Analysis
-
max time kernel
82s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:25
Static task
static1
Behavioral task
behavioral1
Sample
5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe
Resource
win10v2004-20230220-en
General
-
Target
5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe
-
Size
685KB
-
MD5
b5c4a801655e53c656aa0ff4c23ef03d
-
SHA1
232f4bc23779f374c2a5dc143f4b16338f71e910
-
SHA256
5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206
-
SHA512
3f4b014f56918a1cca5682fd9382c046e8f1d11a3c180426af40173e9c1af3363ad613a41e9dcec84469144d2ebeae699e45ed48d9b0e344f6d393df25ad2443
-
SSDEEP
12288:zMrqy90ahbIxDoQDv8bGqfqJgkRORwjM/C8ufRG5jIZIgmB6u3ElIE8FDUP:Byd4DoQz8CqCr9s+G5cZ4ou3ElIbFDUP
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1845.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1845.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1845.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1845.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1845.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1845.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/488-192-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-191-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-194-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-196-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-198-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-200-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-202-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-204-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-206-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-208-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-210-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-212-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-214-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-216-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-218-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-220-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-222-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-224-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/488-503-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/488-1112-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline behavioral1/memory/488-1114-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4516 un095173.exe 780 pro1845.exe 488 qu7075.exe 1252 si534572.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1845.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1845.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un095173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un095173.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1008 780 WerFault.exe 85 4880 488 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 780 pro1845.exe 780 pro1845.exe 488 qu7075.exe 488 qu7075.exe 1252 si534572.exe 1252 si534572.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 780 pro1845.exe Token: SeDebugPrivilege 488 qu7075.exe Token: SeDebugPrivilege 1252 si534572.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 8 wrote to memory of 4516 8 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe 84 PID 8 wrote to memory of 4516 8 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe 84 PID 8 wrote to memory of 4516 8 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe 84 PID 4516 wrote to memory of 780 4516 un095173.exe 85 PID 4516 wrote to memory of 780 4516 un095173.exe 85 PID 4516 wrote to memory of 780 4516 un095173.exe 85 PID 4516 wrote to memory of 488 4516 un095173.exe 94 PID 4516 wrote to memory of 488 4516 un095173.exe 94 PID 4516 wrote to memory of 488 4516 un095173.exe 94 PID 8 wrote to memory of 1252 8 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe 98 PID 8 wrote to memory of 1252 8 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe 98 PID 8 wrote to memory of 1252 8 5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe"C:\Users\Admin\AppData\Local\Temp\5ec010807130550cbfdcaa3edb927a2cfedb0501d475db47352c5c6fa7209206.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1845.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1845.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 10844⤵
- Program crash
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7075.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 16804⤵
- Program crash
PID:4880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si534572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si534572.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 780 -ip 7801⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 488 -ip 4881⤵PID:2524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b94417d50671e987738df3821497d503
SHA127ca402fc65da3cde0fe39a4b0c00323cd06b71a
SHA25653a6761f03975d320b4a07708adc9263b951cbe26e6d9c4afcd8bffdc1860875
SHA51292019dbb96afcdd90140c6ba7cdf6085e53ea2d0cd1ea73dd7dc02620e9bf43e74b3fc9103353e7ceedc5223f542f9a22c7ceeb1a0c25af974fd0e175743ff62
-
Filesize
175KB
MD5b94417d50671e987738df3821497d503
SHA127ca402fc65da3cde0fe39a4b0c00323cd06b71a
SHA25653a6761f03975d320b4a07708adc9263b951cbe26e6d9c4afcd8bffdc1860875
SHA51292019dbb96afcdd90140c6ba7cdf6085e53ea2d0cd1ea73dd7dc02620e9bf43e74b3fc9103353e7ceedc5223f542f9a22c7ceeb1a0c25af974fd0e175743ff62
-
Filesize
543KB
MD566ca13fb0aa596a1d19666d7a4307c6d
SHA1bd872f3b5579190f1eb214486edb1c28203b6fba
SHA25638592a41d85a5360f939378f1c684d3ba8c1ded21ac56e9aa7f6597f82055ced
SHA512ec819cde877140e9ee0b208b0ba39f684fe58eb9a12b1c0749e7db4d89468ed860b72ab7b2a577e96a3ef5030f562145a33cf17e20c20ca0a65969f8ad6c32d5
-
Filesize
543KB
MD566ca13fb0aa596a1d19666d7a4307c6d
SHA1bd872f3b5579190f1eb214486edb1c28203b6fba
SHA25638592a41d85a5360f939378f1c684d3ba8c1ded21ac56e9aa7f6597f82055ced
SHA512ec819cde877140e9ee0b208b0ba39f684fe58eb9a12b1c0749e7db4d89468ed860b72ab7b2a577e96a3ef5030f562145a33cf17e20c20ca0a65969f8ad6c32d5
-
Filesize
292KB
MD5c306d64b84b8478c79019bef5df1d17a
SHA17c2d7ac4be012ac2dda6d1420bfa987cf898ef9f
SHA256380073d7c3e9773c4f736eaab715ac8deba8c3ec19d65a3705bb3c9e7b75fa8f
SHA5124f14e0b5faceb4f1c84f87b8cd0570a8b4c384d00d01b1ed838ce523044e02984b3467b271a6edec525b814d361cf1ddf7a02f45d03074cade59cacf16b60331
-
Filesize
292KB
MD5c306d64b84b8478c79019bef5df1d17a
SHA17c2d7ac4be012ac2dda6d1420bfa987cf898ef9f
SHA256380073d7c3e9773c4f736eaab715ac8deba8c3ec19d65a3705bb3c9e7b75fa8f
SHA5124f14e0b5faceb4f1c84f87b8cd0570a8b4c384d00d01b1ed838ce523044e02984b3467b271a6edec525b814d361cf1ddf7a02f45d03074cade59cacf16b60331
-
Filesize
350KB
MD5858a25dc1e9e1f659d62990613229828
SHA1ed86490255617d78771a5c496ecd439af9aa60e7
SHA2567b656442d00246f8f0e84dee981a4289e393721fb0b21541c1e3a4b87869a78b
SHA512b6e9db0b5bf5d825dc68767b98691684c9977833833a1444e3433cfeace32e373051074bcfc0064357a926f52ea1963ed69e1edd3bb0f826e39def48b0be8f45
-
Filesize
350KB
MD5858a25dc1e9e1f659d62990613229828
SHA1ed86490255617d78771a5c496ecd439af9aa60e7
SHA2567b656442d00246f8f0e84dee981a4289e393721fb0b21541c1e3a4b87869a78b
SHA512b6e9db0b5bf5d825dc68767b98691684c9977833833a1444e3433cfeace32e373051074bcfc0064357a926f52ea1963ed69e1edd3bb0f826e39def48b0be8f45