Analysis
-
max time kernel
98s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe
Resource
win10v2004-20230221-en
General
-
Target
c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe
-
Size
685KB
-
MD5
047b70fdf36d61c00e3e6703315e5111
-
SHA1
f92d436aa95695e64cf409a079cc24466fdc8313
-
SHA256
c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7
-
SHA512
72abc8874d5aadbb29495d8b01e36a0af04e64f2aa22e2372fbccb2a0db0158548dc3433495c1c69d1a985d48c237ea9f339d6ee6cbf225c76ab4feef15a6cf8
-
SSDEEP
12288:PMroy90/w7OvptzrTgiEr+LjrCzjoaIKVZ7U8f0lBZzfEKL6XyGfpRvX2xG:7y4nR1nghriCzjMK39ijzfE/NzvXSG
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6419.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4496-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4496-1109-0x0000000004D10000-0x0000000004D20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 908 un229498.exe 700 pro6419.exe 4496 qu9978.exe 3336 si552927.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6419.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6419.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un229498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un229498.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3472 700 WerFault.exe 84 1916 4496 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 700 pro6419.exe 700 pro6419.exe 4496 qu9978.exe 4496 qu9978.exe 3336 si552927.exe 3336 si552927.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 700 pro6419.exe Token: SeDebugPrivilege 4496 qu9978.exe Token: SeDebugPrivilege 3336 si552927.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4912 wrote to memory of 908 4912 c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe 83 PID 4912 wrote to memory of 908 4912 c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe 83 PID 4912 wrote to memory of 908 4912 c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe 83 PID 908 wrote to memory of 700 908 un229498.exe 84 PID 908 wrote to memory of 700 908 un229498.exe 84 PID 908 wrote to memory of 700 908 un229498.exe 84 PID 908 wrote to memory of 4496 908 un229498.exe 94 PID 908 wrote to memory of 4496 908 un229498.exe 94 PID 908 wrote to memory of 4496 908 un229498.exe 94 PID 4912 wrote to memory of 3336 4912 c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe 98 PID 4912 wrote to memory of 3336 4912 c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe 98 PID 4912 wrote to memory of 3336 4912 c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe"C:\Users\Admin\AppData\Local\Temp\c8230d8ad6f353c561bbe3bcf3b6c78719a1eeb94769b1b742830f058e802bc7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229498.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229498.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6419.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6419.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 10884⤵
- Program crash
PID:3472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9978.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9978.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 19124⤵
- Program crash
PID:1916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552927.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 700 -ip 7001⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4496 -ip 44961⤵PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ff25ed03c562d22e0c11f6b4518bd947
SHA160a06891190d0124d06ccc8c2028bd4cd7cc0f1e
SHA2562927212e16d6782bcacfc68bdae1e1b41a8a9e13881f740e9eca11d4d537e00e
SHA5124d8b7c00cb95f41e7a39e552f7e1dcf1b977a0f1b88cbff9f560eb596a977429058ff7de05e9f9b39057d514cd68a4fcacd76540a87692c02bebb47e62b1dd93
-
Filesize
175KB
MD5ff25ed03c562d22e0c11f6b4518bd947
SHA160a06891190d0124d06ccc8c2028bd4cd7cc0f1e
SHA2562927212e16d6782bcacfc68bdae1e1b41a8a9e13881f740e9eca11d4d537e00e
SHA5124d8b7c00cb95f41e7a39e552f7e1dcf1b977a0f1b88cbff9f560eb596a977429058ff7de05e9f9b39057d514cd68a4fcacd76540a87692c02bebb47e62b1dd93
-
Filesize
543KB
MD5bd06cf940cef26e87fd59a8ad6cacb82
SHA18bd826ab22d02eb42d29b72a812638fd7e6dcdae
SHA256f8a8e380b6e47202187ac954147227398bd1461c16334cde6c9e43143cdd26b8
SHA512558c91531f42a3b47cdcf37267f8c2b30c27503e3ceb1957f7addb4a86ab721f52e28df803993c91f444e38c636f420410dcb3b52092fcd54db14545bafd81f2
-
Filesize
543KB
MD5bd06cf940cef26e87fd59a8ad6cacb82
SHA18bd826ab22d02eb42d29b72a812638fd7e6dcdae
SHA256f8a8e380b6e47202187ac954147227398bd1461c16334cde6c9e43143cdd26b8
SHA512558c91531f42a3b47cdcf37267f8c2b30c27503e3ceb1957f7addb4a86ab721f52e28df803993c91f444e38c636f420410dcb3b52092fcd54db14545bafd81f2
-
Filesize
292KB
MD5b478dd8d77a5811f1de67f94b3afb8a8
SHA1ad173175472b0e03ac51ffc7e2ed9c5a7c991dc6
SHA25686e3dc877497d9c5ff141db96504b53f7fa314b6721769b426a6f4f71d5ee30c
SHA512035e72d8a69f6a742c45b326768d42424d795ef5b1bbf54ee03799929608630040ed1ea8504c05706962f50448df1bc2fffd5f1c40d4f24f8d806008c44f1c0b
-
Filesize
292KB
MD5b478dd8d77a5811f1de67f94b3afb8a8
SHA1ad173175472b0e03ac51ffc7e2ed9c5a7c991dc6
SHA25686e3dc877497d9c5ff141db96504b53f7fa314b6721769b426a6f4f71d5ee30c
SHA512035e72d8a69f6a742c45b326768d42424d795ef5b1bbf54ee03799929608630040ed1ea8504c05706962f50448df1bc2fffd5f1c40d4f24f8d806008c44f1c0b
-
Filesize
350KB
MD55f974882c9443ab07b97bb472a202be8
SHA12c38ce731e5a7b733361f95dea216cbb1e3e10d8
SHA25623245ea989b26228c58792ba85fcede700b57dd1fb9447fca036b70467f5a0fc
SHA512295e664ee490b9e2bb972e6e3fb6ad960a39ff1d10c7d43e034706416e542f0c4c88cc64de9390eb6bfe1370f6ec3e62771fff289035fa1b457e4a041ca30990
-
Filesize
350KB
MD55f974882c9443ab07b97bb472a202be8
SHA12c38ce731e5a7b733361f95dea216cbb1e3e10d8
SHA25623245ea989b26228c58792ba85fcede700b57dd1fb9447fca036b70467f5a0fc
SHA512295e664ee490b9e2bb972e6e3fb6ad960a39ff1d10c7d43e034706416e542f0c4c88cc64de9390eb6bfe1370f6ec3e62771fff289035fa1b457e4a041ca30990