d8888cbb8d35922fc82eb3dd94074c1247
SHA512b72945fbbbc3c9be8f3ac1417d60f9ac74b23c246bcacd822439412f5fd03db6f78eb95a2a530021217ce755ff0daa5196976a600f99ae64cff2ba8c0a17d849