Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:16
Static task
static1
Behavioral task
behavioral1
Sample
3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe
Resource
win10v2004-20230220-en
General
-
Target
3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe
-
Size
685KB
-
MD5
8977235f2af135f70a07d0c141d32a6d
-
SHA1
f73a74546078498a9098219433b39651ddc149fd
-
SHA256
3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c
-
SHA512
e0f1285bf26222af0b293b8f16b20fced93b06f2a4f22e9a8dcc16581082472a3828a7ac0b9dbea929a9f671fb653504b42ab87994b3b5da2b303f2d8109dbd2
-
SSDEEP
12288:CMryy90uDzYTVcrjM2cq8DjPOpzjo4Ia1N+6QFAnBX7XEYYhNmiYDXH8:MyjzSVglctYzjua1NlQe17XEYAws
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4375.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4884-189-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-192-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-190-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-194-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-196-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-198-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-200-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-202-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-204-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-206-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-211-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-214-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-216-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-218-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-220-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-222-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-224-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-226-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4884-1107-0x0000000002860000-0x0000000002870000-memory.dmp family_redline behavioral1/memory/4884-1112-0x0000000002860000-0x0000000002870000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1592 un224726.exe 1324 pro4375.exe 4884 qu8064.exe 4648 si012046.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4375.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un224726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un224726.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4732 1324 WerFault.exe 84 4216 4884 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1324 pro4375.exe 1324 pro4375.exe 4884 qu8064.exe 4884 qu8064.exe 4648 si012046.exe 4648 si012046.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1324 pro4375.exe Token: SeDebugPrivilege 4884 qu8064.exe Token: SeDebugPrivilege 4648 si012046.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1592 1512 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe 83 PID 1512 wrote to memory of 1592 1512 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe 83 PID 1512 wrote to memory of 1592 1512 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe 83 PID 1592 wrote to memory of 1324 1592 un224726.exe 84 PID 1592 wrote to memory of 1324 1592 un224726.exe 84 PID 1592 wrote to memory of 1324 1592 un224726.exe 84 PID 1592 wrote to memory of 4884 1592 un224726.exe 90 PID 1592 wrote to memory of 4884 1592 un224726.exe 90 PID 1592 wrote to memory of 4884 1592 un224726.exe 90 PID 1512 wrote to memory of 4648 1512 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe 93 PID 1512 wrote to memory of 4648 1512 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe 93 PID 1512 wrote to memory of 4648 1512 3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe"C:\Users\Admin\AppData\Local\Temp\3e04f2b07bbbcdb6e224b00b98f17e1e2f4d5846353c08a44d1333d6f140124c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224726.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224726.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4375.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4375.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 10364⤵
- Program crash
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8064.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8064.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 18564⤵
- Program crash
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si012046.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si012046.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1324 -ip 13241⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4884 -ip 48841⤵PID:1292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD563c47956c95c18c8831efc6b6970562f
SHA1ba753842f19a16e0e252ec9f967fd071ea091f93
SHA2560aeb4dafb016e8498165a34676fda41f8ec69b528571f273fdc8714d56b37a67
SHA51241fcc33400b511731aed60ac45d461bc8c49a18b61f2a6396a773eec4cac13072654fb2c9ba5408b839aad30955fb47f077c24ce34722e4b0eacc5e8efe72c5a
-
Filesize
175KB
MD563c47956c95c18c8831efc6b6970562f
SHA1ba753842f19a16e0e252ec9f967fd071ea091f93
SHA2560aeb4dafb016e8498165a34676fda41f8ec69b528571f273fdc8714d56b37a67
SHA51241fcc33400b511731aed60ac45d461bc8c49a18b61f2a6396a773eec4cac13072654fb2c9ba5408b839aad30955fb47f077c24ce34722e4b0eacc5e8efe72c5a
-
Filesize
543KB
MD5786cdb32615dbf78eb1ad8ec44417847
SHA1184047ffdc00bbd29261c166a395f21a421883cd
SHA256ac7aaa526e615d0feda2d5e03ef29057295a38eb438e79129ef582749a7f584c
SHA512515f9961b77f51acf4701b361dc1abd4c61dba4a0fd25c0a68ae5cb3b1cad356863454de2d32d2c4f71ddf7a51d3acad424ed5d781deb92237a0d906d234012f
-
Filesize
543KB
MD5786cdb32615dbf78eb1ad8ec44417847
SHA1184047ffdc00bbd29261c166a395f21a421883cd
SHA256ac7aaa526e615d0feda2d5e03ef29057295a38eb438e79129ef582749a7f584c
SHA512515f9961b77f51acf4701b361dc1abd4c61dba4a0fd25c0a68ae5cb3b1cad356863454de2d32d2c4f71ddf7a51d3acad424ed5d781deb92237a0d906d234012f
-
Filesize
292KB
MD56cf1c3ee00668aaff69ce838916711ee
SHA1c9a625942c08f365d1cc1154bf38f6d0a639c9ff
SHA2563f6674031f4fd6aa79b02ea38f8c79e35cca7a8381bec285118206d8ae99001a
SHA512998970ed9e3e124cb4a78eb804cf8ad483671cec1efc95ca2d75c4e82bea7d29bbecf872362ce1a51225282f17b08115b38a4130c02404c9f47181801555b22c
-
Filesize
292KB
MD56cf1c3ee00668aaff69ce838916711ee
SHA1c9a625942c08f365d1cc1154bf38f6d0a639c9ff
SHA2563f6674031f4fd6aa79b02ea38f8c79e35cca7a8381bec285118206d8ae99001a
SHA512998970ed9e3e124cb4a78eb804cf8ad483671cec1efc95ca2d75c4e82bea7d29bbecf872362ce1a51225282f17b08115b38a4130c02404c9f47181801555b22c
-
Filesize
350KB
MD5c9d7caa33e44c8009fa8a36fd40b6049
SHA1a8ff2c027de759555b781517ba7dcb4db5a30ba6
SHA256f37cdb221a17c1573984f96486d5a99b96d033d4bdab6c326d7b51879332f673
SHA512a7d72cbbbb29094880e82811b78fd2dcdcd56090b918d6e493529e7f98a20dabcd3d1251e3cec5c45ed1870b85bed80f0414e471151dc822ae3d870f530c05b5
-
Filesize
350KB
MD5c9d7caa33e44c8009fa8a36fd40b6049
SHA1a8ff2c027de759555b781517ba7dcb4db5a30ba6
SHA256f37cdb221a17c1573984f96486d5a99b96d033d4bdab6c326d7b51879332f673
SHA512a7d72cbbbb29094880e82811b78fd2dcdcd56090b918d6e493529e7f98a20dabcd3d1251e3cec5c45ed1870b85bed80f0414e471151dc822ae3d870f530c05b5