Analysis
-
max time kernel
65s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:06
Static task
static1
Behavioral task
behavioral1
Sample
769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe
Resource
win10v2004-20230220-en
General
-
Target
769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe
-
Size
685KB
-
MD5
d5525f2beb8ba6c111a93176eea6b8d1
-
SHA1
013417a332f9a6d61752c5076bf2f84d9cf2cfcd
-
SHA256
769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746
-
SHA512
5c8138fa9a995d4e53e0a7cbb7ec35f6e22c5f4f3553d5b20240565bba186c90d7be8f03754fa09ea296139054cce5e5668c6e25428dffdc0694f1522d26b1c8
-
SSDEEP
12288:xMrOy90yvX5p3bsnbvFrVS9WJzjo/Ik0DguLWIQYPFcBpy4EuRZJRv:nyvfnwyizjFk0DgD5Yizy4Eu3b
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2955.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4756-191-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-194-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-192-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-196-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-198-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-200-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-205-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-207-0x00000000027A0000-0x00000000027B0000-memory.dmp family_redline behavioral1/memory/4756-208-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-210-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-212-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-214-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-216-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-218-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-220-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-222-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-224-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-226-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline behavioral1/memory/4756-228-0x00000000027B0000-0x00000000027EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4416 un880767.exe 2428 pro2955.exe 4756 qu9390.exe 3272 si664964.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2955.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un880767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un880767.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2004 2428 WerFault.exe 84 4952 4756 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2428 pro2955.exe 2428 pro2955.exe 4756 qu9390.exe 4756 qu9390.exe 3272 si664964.exe 3272 si664964.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2428 pro2955.exe Token: SeDebugPrivilege 4756 qu9390.exe Token: SeDebugPrivilege 3272 si664964.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4416 2168 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe 83 PID 2168 wrote to memory of 4416 2168 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe 83 PID 2168 wrote to memory of 4416 2168 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe 83 PID 4416 wrote to memory of 2428 4416 un880767.exe 84 PID 4416 wrote to memory of 2428 4416 un880767.exe 84 PID 4416 wrote to memory of 2428 4416 un880767.exe 84 PID 4416 wrote to memory of 4756 4416 un880767.exe 90 PID 4416 wrote to memory of 4756 4416 un880767.exe 90 PID 4416 wrote to memory of 4756 4416 un880767.exe 90 PID 2168 wrote to memory of 3272 2168 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe 94 PID 2168 wrote to memory of 3272 2168 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe 94 PID 2168 wrote to memory of 3272 2168 769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe"C:\Users\Admin\AppData\Local\Temp\769e81cfa32792904f37c6cd02d477d620727dea00182be0241592c95c5b4746.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880767.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 10884⤵
- Program crash
PID:2004
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9390.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9390.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 13644⤵
- Program crash
PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si664964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si664964.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2428 -ip 24281⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4756 -ip 47561⤵PID:2904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f699b9869515f2a5007534c1eba53fa8
SHA1f8befd98f3a8eecfbc127b7a4027593731f8a19b
SHA256ee3dc4a83cc25fc5e07472c1892ca574f94c5ba78592a507e74c45de9f28cbe1
SHA5123fe278fe505404f21778d9d4c3a84feee9d24b13b035cf46b0dd3405a14c126f4cf971aaac2448fb6ad54960f350184e6ba83b808e6f0ecee203ea11d780dbe0
-
Filesize
175KB
MD5f699b9869515f2a5007534c1eba53fa8
SHA1f8befd98f3a8eecfbc127b7a4027593731f8a19b
SHA256ee3dc4a83cc25fc5e07472c1892ca574f94c5ba78592a507e74c45de9f28cbe1
SHA5123fe278fe505404f21778d9d4c3a84feee9d24b13b035cf46b0dd3405a14c126f4cf971aaac2448fb6ad54960f350184e6ba83b808e6f0ecee203ea11d780dbe0
-
Filesize
543KB
MD54ff1d16f615960df4b28145bd93fa5e2
SHA11e01efc158228d03e864e408ff85ccdcc7a1aaf7
SHA2569fda2f161c7bac65b9bc6f68fd2d3d63c5a3d52ca68b19fa406b45b77eb0c0a2
SHA5126777868a296faba848d22eb8781ddfaf0230677df39001956e1d100e73cc9dd2e42e13ba46b5bc639914d9774e83733fe534f4426644a5c3734fa16432e3080d
-
Filesize
543KB
MD54ff1d16f615960df4b28145bd93fa5e2
SHA11e01efc158228d03e864e408ff85ccdcc7a1aaf7
SHA2569fda2f161c7bac65b9bc6f68fd2d3d63c5a3d52ca68b19fa406b45b77eb0c0a2
SHA5126777868a296faba848d22eb8781ddfaf0230677df39001956e1d100e73cc9dd2e42e13ba46b5bc639914d9774e83733fe534f4426644a5c3734fa16432e3080d
-
Filesize
292KB
MD56db26b63f9520c0b423287c686e72b02
SHA1f4775441561f158b153136405009cd1d78e139da
SHA256d4a8f3b1e24860348961e9d2d73203b7a87b74f46a068f37e5b4219abf6c798c
SHA5124e13be500f820b70495de53d5e0ffe5c2f144859645008fe3e1588fe4ecfb76c53edcb327cfe74dc6b8f8e8865269eacb146377ae88a1f8ad7b84191955ac430
-
Filesize
292KB
MD56db26b63f9520c0b423287c686e72b02
SHA1f4775441561f158b153136405009cd1d78e139da
SHA256d4a8f3b1e24860348961e9d2d73203b7a87b74f46a068f37e5b4219abf6c798c
SHA5124e13be500f820b70495de53d5e0ffe5c2f144859645008fe3e1588fe4ecfb76c53edcb327cfe74dc6b8f8e8865269eacb146377ae88a1f8ad7b84191955ac430
-
Filesize
350KB
MD5fa074277475a86387d69beaa9d7253e9
SHA19d1d94e841de8eaaa038d11310a2f0d130f6bfb6
SHA2560daed8f896d1b3132d8007cd2da5f5f329efbe1e9235351010abe90b5a0f3d55
SHA5120cf1608aa51af1762cb0b15c6f1357eb8fb9cb793a9e3fe5b959a7585fbb3d6ba14b63da784eb5d7a680d075ed7f78e472d80243887c73be6eee0416e400c252
-
Filesize
350KB
MD5fa074277475a86387d69beaa9d7253e9
SHA19d1d94e841de8eaaa038d11310a2f0d130f6bfb6
SHA2560daed8f896d1b3132d8007cd2da5f5f329efbe1e9235351010abe90b5a0f3d55
SHA5120cf1608aa51af1762cb0b15c6f1357eb8fb9cb793a9e3fe5b959a7585fbb3d6ba14b63da784eb5d7a680d075ed7f78e472d80243887c73be6eee0416e400c252