Analysis
-
max time kernel
82s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:22
Static task
static1
Behavioral task
behavioral1
Sample
ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe
Resource
win10v2004-20230220-en
General
-
Target
ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe
-
Size
685KB
-
MD5
a6bf1cf519b195f78832f04b97f3468f
-
SHA1
0bb5cc3cd94195364feb18ea8af9c371ed6c496d
-
SHA256
ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f
-
SHA512
3467c8e859cd33a40f1866ceed36ac45e366a0c3cdbeddde642dd2a09714ef032da1baa9272e452f7ee1b8e72116a6a87617fd56434498f63127439be92cc1d0
-
SSDEEP
12288:QMrcy90OxSL5m1PJcUdR0DKwJ/key0fNL3vGnK+/pzkxJv7BayAEis44zcKJ:cyY0ZJcaR+Kwbyi3WIFIyAEisbwKJ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3453.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3453.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3572-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-190-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-193-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-195-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-197-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-205-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-201-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-207-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-209-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-211-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-213-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-215-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-217-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-219-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-221-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-223-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-225-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/3572-227-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4764 un883037.exe 4508 pro3453.exe 3572 qu2844.exe 5000 si603400.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3453.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un883037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un883037.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 392 4508 WerFault.exe 84 2860 3572 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4508 pro3453.exe 4508 pro3453.exe 3572 qu2844.exe 3572 qu2844.exe 5000 si603400.exe 5000 si603400.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4508 pro3453.exe Token: SeDebugPrivilege 3572 qu2844.exe Token: SeDebugPrivilege 5000 si603400.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4764 4452 ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe 83 PID 4452 wrote to memory of 4764 4452 ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe 83 PID 4452 wrote to memory of 4764 4452 ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe 83 PID 4764 wrote to memory of 4508 4764 un883037.exe 84 PID 4764 wrote to memory of 4508 4764 un883037.exe 84 PID 4764 wrote to memory of 4508 4764 un883037.exe 84 PID 4764 wrote to memory of 3572 4764 un883037.exe 93 PID 4764 wrote to memory of 3572 4764 un883037.exe 93 PID 4764 wrote to memory of 3572 4764 un883037.exe 93 PID 4452 wrote to memory of 5000 4452 ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe 97 PID 4452 wrote to memory of 5000 4452 ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe 97 PID 4452 wrote to memory of 5000 4452 ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe"C:\Users\Admin\AppData\Local\Temp\ccfada537e712ca1015d89d184790f79724647ebe703fe311373afdcb66fa50f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un883037.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un883037.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3453.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 10844⤵
- Program crash
PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2844.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 17164⤵
- Program crash
PID:2860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si603400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si603400.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4508 -ip 45081⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3572 -ip 35721⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f9e28c0e86ddb4eae2025d22d8fa2230
SHA1fef9139d4ea3c43a95c3b4271c248d760ab5acc8
SHA256a990426c3e541e74c08b6dff16801e03a69a401eb6d6ec4392d5c755fc317f0b
SHA512f15db86dc64eeefa027271ef687833a5985da44c5646dab63f24cc73c602fe1f7ddd6eb394e766c98bbd28ef50fc68d108f2a7307a98b5d17348b669f393fe63
-
Filesize
175KB
MD5f9e28c0e86ddb4eae2025d22d8fa2230
SHA1fef9139d4ea3c43a95c3b4271c248d760ab5acc8
SHA256a990426c3e541e74c08b6dff16801e03a69a401eb6d6ec4392d5c755fc317f0b
SHA512f15db86dc64eeefa027271ef687833a5985da44c5646dab63f24cc73c602fe1f7ddd6eb394e766c98bbd28ef50fc68d108f2a7307a98b5d17348b669f393fe63
-
Filesize
543KB
MD5f8e55d556812f8e2ee3e08f4070160e5
SHA1c3ba7971b84d60d0b75e14887848242c3c4df9b2
SHA2563120d40c837c1b3114f25c9423599eec793edbadd9ece82e2be35443ec65d760
SHA512acf65133d5ddfe91c73247cdc9c8c3762df62be12eabe10903aa07aa3188a53b7ed0f1ae96a787c242ed2d1b614b6ac1d28ba842f9c81dcd5056a5d444290092
-
Filesize
543KB
MD5f8e55d556812f8e2ee3e08f4070160e5
SHA1c3ba7971b84d60d0b75e14887848242c3c4df9b2
SHA2563120d40c837c1b3114f25c9423599eec793edbadd9ece82e2be35443ec65d760
SHA512acf65133d5ddfe91c73247cdc9c8c3762df62be12eabe10903aa07aa3188a53b7ed0f1ae96a787c242ed2d1b614b6ac1d28ba842f9c81dcd5056a5d444290092
-
Filesize
292KB
MD5238b606af02aa57c0dcfdb08ad14f906
SHA130ef8792e6a26e2bb0288e6e7326699c8523c9d5
SHA25632e42094fe6d8d1f85768382050f81f476fbe5c545d8b2ccb8eaa5cd61c2124b
SHA512366d3860d3694605fc5ca06ff1840fa1b79b6ecfb4e61a566cb0ed9a28301bb0bb58429c9faade17845136242f8b32c8c7478c2a34fefd60a71530654c2aaee6
-
Filesize
292KB
MD5238b606af02aa57c0dcfdb08ad14f906
SHA130ef8792e6a26e2bb0288e6e7326699c8523c9d5
SHA25632e42094fe6d8d1f85768382050f81f476fbe5c545d8b2ccb8eaa5cd61c2124b
SHA512366d3860d3694605fc5ca06ff1840fa1b79b6ecfb4e61a566cb0ed9a28301bb0bb58429c9faade17845136242f8b32c8c7478c2a34fefd60a71530654c2aaee6
-
Filesize
350KB
MD553116aa7a3200ab6c9863a22bd1ce78b
SHA138a1bc1eec53764a4088e25579c26d81aa74a75d
SHA2561f595da3c71e6b36284c4483730d20a31d98183490114b86ebcd3e54c021cf17
SHA512114d4b4267afc61005489c38faa95350b8985246642b92447b2b5e15982005fdbc11af28fa709e882669fc08f374b68b34bacfe624ce0c5e73c88d5b19ede0fe
-
Filesize
350KB
MD553116aa7a3200ab6c9863a22bd1ce78b
SHA138a1bc1eec53764a4088e25579c26d81aa74a75d
SHA2561f595da3c71e6b36284c4483730d20a31d98183490114b86ebcd3e54c021cf17
SHA512114d4b4267afc61005489c38faa95350b8985246642b92447b2b5e15982005fdbc11af28fa709e882669fc08f374b68b34bacfe624ce0c5e73c88d5b19ede0fe