Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:11
Static task
static1
Behavioral task
behavioral1
Sample
28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe
Resource
win10v2004-20230221-en
General
-
Target
28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe
-
Size
685KB
-
MD5
31a9d785f08a2246fad7ba4bc892b0af
-
SHA1
22a83bcaf0277751b741b1fe345b526b357e7aac
-
SHA256
28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04
-
SHA512
8bdbe1ccdeabedcedf1b060dce7090caf03cda1bffb800fa13dd596ad0b53a896a7e8438589dd8b05618e07f0ecfa18c2afac768fd640d628c851bd76758e741
-
SSDEEP
12288:yMrAy90+JrAYxJ5kLnF/P537tGa7f46nBL9lsE0aEQVDP+i8:mydJrxxctPh7tn7f4SB9lsE0afVDPp8
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7666.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4412-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-190-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-193-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-195-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-197-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-215-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-217-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-219-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-225-0x0000000004CD0000-0x0000000004D0E000-memory.dmp family_redline behavioral1/memory/4412-1108-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline behavioral1/memory/4412-1110-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 320 un038508.exe 380 pro7666.exe 4412 qu8837.exe 1820 si963414.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7666.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un038508.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un038508.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2716 380 WerFault.exe 82 3156 4412 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 380 pro7666.exe 380 pro7666.exe 4412 qu8837.exe 4412 qu8837.exe 1820 si963414.exe 1820 si963414.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 380 pro7666.exe Token: SeDebugPrivilege 4412 qu8837.exe Token: SeDebugPrivilege 1820 si963414.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 320 2028 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe 81 PID 2028 wrote to memory of 320 2028 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe 81 PID 2028 wrote to memory of 320 2028 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe 81 PID 320 wrote to memory of 380 320 un038508.exe 82 PID 320 wrote to memory of 380 320 un038508.exe 82 PID 320 wrote to memory of 380 320 un038508.exe 82 PID 320 wrote to memory of 4412 320 un038508.exe 85 PID 320 wrote to memory of 4412 320 un038508.exe 85 PID 320 wrote to memory of 4412 320 un038508.exe 85 PID 2028 wrote to memory of 1820 2028 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe 89 PID 2028 wrote to memory of 1820 2028 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe 89 PID 2028 wrote to memory of 1820 2028 28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe"C:\Users\Admin\AppData\Local\Temp\28d3f6b12d81aaec2e67608a3e4ce2e173fc75a89cef353d268e8264d5be9a04.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038508.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038508.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7666.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7666.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 10844⤵
- Program crash
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8837.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8837.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 19924⤵
- Program crash
PID:3156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si963414.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si963414.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 380 -ip 3801⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4412 -ip 44121⤵PID:1512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58bdd3d9dbbea97b52f9a305667ae453c
SHA17ba4f53784687fda8167a5b787ac61b7e759d77d
SHA25634ff4349b7a4b396ab1161bafc473782f9f6a511f343a588ad98accb0d042133
SHA5122329c20b89375ffe9de3b232d9ee476e0b9c8bcd78e657394970918d5ed739edbeeb00a831186aa9e1ab382fbb9ad573aae340314f53a7959bd89f636a64c0a2
-
Filesize
175KB
MD58bdd3d9dbbea97b52f9a305667ae453c
SHA17ba4f53784687fda8167a5b787ac61b7e759d77d
SHA25634ff4349b7a4b396ab1161bafc473782f9f6a511f343a588ad98accb0d042133
SHA5122329c20b89375ffe9de3b232d9ee476e0b9c8bcd78e657394970918d5ed739edbeeb00a831186aa9e1ab382fbb9ad573aae340314f53a7959bd89f636a64c0a2
-
Filesize
543KB
MD524f33590209966920c5609b56474cd2e
SHA1b843ce531e9e38741840aa396aee1825c042838f
SHA25659687162d6ec19c4a00cf9e03449f57ed97b938927431c8e8699b71a1f9f95ad
SHA512dadc647cba827d934e6ddd601ba35cde6051fbf294cf2581b1c686f88c98ad8146e191ae5edd2d9d93280a40ae4d9f9d4be776ec222580139e2130aa46a639a5
-
Filesize
543KB
MD524f33590209966920c5609b56474cd2e
SHA1b843ce531e9e38741840aa396aee1825c042838f
SHA25659687162d6ec19c4a00cf9e03449f57ed97b938927431c8e8699b71a1f9f95ad
SHA512dadc647cba827d934e6ddd601ba35cde6051fbf294cf2581b1c686f88c98ad8146e191ae5edd2d9d93280a40ae4d9f9d4be776ec222580139e2130aa46a639a5
-
Filesize
292KB
MD5013c18e266a9c70b131730fca875fe2b
SHA1126961180a92f0c7aaf00e7dbc2d44fbbca22427
SHA256101e8e4a8b6f394d961314e4f935e2d46a8eb5923948877c9261eea3b0887ed4
SHA51282fc340d2699b2b2da65c0134728ed56fd6f332e68ab5cd43a577fc45d6752c41cda1de040a992face6d9c52c0f54a1bb56e8cce53bb265a0b345c2be6148c95
-
Filesize
292KB
MD5013c18e266a9c70b131730fca875fe2b
SHA1126961180a92f0c7aaf00e7dbc2d44fbbca22427
SHA256101e8e4a8b6f394d961314e4f935e2d46a8eb5923948877c9261eea3b0887ed4
SHA51282fc340d2699b2b2da65c0134728ed56fd6f332e68ab5cd43a577fc45d6752c41cda1de040a992face6d9c52c0f54a1bb56e8cce53bb265a0b345c2be6148c95
-
Filesize
350KB
MD58139754de4c8f1aec4ed11e3c9ac801c
SHA1a36ab41c60b1009c0870178335ed0e677b3d5756
SHA2568d8f8a59ff3b0ad21100928f0064cc17df14ec45aaba1586f5ecc63b84270ced
SHA512d6a86c24dc3b9139756d1499f829caf8e045405abd0fa8e3eebbf4148fe75580465bc38de0ba751ed5ac6a20a0b769cc65d5d8b83b04c12160d1b53abaab4b81
-
Filesize
350KB
MD58139754de4c8f1aec4ed11e3c9ac801c
SHA1a36ab41c60b1009c0870178335ed0e677b3d5756
SHA2568d8f8a59ff3b0ad21100928f0064cc17df14ec45aaba1586f5ecc63b84270ced
SHA512d6a86c24dc3b9139756d1499f829caf8e045405abd0fa8e3eebbf4148fe75580465bc38de0ba751ed5ac6a20a0b769cc65d5d8b83b04c12160d1b53abaab4b81