Analysis
-
max time kernel
106s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:17
Static task
static1
Behavioral task
behavioral1
Sample
b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe
Resource
win10v2004-20230220-en
General
-
Target
b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe
-
Size
685KB
-
MD5
5722cb13eeba555e563e96cf9f16d734
-
SHA1
ced6f19b776c3fc3dea5872128e9061f9d9a3622
-
SHA256
b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6
-
SHA512
954be31e04ac3c9e276a22367ad08ad166dd84f2d1759384d1b5a75503a1091768b3b5ec81d10b800e4822351cb1917a0aed196c99357ee92a80b58f2cbd3e8a
-
SSDEEP
12288:LMrOy90l3Tzk45HUVWkYrBnSj0OLzjonFIkEJG2PYBHCNE4HQJNp8d:NyA3TzkG0VWkYrBn1WzjuSkfllCNE4wy
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1444.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1444.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2552-194-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-197-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-199-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-195-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-201-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-203-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-205-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-207-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-209-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-211-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-213-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-215-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-217-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-219-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-221-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-223-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-225-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/2552-227-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4088 un927518.exe 992 pro1444.exe 2552 qu1800.exe 4356 si410673.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1444.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un927518.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un927518.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4204 992 WerFault.exe 85 2756 2552 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 992 pro1444.exe 992 pro1444.exe 2552 qu1800.exe 2552 qu1800.exe 4356 si410673.exe 4356 si410673.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 992 pro1444.exe Token: SeDebugPrivilege 2552 qu1800.exe Token: SeDebugPrivilege 4356 si410673.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4088 4484 b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe 84 PID 4484 wrote to memory of 4088 4484 b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe 84 PID 4484 wrote to memory of 4088 4484 b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe 84 PID 4088 wrote to memory of 992 4088 un927518.exe 85 PID 4088 wrote to memory of 992 4088 un927518.exe 85 PID 4088 wrote to memory of 992 4088 un927518.exe 85 PID 4088 wrote to memory of 2552 4088 un927518.exe 91 PID 4088 wrote to memory of 2552 4088 un927518.exe 91 PID 4088 wrote to memory of 2552 4088 un927518.exe 91 PID 4484 wrote to memory of 4356 4484 b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe 95 PID 4484 wrote to memory of 4356 4484 b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe 95 PID 4484 wrote to memory of 4356 4484 b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe"C:\Users\Admin\AppData\Local\Temp\b23e2f12110f4b378df1db1e7401d65559446dd79ca3af6b6a868e417ec6c5c6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927518.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 10884⤵
- Program crash
PID:4204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1800.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 11964⤵
- Program crash
PID:2756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410673.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 992 -ip 9921⤵PID:820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2552 -ip 25521⤵PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54beece7fdc562baef32567e757d9f214
SHA1e4f855db8b5c5a981267ff1660e750ae9c413960
SHA256e5ce647b68af2ed9cb00c9e928fb4daef7f7719b26d60511df1fca45292bf5c9
SHA5124ce0b11ea60c895334bb01b42ea7ecbab0397c310173dddbee482ae11fa2b956b9df33843ae5184f616e2c47e59835462afb7b4c9c18d2fc436ef58e0e9c414e
-
Filesize
175KB
MD54beece7fdc562baef32567e757d9f214
SHA1e4f855db8b5c5a981267ff1660e750ae9c413960
SHA256e5ce647b68af2ed9cb00c9e928fb4daef7f7719b26d60511df1fca45292bf5c9
SHA5124ce0b11ea60c895334bb01b42ea7ecbab0397c310173dddbee482ae11fa2b956b9df33843ae5184f616e2c47e59835462afb7b4c9c18d2fc436ef58e0e9c414e
-
Filesize
543KB
MD5950928e9e1cbbe018459415c8e9e6c58
SHA1e078319822ee148cf94ab9d34245a5c643950811
SHA256916707d319c4823ee3b5d7cc15bbcc337a08c3d765de11f4a1560261d61ee6ce
SHA5128e439938fdf05fc2d136f1425a9b58589ea45bc7522714d0fcb271648625c6b9a342f9ce51bc0a90744ee76927b7d5a8476d95dcf3e01e002417a61a7941f555
-
Filesize
543KB
MD5950928e9e1cbbe018459415c8e9e6c58
SHA1e078319822ee148cf94ab9d34245a5c643950811
SHA256916707d319c4823ee3b5d7cc15bbcc337a08c3d765de11f4a1560261d61ee6ce
SHA5128e439938fdf05fc2d136f1425a9b58589ea45bc7522714d0fcb271648625c6b9a342f9ce51bc0a90744ee76927b7d5a8476d95dcf3e01e002417a61a7941f555
-
Filesize
292KB
MD5922357e12cdaedd83af0e883e50e52f9
SHA1a5b0637be37f7c15bbf293eac383e11ecbb7a0e3
SHA25691962c6ddd9db7169abd63c64a28baec5aebcb2cfba15c2b420e052d8faa6b5b
SHA512f16393ba6cbf340362c35b6e91acd92804feb6dee6d0d921676353e3be026f2123c8b477592e0429049c79b245484e4141357a9eb5537779d6b7cf8482c7e837
-
Filesize
292KB
MD5922357e12cdaedd83af0e883e50e52f9
SHA1a5b0637be37f7c15bbf293eac383e11ecbb7a0e3
SHA25691962c6ddd9db7169abd63c64a28baec5aebcb2cfba15c2b420e052d8faa6b5b
SHA512f16393ba6cbf340362c35b6e91acd92804feb6dee6d0d921676353e3be026f2123c8b477592e0429049c79b245484e4141357a9eb5537779d6b7cf8482c7e837
-
Filesize
350KB
MD590211403586f13223f9518ed19dcdc9c
SHA129eaba7d9e05040cedb0b1432b43630b7bf2bb14
SHA256fca7f545574aa5aa75c9afbf7898e72280c3d5b47cbff9e5db9a8fd5ad902ffd
SHA512512fd7fac9d7b0689201c6ca67473d59ffd63cec9012f23ac4be2bb97f1091274673242a5bd18ef4aa8e50ffe39282e549a0562153e65ba3c7c8561456647010
-
Filesize
350KB
MD590211403586f13223f9518ed19dcdc9c
SHA129eaba7d9e05040cedb0b1432b43630b7bf2bb14
SHA256fca7f545574aa5aa75c9afbf7898e72280c3d5b47cbff9e5db9a8fd5ad902ffd
SHA512512fd7fac9d7b0689201c6ca67473d59ffd63cec9012f23ac4be2bb97f1091274673242a5bd18ef4aa8e50ffe39282e549a0562153e65ba3c7c8561456647010