Analysis
-
max time kernel
59s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:01
Static task
static1
Behavioral task
behavioral1
Sample
2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe
Resource
win10v2004-20230220-en
General
-
Target
2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe
-
Size
685KB
-
MD5
c6c905352e36e28fcef37d7b171983ff
-
SHA1
404a27825c1636eaf9f50ca8456bd0b649f39115
-
SHA256
2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6
-
SHA512
0f0fbf3c44a7f8157cf79aa0df0f0095ed24da4415d8b7af2e3f58ef6edbe1cf39696c5911653bb76634e9355cbef03cb8e274535d237e8e4db8d0c1a7923603
-
SSDEEP
12288:HMr2y902wCoxVx/EjU3oorHJUkYGJ/jtT1kNrRLXGs7D5BnopEiQ248RuGe3hV3n:ZyTYXBGCP7vvmrRb5795opEo4WuGehVX
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7760.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7760.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4232-194-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-195-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-197-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-199-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-201-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-203-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-205-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-209-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-207-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-211-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-213-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-215-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-217-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-219-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-221-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-223-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-225-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/4232-227-0x0000000002810000-0x000000000284E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 244 un876750.exe 3572 pro7760.exe 4232 qu3362.exe 1248 si503239.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7760.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un876750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un876750.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2628 3572 WerFault.exe 85 4308 4232 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3572 pro7760.exe 3572 pro7760.exe 4232 qu3362.exe 4232 qu3362.exe 1248 si503239.exe 1248 si503239.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3572 pro7760.exe Token: SeDebugPrivilege 4232 qu3362.exe Token: SeDebugPrivilege 1248 si503239.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3340 wrote to memory of 244 3340 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe 84 PID 3340 wrote to memory of 244 3340 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe 84 PID 3340 wrote to memory of 244 3340 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe 84 PID 244 wrote to memory of 3572 244 un876750.exe 85 PID 244 wrote to memory of 3572 244 un876750.exe 85 PID 244 wrote to memory of 3572 244 un876750.exe 85 PID 244 wrote to memory of 4232 244 un876750.exe 94 PID 244 wrote to memory of 4232 244 un876750.exe 94 PID 244 wrote to memory of 4232 244 un876750.exe 94 PID 3340 wrote to memory of 1248 3340 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe 99 PID 3340 wrote to memory of 1248 3340 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe 99 PID 3340 wrote to memory of 1248 3340 2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe"C:\Users\Admin\AppData\Local\Temp\2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876750.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7760.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7760.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 10884⤵
- Program crash
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3362.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3362.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 17764⤵
- Program crash
PID:4308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si503239.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si503239.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3572 -ip 35721⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4232 -ip 42321⤵PID:3136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD586e938d4e449ae4ac2703d8cad9a43c6
SHA1c10f5c6311e1c40993dd0d85563e725ff5d9646e
SHA256b347250d82ee13a1c6b01c21be68f287a9a38fc189b464c6f7c3d28696584bd0
SHA512a9f12ad650b805eb063d9d19a2630fac4d0242f8001dd7a1633a417ab10d3950b39cad7578f95e132ef92b9b154141997c821f3a3123712251aad68a4cda7b15
-
Filesize
175KB
MD586e938d4e449ae4ac2703d8cad9a43c6
SHA1c10f5c6311e1c40993dd0d85563e725ff5d9646e
SHA256b347250d82ee13a1c6b01c21be68f287a9a38fc189b464c6f7c3d28696584bd0
SHA512a9f12ad650b805eb063d9d19a2630fac4d0242f8001dd7a1633a417ab10d3950b39cad7578f95e132ef92b9b154141997c821f3a3123712251aad68a4cda7b15
-
Filesize
543KB
MD5c11d607b7b0d25931da1795c044d43bd
SHA1e30a326bcfa5cb5d3a8dc6a30dffd1db4699b4eb
SHA2560b25abd0a1c3da31a213f88bac8c35795354a8a049b2511d741027e30193629a
SHA5127e791c88b0ff9836dfca9a91870b6c0f1f7f4e587b3a9022aa96edb1f72c495493c7fb1ca2e54d787a548635bf1c8ebaa4a2f0d80636d03dcf336aaed98fa583
-
Filesize
543KB
MD5c11d607b7b0d25931da1795c044d43bd
SHA1e30a326bcfa5cb5d3a8dc6a30dffd1db4699b4eb
SHA2560b25abd0a1c3da31a213f88bac8c35795354a8a049b2511d741027e30193629a
SHA5127e791c88b0ff9836dfca9a91870b6c0f1f7f4e587b3a9022aa96edb1f72c495493c7fb1ca2e54d787a548635bf1c8ebaa4a2f0d80636d03dcf336aaed98fa583
-
Filesize
292KB
MD5fdf366ce21d01e1dfb39fca0c8c01cfa
SHA19ab20296e4369463564cbb43ef55ff65fbe8e59f
SHA256ff4e3d409aa2938f85df676fec1e1e674368409b28701ecdf7d316cc8a39982f
SHA5128174c5b5bca965ca28400af3e8b54a148c7d7e3b4fccd5f36b7dcf119389160accd717497946d13d54e954cb8c40d8418ebb8df05fcd6b29a3a573862e7a9a92
-
Filesize
292KB
MD5fdf366ce21d01e1dfb39fca0c8c01cfa
SHA19ab20296e4369463564cbb43ef55ff65fbe8e59f
SHA256ff4e3d409aa2938f85df676fec1e1e674368409b28701ecdf7d316cc8a39982f
SHA5128174c5b5bca965ca28400af3e8b54a148c7d7e3b4fccd5f36b7dcf119389160accd717497946d13d54e954cb8c40d8418ebb8df05fcd6b29a3a573862e7a9a92
-
Filesize
350KB
MD51ba4de25fc1db3adc8073189879b54de
SHA1feb6d2994dcb92539d397d370a15d1ef07c1dc7d
SHA256003df8f6285a14bae59dfe908ac539125c983c65f2fb37a06e32167738a13d95
SHA51255b193f915e8705efe4fe7794422b9cd6a9398a224532ccd90b46d086f1eb55f441951075f3ffd49e6c5c84006e045ed590bc8c3c87eb5ba865b32899e53d31a
-
Filesize
350KB
MD51ba4de25fc1db3adc8073189879b54de
SHA1feb6d2994dcb92539d397d370a15d1ef07c1dc7d
SHA256003df8f6285a14bae59dfe908ac539125c983c65f2fb37a06e32167738a13d95
SHA51255b193f915e8705efe4fe7794422b9cd6a9398a224532ccd90b46d086f1eb55f441951075f3ffd49e6c5c84006e045ed590bc8c3c87eb5ba865b32899e53d31a