Analysis
-
max time kernel
56s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 15:18
Static task
static1
Behavioral task
behavioral1
Sample
89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe
Resource
win10-20230220-en
General
-
Target
89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe
-
Size
685KB
-
MD5
108b711803fae477654e6c87f864a86f
-
SHA1
685be4172fdb9520268d9d38cb6a1d503be3fb00
-
SHA256
89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61
-
SHA512
00954776847fa4d37bc50cbaec78e553d49c08efc4abdb2100d6082886b0eed2db7ac07fdf172d39a64b7d322359bc9ff1da492e091eebe8fd5336278a35a781
-
SSDEEP
12288:SMrYy90861hFipmG923s3Fh2XeQrDW+JrpW6kUyBabTEV4MtcPcEI:uyDCaz28VhSWErpxIIbTElcEF
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3383.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3812-177-0x0000000000A00000-0x0000000000A46000-memory.dmp family_redline behavioral1/memory/3812-178-0x0000000002400000-0x0000000002444000-memory.dmp family_redline behavioral1/memory/3812-180-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-179-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-182-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-184-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-186-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-188-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-190-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-192-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-194-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-196-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-198-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-200-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-202-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-204-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-206-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-208-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-210-0x0000000002400000-0x000000000243E000-memory.dmp family_redline behavioral1/memory/3812-212-0x0000000002400000-0x000000000243E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5032 un698340.exe 2080 pro3383.exe 3812 qu3155.exe 3620 si508123.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3383.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3383.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un698340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un698340.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2080 pro3383.exe 2080 pro3383.exe 3812 qu3155.exe 3812 qu3155.exe 3620 si508123.exe 3620 si508123.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 pro3383.exe Token: SeDebugPrivilege 3812 qu3155.exe Token: SeDebugPrivilege 3620 si508123.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4540 wrote to memory of 5032 4540 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe 66 PID 4540 wrote to memory of 5032 4540 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe 66 PID 4540 wrote to memory of 5032 4540 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe 66 PID 5032 wrote to memory of 2080 5032 un698340.exe 67 PID 5032 wrote to memory of 2080 5032 un698340.exe 67 PID 5032 wrote to memory of 2080 5032 un698340.exe 67 PID 5032 wrote to memory of 3812 5032 un698340.exe 68 PID 5032 wrote to memory of 3812 5032 un698340.exe 68 PID 5032 wrote to memory of 3812 5032 un698340.exe 68 PID 4540 wrote to memory of 3620 4540 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe 70 PID 4540 wrote to memory of 3620 4540 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe 70 PID 4540 wrote to memory of 3620 4540 89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe"C:\Users\Admin\AppData\Local\Temp\89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698340.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698340.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3383.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3155.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3155.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508123.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b4156fe965ff16c15684e6a94dacafa9
SHA1fe6eda1de10f99891285d391a539eb4ae2c6fbca
SHA25693303ee7a666d40063a02775147a4de4469133272ee06d3d8fad6a41a76dc3ae
SHA5129d58503e7f620cbb9478c8f46b2159cd418a3b2440e11df0e676a9ca2cb680f61fedbd4558d733d228f4532466675affc25394fa8fae444eaab2250fb1e4baab
-
Filesize
175KB
MD5b4156fe965ff16c15684e6a94dacafa9
SHA1fe6eda1de10f99891285d391a539eb4ae2c6fbca
SHA25693303ee7a666d40063a02775147a4de4469133272ee06d3d8fad6a41a76dc3ae
SHA5129d58503e7f620cbb9478c8f46b2159cd418a3b2440e11df0e676a9ca2cb680f61fedbd4558d733d228f4532466675affc25394fa8fae444eaab2250fb1e4baab
-
Filesize
543KB
MD50b35e90e1290263839a19ceba0f8f8a6
SHA1818c1c52cda4ac0abb645efed92495d99cf78b29
SHA25622473d37d3cf9d8c512f0d7f9b936ba42fc4008885f547c99ecdfab11322059b
SHA512412126412af6bf737b6aa4d30e7f42d9a065e805c2fab6d0d56625a02f1b2034195a16a0af6fd2888a3c535de06242d1ffea91974b743bbda18f8d0462514254
-
Filesize
543KB
MD50b35e90e1290263839a19ceba0f8f8a6
SHA1818c1c52cda4ac0abb645efed92495d99cf78b29
SHA25622473d37d3cf9d8c512f0d7f9b936ba42fc4008885f547c99ecdfab11322059b
SHA512412126412af6bf737b6aa4d30e7f42d9a065e805c2fab6d0d56625a02f1b2034195a16a0af6fd2888a3c535de06242d1ffea91974b743bbda18f8d0462514254
-
Filesize
292KB
MD5da8fd744a991bf16cd14ada749ad527f
SHA18a09070d01d728a20424d6e66616c886f9136465
SHA256dc7a77d5ed3c2692b494d2eb49d3970229fd7df82601f6156dcb876aec404e09
SHA512f178357e0fd19ba2d7b508d820c16db842c4b63d6035f9863fe604ff69b4016a60b1bd7b9524736a10e07e46967200c3014bb8bca863ef1890909d845cd12c32
-
Filesize
292KB
MD5da8fd744a991bf16cd14ada749ad527f
SHA18a09070d01d728a20424d6e66616c886f9136465
SHA256dc7a77d5ed3c2692b494d2eb49d3970229fd7df82601f6156dcb876aec404e09
SHA512f178357e0fd19ba2d7b508d820c16db842c4b63d6035f9863fe604ff69b4016a60b1bd7b9524736a10e07e46967200c3014bb8bca863ef1890909d845cd12c32
-
Filesize
350KB
MD553ac9c8d670cb428d5fb7ea64b946ec8
SHA1a95e1337ffd7bbf4069d1550f741bf2296d9ae36
SHA2569d54c557af65fc1a3fee9b4c3f5819736dae7b3179db9eb893b61ee8d4694530
SHA512c4eaac5e098f003a2a027877c80b1540f21c632a714d50bcc0e7791fe0c2115a49a8a7a4f17204f31622d563095a24aaf5aa1bbf2c2ea6a1ac74528768c0a1f2
-
Filesize
350KB
MD553ac9c8d670cb428d5fb7ea64b946ec8
SHA1a95e1337ffd7bbf4069d1550f741bf2296d9ae36
SHA2569d54c557af65fc1a3fee9b4c3f5819736dae7b3179db9eb893b61ee8d4694530
SHA512c4eaac5e098f003a2a027877c80b1540f21c632a714d50bcc0e7791fe0c2115a49a8a7a4f17204f31622d563095a24aaf5aa1bbf2c2ea6a1ac74528768c0a1f2