Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 15:12
Static task
static1
Behavioral task
behavioral1
Sample
4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe
Resource
win10-20230220-en
General
-
Target
4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe
-
Size
685KB
-
MD5
17fa825648372b80bfd8390c8820eaa3
-
SHA1
c1fe513cd5d21b0da758f005e12633a2f8771a42
-
SHA256
4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066
-
SHA512
8e37ed1bfe5428015783508df849b1de20ce4ceb7514a9ce9b82f8ff78c425bd0dd7437f676ef62964df3b96db9377ac25704c552ba6141a34e2bfa25a5b02df
-
SSDEEP
12288:hMrEy90OLrG4PpYYkJ0kf4jzL3vbn/QSPNJb+wGLBSqLEb3hNNilGbU0:1yhvGaYpN4j3jIjAqLEb7r
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7571.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2096-180-0x00000000023C0000-0x0000000002406000-memory.dmp family_redline behavioral1/memory/2096-181-0x0000000004C90000-0x0000000004CD4000-memory.dmp family_redline behavioral1/memory/2096-182-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-183-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-185-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-187-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-189-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-191-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-193-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-195-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-197-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-199-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-201-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-203-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-205-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-207-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-209-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-211-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-213-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2096-218-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3708 un491714.exe 4128 pro7571.exe 2096 qu6939.exe 3796 si037286.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7571.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un491714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un491714.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4128 pro7571.exe 4128 pro7571.exe 2096 qu6939.exe 2096 qu6939.exe 3796 si037286.exe 3796 si037286.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4128 pro7571.exe Token: SeDebugPrivilege 2096 qu6939.exe Token: SeDebugPrivilege 3796 si037286.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3708 3724 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe 66 PID 3724 wrote to memory of 3708 3724 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe 66 PID 3724 wrote to memory of 3708 3724 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe 66 PID 3708 wrote to memory of 4128 3708 un491714.exe 67 PID 3708 wrote to memory of 4128 3708 un491714.exe 67 PID 3708 wrote to memory of 4128 3708 un491714.exe 67 PID 3708 wrote to memory of 2096 3708 un491714.exe 68 PID 3708 wrote to memory of 2096 3708 un491714.exe 68 PID 3708 wrote to memory of 2096 3708 un491714.exe 68 PID 3724 wrote to memory of 3796 3724 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe 70 PID 3724 wrote to memory of 3796 3724 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe 70 PID 3724 wrote to memory of 3796 3724 4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe"C:\Users\Admin\AppData\Local\Temp\4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491714.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7571.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7571.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6939.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6939.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037286.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59e960cd9baeaa3467be728ffa2a8a18d
SHA1b8d213950e0feea5d2214aeb396428b4ef109377
SHA2565b029993e7d0ceb190df7d369ee79b50da09b3632bee7d4e8ef926aebe8249bc
SHA51202c16c5d15d981c7df977e0bdea43bcff3b27e8a4ffe33c12ee9149bb703f460f0f13a76b1475fe414660d3d9a854ed7053f4f3841f691973de8b5952970fe63
-
Filesize
175KB
MD59e960cd9baeaa3467be728ffa2a8a18d
SHA1b8d213950e0feea5d2214aeb396428b4ef109377
SHA2565b029993e7d0ceb190df7d369ee79b50da09b3632bee7d4e8ef926aebe8249bc
SHA51202c16c5d15d981c7df977e0bdea43bcff3b27e8a4ffe33c12ee9149bb703f460f0f13a76b1475fe414660d3d9a854ed7053f4f3841f691973de8b5952970fe63
-
Filesize
543KB
MD51f31f8eb4cd3b05545a875b371d122f8
SHA172685997925ce72d5670357d98e412d151e615da
SHA256d84292019a3fb3ef3716bb12e4a3cf7272b7528921767fd04adc2bacc3d8d3ac
SHA5122791bee9dbd0539929fb2cbd639ed7b9ceb2d12fb7089191580be9d692765c0f3148d0c65ad56d73f8f3eef87581c763479179778138ec1054f02c8fb7a1eefd
-
Filesize
543KB
MD51f31f8eb4cd3b05545a875b371d122f8
SHA172685997925ce72d5670357d98e412d151e615da
SHA256d84292019a3fb3ef3716bb12e4a3cf7272b7528921767fd04adc2bacc3d8d3ac
SHA5122791bee9dbd0539929fb2cbd639ed7b9ceb2d12fb7089191580be9d692765c0f3148d0c65ad56d73f8f3eef87581c763479179778138ec1054f02c8fb7a1eefd
-
Filesize
292KB
MD5bf835b49bfe271b5506bf5cb16f91399
SHA1928b872084c02aca05c1ec8fb14fca111fc27761
SHA25653b94ac984dca8ec9b7c84047b3122a43e96758c43073071118496e3a7ac45eb
SHA51211329fb30c7180c2204fa99cd11909a3fe5e3b1f13ad52d184ec918dd10d9ab17a881a78b38102866269a5243091ed9668935de3e8cc6d535295f7208b5e7cf1
-
Filesize
292KB
MD5bf835b49bfe271b5506bf5cb16f91399
SHA1928b872084c02aca05c1ec8fb14fca111fc27761
SHA25653b94ac984dca8ec9b7c84047b3122a43e96758c43073071118496e3a7ac45eb
SHA51211329fb30c7180c2204fa99cd11909a3fe5e3b1f13ad52d184ec918dd10d9ab17a881a78b38102866269a5243091ed9668935de3e8cc6d535295f7208b5e7cf1
-
Filesize
350KB
MD514dcfa22a7cd593d389bf36532751428
SHA1cb9ac05446d26886beafe4ddb7bff7147d335699
SHA256cf3269f560b7c2f75a6ad25b0370ca62b1670c4cbe88d67a87d698d0a8842f16
SHA5128362cc682bf94f08d4fd62f458b1c4952910237ee92d8b113e7cbf8cb5805b63e47643cfe1973f491df7da821ac5d5d8462d64dc5c3d47971136256ecfed0a12
-
Filesize
350KB
MD514dcfa22a7cd593d389bf36532751428
SHA1cb9ac05446d26886beafe4ddb7bff7147d335699
SHA256cf3269f560b7c2f75a6ad25b0370ca62b1670c4cbe88d67a87d698d0a8842f16
SHA5128362cc682bf94f08d4fd62f458b1c4952910237ee92d8b113e7cbf8cb5805b63e47643cfe1973f491df7da821ac5d5d8462d64dc5c3d47971136256ecfed0a12