Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 14:57
Static task
static1
Behavioral task
behavioral1
Sample
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe
Resource
win10v2004-20230220-en
General
-
Target
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe
-
Size
685KB
-
MD5
915e931144085cc6ad36e7a9b57b2f6d
-
SHA1
61d03487102a42ff1e7ca20c99df427e2640cc51
-
SHA256
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a
-
SHA512
b906c09d105d529a4118dbd2be902bc31e58266f220e65d2f63df56839cfec1ad334b45b459d013556da45a7adabc1a627ac4037158d237e0f9083b012c6f05f
-
SSDEEP
12288:dMrSy903LqlVIyIeBF3tfWxP9hw5QgvgU7BIBoEPoI2NTI5NmyF9:nym0XIeL5Wx6QGgkaBoEPKNTSJF9
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2431.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4792-194-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-195-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-197-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-199-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-201-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-203-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-205-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-207-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-209-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-211-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-213-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-215-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-217-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-219-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-221-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-223-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-225-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4792-227-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1532 un530930.exe 5100 pro2431.exe 4792 qu6824.exe 4132 si421147.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2431.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un530930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un530930.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2604 5100 WerFault.exe 85 2556 4792 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5100 pro2431.exe 5100 pro2431.exe 4792 qu6824.exe 4792 qu6824.exe 4132 si421147.exe 4132 si421147.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5100 pro2431.exe Token: SeDebugPrivilege 4792 qu6824.exe Token: SeDebugPrivilege 4132 si421147.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1532 1456 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe 84 PID 1456 wrote to memory of 1532 1456 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe 84 PID 1456 wrote to memory of 1532 1456 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe 84 PID 1532 wrote to memory of 5100 1532 un530930.exe 85 PID 1532 wrote to memory of 5100 1532 un530930.exe 85 PID 1532 wrote to memory of 5100 1532 un530930.exe 85 PID 1532 wrote to memory of 4792 1532 un530930.exe 91 PID 1532 wrote to memory of 4792 1532 un530930.exe 91 PID 1532 wrote to memory of 4792 1532 un530930.exe 91 PID 1456 wrote to memory of 4132 1456 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe 95 PID 1456 wrote to memory of 4132 1456 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe 95 PID 1456 wrote to memory of 4132 1456 637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe"C:\Users\Admin\AppData\Local\Temp\637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530930.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2431.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 10844⤵
- Program crash
PID:2604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 16244⤵
- Program crash
PID:2556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si421147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si421147.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5100 -ip 51001⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4792 -ip 47921⤵PID:408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59040192de1fd4b4411ba21bff28fe9ff
SHA193fde229123df6faeddd87e0cd00aa79ee13451e
SHA256c9f6d55e4512781cc18893fd27618d68b8de1b0c00609bb3a61e55f65f6f75f3
SHA5129975ed429b6a27832385a77b9ef679b23bcca9f664f12d3451fb5387046484f31dcea30b4110d7aba5d89beed56242b2e9352ebc9f3ffe9248d2e56f00b25e2a
-
Filesize
175KB
MD59040192de1fd4b4411ba21bff28fe9ff
SHA193fde229123df6faeddd87e0cd00aa79ee13451e
SHA256c9f6d55e4512781cc18893fd27618d68b8de1b0c00609bb3a61e55f65f6f75f3
SHA5129975ed429b6a27832385a77b9ef679b23bcca9f664f12d3451fb5387046484f31dcea30b4110d7aba5d89beed56242b2e9352ebc9f3ffe9248d2e56f00b25e2a
-
Filesize
543KB
MD5f595205d987a56970664a7a44948acc3
SHA167ff9ec82f2079ac3f55f599e3c9916d25e03b42
SHA256ec5d3a6ef34792ce42788ff7a425700e5fcaa24af4f15b9b6e8d4f4c1a001d4f
SHA512ffa09e99b5da0121d063c5c0366a93c08d9652c8cfbda1f4f39e3ee7f1ea96908480bf0162d070ece3cb585243ec278219a4c2bbe652e03bde04b5b99eb4753e
-
Filesize
543KB
MD5f595205d987a56970664a7a44948acc3
SHA167ff9ec82f2079ac3f55f599e3c9916d25e03b42
SHA256ec5d3a6ef34792ce42788ff7a425700e5fcaa24af4f15b9b6e8d4f4c1a001d4f
SHA512ffa09e99b5da0121d063c5c0366a93c08d9652c8cfbda1f4f39e3ee7f1ea96908480bf0162d070ece3cb585243ec278219a4c2bbe652e03bde04b5b99eb4753e
-
Filesize
292KB
MD530082e53b22e7761a61fd6fad7ee8672
SHA1fa16c23252a142eab9812b2dfd8cb7720d236274
SHA25603bb18974d19ae8a89cafc65f4c581162ceaacc49d950d445da5f8da9b5c9a5d
SHA5124f6dc4f4eaa5749df70c1634e558905108c31100e6ae2462fe2f5277a24a1d19ef93bbc833d474a64748d2baa485f5388fe1fcdde568738fede854ad40227855
-
Filesize
292KB
MD530082e53b22e7761a61fd6fad7ee8672
SHA1fa16c23252a142eab9812b2dfd8cb7720d236274
SHA25603bb18974d19ae8a89cafc65f4c581162ceaacc49d950d445da5f8da9b5c9a5d
SHA5124f6dc4f4eaa5749df70c1634e558905108c31100e6ae2462fe2f5277a24a1d19ef93bbc833d474a64748d2baa485f5388fe1fcdde568738fede854ad40227855
-
Filesize
350KB
MD5a37e30ae653cec1cf746082a40ca04e9
SHA1787dbf36359ad9e5b0640f5fa1ae6aacd6c9bf9c
SHA256b1365cd4b7195f6a972500b2070b8b9f0a6c15e407c38dabf0c51b812d307232
SHA512512d65fd7663e20a169de2cc577f90d7aaa6aa5387cb0fb22cab862dc85b1a7890c135f75ca6948680e04a53812b9bc983c113f6cab12a80e0b1cefa43ba93e6
-
Filesize
350KB
MD5a37e30ae653cec1cf746082a40ca04e9
SHA1787dbf36359ad9e5b0640f5fa1ae6aacd6c9bf9c
SHA256b1365cd4b7195f6a972500b2070b8b9f0a6c15e407c38dabf0c51b812d307232
SHA512512d65fd7663e20a169de2cc577f90d7aaa6aa5387cb0fb22cab862dc85b1a7890c135f75ca6948680e04a53812b9bc983c113f6cab12a80e0b1cefa43ba93e6