Analysis
-
max time kernel
109s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:05
Static task
static1
Behavioral task
behavioral1
Sample
769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe
Resource
win10v2004-20230221-en
General
-
Target
769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe
-
Size
685KB
-
MD5
6642cd46cf55ff860915cb6605b62c92
-
SHA1
fc82cac0ee300d34fd717bceb8b7a0b2ae8ab55f
-
SHA256
769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391
-
SHA512
05b409812afec8a4735a54692d9b0134842ad0dc1280829f4409f556a3f452e878e17b65bb4032a7c9e7b55538292073a59ccb906bc9d91879e796fd9d1e9b2e
-
SSDEEP
12288:2Mrdy902Vl6OfHR/wxsqSWue4J1URdUO7BUxyEVY44zTphBd:3yJxS8WuDJ6RdUauxyEVYb37T
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2106.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1940-189-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-190-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-192-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-194-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-196-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-198-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-200-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-202-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-204-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-206-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-208-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-210-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-212-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-214-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-216-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-218-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-222-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/1940-226-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4400 un046930.exe 2796 pro2106.exe 1940 qu5680.exe 3036 si678954.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2106.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un046930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un046930.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1572 2796 WerFault.exe 87 2628 1940 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2796 pro2106.exe 2796 pro2106.exe 1940 qu5680.exe 1940 qu5680.exe 3036 si678954.exe 3036 si678954.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2796 pro2106.exe Token: SeDebugPrivilege 1940 qu5680.exe Token: SeDebugPrivilege 3036 si678954.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4400 1704 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe 86 PID 1704 wrote to memory of 4400 1704 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe 86 PID 1704 wrote to memory of 4400 1704 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe 86 PID 4400 wrote to memory of 2796 4400 un046930.exe 87 PID 4400 wrote to memory of 2796 4400 un046930.exe 87 PID 4400 wrote to memory of 2796 4400 un046930.exe 87 PID 4400 wrote to memory of 1940 4400 un046930.exe 93 PID 4400 wrote to memory of 1940 4400 un046930.exe 93 PID 4400 wrote to memory of 1940 4400 un046930.exe 93 PID 1704 wrote to memory of 3036 1704 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe 96 PID 1704 wrote to memory of 3036 1704 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe 96 PID 1704 wrote to memory of 3036 1704 769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe"C:\Users\Admin\AppData\Local\Temp\769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046930.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2106.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 10844⤵
- Program crash
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5680.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 19084⤵
- Program crash
PID:2628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678954.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678954.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2796 -ip 27961⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1940 -ip 19401⤵PID:4792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ccdd1f709158b448586f077e62aa41fb
SHA11755a2db2581831ce89de5105216648aa6e9231c
SHA256363a7337fe21c1fa13e469b02122e3355c84ce5523f07d5624db9cf4095e08a0
SHA51207b63aa3f241c749e15a442a36697ae06426e48d9913ad246ae32c52956b6774bb68406e4c6038219ad2540d9eefa24d76ddd243f06cb12a8de8fd3d441295c0
-
Filesize
175KB
MD5ccdd1f709158b448586f077e62aa41fb
SHA11755a2db2581831ce89de5105216648aa6e9231c
SHA256363a7337fe21c1fa13e469b02122e3355c84ce5523f07d5624db9cf4095e08a0
SHA51207b63aa3f241c749e15a442a36697ae06426e48d9913ad246ae32c52956b6774bb68406e4c6038219ad2540d9eefa24d76ddd243f06cb12a8de8fd3d441295c0
-
Filesize
543KB
MD5b6a4b489712e43f2c4bbd3e50f335fc8
SHA161980ed681da7a5116ec523b87b8370d3b631d1c
SHA2569e112b632c6dd16860f14b21e8088d95eaac0bd7f5774c2d97076e1bd2eac07b
SHA51296eba4f26da5ac455f515a564ea262254d807dbbebc5932cc72b937dee63d9fbab7cd5fa7e84a9a218aac3b7bcd2ec4f17b70654afbd5b342146c78e2050d09b
-
Filesize
543KB
MD5b6a4b489712e43f2c4bbd3e50f335fc8
SHA161980ed681da7a5116ec523b87b8370d3b631d1c
SHA2569e112b632c6dd16860f14b21e8088d95eaac0bd7f5774c2d97076e1bd2eac07b
SHA51296eba4f26da5ac455f515a564ea262254d807dbbebc5932cc72b937dee63d9fbab7cd5fa7e84a9a218aac3b7bcd2ec4f17b70654afbd5b342146c78e2050d09b
-
Filesize
292KB
MD512fb48a1bcc5e49657fd3abae867ce57
SHA17e54ee5fe778037593c89120b49e9188043d293e
SHA256660790f1fb4f527ca9ffbbd5150b8a73faecd53945f0c6e209fb6bb2dc17af73
SHA512579d62ab12e00553c416684adb97cdc5ebf7646e9eb72dd27944474103bfdb6b89c9c160731396a59bbd29779e5247f6caa9006e4596bfc4c62ce456faacef08
-
Filesize
292KB
MD512fb48a1bcc5e49657fd3abae867ce57
SHA17e54ee5fe778037593c89120b49e9188043d293e
SHA256660790f1fb4f527ca9ffbbd5150b8a73faecd53945f0c6e209fb6bb2dc17af73
SHA512579d62ab12e00553c416684adb97cdc5ebf7646e9eb72dd27944474103bfdb6b89c9c160731396a59bbd29779e5247f6caa9006e4596bfc4c62ce456faacef08
-
Filesize
350KB
MD5db4d930a0e8d2d256e7ffb5a5cc0ea3d
SHA10bd42f38ae6ead7a82886f1f736f4a3d9dba5dcc
SHA25637c9117a8fff4e0143eec0401f202536d10cd393eb56105cd6d1ed615701c9a9
SHA512e481c28289cc545246559f0cc6a518e33e3dd42203986db4ba31e5957745654830950c5968532232dc11c8832e64d46306b11448ac58fc603a450e0e0d92a6c1
-
Filesize
350KB
MD5db4d930a0e8d2d256e7ffb5a5cc0ea3d
SHA10bd42f38ae6ead7a82886f1f736f4a3d9dba5dcc
SHA25637c9117a8fff4e0143eec0401f202536d10cd393eb56105cd6d1ed615701c9a9
SHA512e481c28289cc545246559f0cc6a518e33e3dd42203986db4ba31e5957745654830950c5968532232dc11c8832e64d46306b11448ac58fc603a450e0e0d92a6c1