Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:09
Static task
static1
Behavioral task
behavioral1
Sample
0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe
Resource
win10v2004-20230220-en
General
-
Target
0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe
-
Size
685KB
-
MD5
7e7eaa3440c8c57494cd1c2f8d6ce795
-
SHA1
b4a3ffa4c0245cac55faa8962fb9fc6561b852c6
-
SHA256
0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80
-
SHA512
157d02f02d33e7a501f577486518960a5b797b43377081ac149dedbe5f9cc6df9761a56d42a5b3c086565665b578141ff7ce8fb986b9ee77c6b98530f0e763a6
-
SSDEEP
12288:XMrey90ONMEq2fAn4UvVW/+Hs8f/C7PPjcBpdJE/sTxBWuy:pybq2fAnDvk+H5fiPAzdJE/sbWb
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6739.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6739.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4180-191-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-192-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-194-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-198-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-202-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-204-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-206-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-208-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-210-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-212-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-214-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-216-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-218-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-220-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-222-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-224-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-226-0x0000000002760000-0x000000000279E000-memory.dmp family_redline behavioral1/memory/4180-228-0x0000000002760000-0x000000000279E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3588 un905260.exe 2000 pro6739.exe 4180 qu2920.exe 2588 si524835.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6739.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un905260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un905260.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1120 2000 WerFault.exe 84 832 4180 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2000 pro6739.exe 2000 pro6739.exe 4180 qu2920.exe 4180 qu2920.exe 2588 si524835.exe 2588 si524835.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2000 pro6739.exe Token: SeDebugPrivilege 4180 qu2920.exe Token: SeDebugPrivilege 2588 si524835.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3588 4460 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe 83 PID 4460 wrote to memory of 3588 4460 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe 83 PID 4460 wrote to memory of 3588 4460 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe 83 PID 3588 wrote to memory of 2000 3588 un905260.exe 84 PID 3588 wrote to memory of 2000 3588 un905260.exe 84 PID 3588 wrote to memory of 2000 3588 un905260.exe 84 PID 3588 wrote to memory of 4180 3588 un905260.exe 93 PID 3588 wrote to memory of 4180 3588 un905260.exe 93 PID 3588 wrote to memory of 4180 3588 un905260.exe 93 PID 4460 wrote to memory of 2588 4460 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe 98 PID 4460 wrote to memory of 2588 4460 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe 98 PID 4460 wrote to memory of 2588 4460 0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe"C:\Users\Admin\AppData\Local\Temp\0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905260.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6739.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6739.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 11004⤵
- Program crash
PID:1120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2920.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 17884⤵
- Program crash
PID:832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si524835.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si524835.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2000 -ip 20001⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4180 -ip 41801⤵PID:1496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58d88ce986886396a50b33d306769cc94
SHA17e3a2bcea8fe43b7f555e7c63014a01542b5fd9f
SHA25669a337e03a1347e2dd8952964192fa9d9cd6132d64bcaf179196b13bb0fe36a6
SHA512dbf06269ac4e1fc364081cfa7a35fe1becad879d481fdb4b052422bf567dc968ed0883a169b1cb82a07264bf918b6df8d543073a452ca2907f782528d1a3f3e8
-
Filesize
175KB
MD58d88ce986886396a50b33d306769cc94
SHA17e3a2bcea8fe43b7f555e7c63014a01542b5fd9f
SHA25669a337e03a1347e2dd8952964192fa9d9cd6132d64bcaf179196b13bb0fe36a6
SHA512dbf06269ac4e1fc364081cfa7a35fe1becad879d481fdb4b052422bf567dc968ed0883a169b1cb82a07264bf918b6df8d543073a452ca2907f782528d1a3f3e8
-
Filesize
543KB
MD57e408d4f02dc596758f472a8735a663e
SHA130efd0d82944f74edb50019edfc0fec5eecef15a
SHA2564e5a9f67ce1d4dd7363ecc9bdba5a3ac0cf27851ffa0e08711cf820713362a6a
SHA512f43c2297837d86a67ee9fda7b7add952035c0349b335bc4e0f6c709ffbc36a076b415e51280e9a69ffc8a593f5b6d8bb0d957e178e9bf1969dd2643add78b695
-
Filesize
543KB
MD57e408d4f02dc596758f472a8735a663e
SHA130efd0d82944f74edb50019edfc0fec5eecef15a
SHA2564e5a9f67ce1d4dd7363ecc9bdba5a3ac0cf27851ffa0e08711cf820713362a6a
SHA512f43c2297837d86a67ee9fda7b7add952035c0349b335bc4e0f6c709ffbc36a076b415e51280e9a69ffc8a593f5b6d8bb0d957e178e9bf1969dd2643add78b695
-
Filesize
292KB
MD5127e2190510594ea00d18f892945121d
SHA19627fc654dcdd60bffee6e03d0fb8a1c03dc0dfb
SHA2567706a55b1e4094d2e20e8dad8bdc88244c84b8cc40d764b8100b48089ffc95f1
SHA51293159c2a77efd34a7383c5c896d532e2df2511ad28f262b32f7ef69e98172e3620ead1c3020acba232579d3b31d8f70efd96f475232698cfff8d6e2833eabaaa
-
Filesize
292KB
MD5127e2190510594ea00d18f892945121d
SHA19627fc654dcdd60bffee6e03d0fb8a1c03dc0dfb
SHA2567706a55b1e4094d2e20e8dad8bdc88244c84b8cc40d764b8100b48089ffc95f1
SHA51293159c2a77efd34a7383c5c896d532e2df2511ad28f262b32f7ef69e98172e3620ead1c3020acba232579d3b31d8f70efd96f475232698cfff8d6e2833eabaaa
-
Filesize
350KB
MD5d7f7a27f236617e304ff56be60c542f7
SHA10b3734a1857bbee8f364c471f34812218adbf990
SHA2561b3ba75751bdbd936d823650db229e55c471b2bc2312a24a23ad0c57644ce90e
SHA512592ea09c62df8c4932c982919a4601b7fd1ccd62d5bd6868fe357b826bfe7400bf5d04d29d6efdbd926fb72047d1fac876ccbf19594b90af843d1c88110ede3f
-
Filesize
350KB
MD5d7f7a27f236617e304ff56be60c542f7
SHA10b3734a1857bbee8f364c471f34812218adbf990
SHA2561b3ba75751bdbd936d823650db229e55c471b2bc2312a24a23ad0c57644ce90e
SHA512592ea09c62df8c4932c982919a4601b7fd1ccd62d5bd6868fe357b826bfe7400bf5d04d29d6efdbd926fb72047d1fac876ccbf19594b90af843d1c88110ede3f