Analysis
-
max time kernel
127s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:27
Static task
static1
Behavioral task
behavioral1
Sample
443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe
Resource
win10v2004-20230220-en
General
-
Target
443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe
-
Size
685KB
-
MD5
f9749f360798af67604f0f84352fd8de
-
SHA1
1eeb1a7f0427469eb321ea1fdf714eb12fa7f0dc
-
SHA256
443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b
-
SHA512
79f8424bba7eaf6ce2eceb5635cca12da7ad2a2d7bedc18324da8576f6c5a3b91efa938fdf5927e3b186f7004fe5dc714fb2017f2599a38e55f2a226c26c79db
-
SSDEEP
12288:XMryy90mxStzjxmv6JUkDO2mlUw/N53KDE7f445BnW0EphbqgL89EQW2Iq:ByYtztfBnY1NhF7f465W0EzqgL8JW2r
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2628.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2628.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4840-191-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-192-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-194-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-196-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-198-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-202-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-203-0x0000000004F40000-0x0000000004F50000-memory.dmp family_redline behavioral1/memory/4840-206-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-208-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-210-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-212-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-214-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-216-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-220-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-218-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-222-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-224-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-226-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/4840-228-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 564 un609375.exe 640 pro2628.exe 4840 qu7515.exe 2000 si338740.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2628.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un609375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un609375.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3272 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4460 640 WerFault.exe 83 4328 4840 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 640 pro2628.exe 640 pro2628.exe 4840 qu7515.exe 4840 qu7515.exe 2000 si338740.exe 2000 si338740.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 640 pro2628.exe Token: SeDebugPrivilege 4840 qu7515.exe Token: SeDebugPrivilege 2000 si338740.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 516 wrote to memory of 564 516 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe 82 PID 516 wrote to memory of 564 516 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe 82 PID 516 wrote to memory of 564 516 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe 82 PID 564 wrote to memory of 640 564 un609375.exe 83 PID 564 wrote to memory of 640 564 un609375.exe 83 PID 564 wrote to memory of 640 564 un609375.exe 83 PID 564 wrote to memory of 4840 564 un609375.exe 89 PID 564 wrote to memory of 4840 564 un609375.exe 89 PID 564 wrote to memory of 4840 564 un609375.exe 89 PID 516 wrote to memory of 2000 516 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe 93 PID 516 wrote to memory of 2000 516 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe 93 PID 516 wrote to memory of 2000 516 443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe"C:\Users\Admin\AppData\Local\Temp\443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609375.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609375.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2628.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2628.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 10844⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7515.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 9724⤵
- Program crash
PID:4328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338740.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338740.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 640 -ip 6401⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4840 -ip 48401⤵PID:1860
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD519a6601c25bc54ab6b3ef092f99721b4
SHA15c349277fc9efed07cdb7dfd2d85961bfa25c10c
SHA256342f3ef7fbe9026817b557fe1e7d0a170f59c00de16ee7f24bab2a80c150d479
SHA5127465d15642d66eb93cdc59ae536860cc74acf11de4ebdd9eb9ca5fb8c4489a728f45e3053dcc84e5018d3fc2d8c948dcb30e6911e4e0bbf8df27273606bd0912
-
Filesize
175KB
MD519a6601c25bc54ab6b3ef092f99721b4
SHA15c349277fc9efed07cdb7dfd2d85961bfa25c10c
SHA256342f3ef7fbe9026817b557fe1e7d0a170f59c00de16ee7f24bab2a80c150d479
SHA5127465d15642d66eb93cdc59ae536860cc74acf11de4ebdd9eb9ca5fb8c4489a728f45e3053dcc84e5018d3fc2d8c948dcb30e6911e4e0bbf8df27273606bd0912
-
Filesize
543KB
MD507e9e34cf5f40896ef79804715df43e4
SHA1bced3aa704731125364f72d2487585eab73fbcd0
SHA256a2e3e9123fbd77d29ce7ad6dbef632f9398252a33bff4803d65eb783568d2efb
SHA51254bf294af5f0b338063f611423251eae4d7836f310b97a6f3d288ab4341e49011fd0c64e0adb8053bac0da63fed75a24b00a1a916efbe85ba9e4a5127a9742f3
-
Filesize
543KB
MD507e9e34cf5f40896ef79804715df43e4
SHA1bced3aa704731125364f72d2487585eab73fbcd0
SHA256a2e3e9123fbd77d29ce7ad6dbef632f9398252a33bff4803d65eb783568d2efb
SHA51254bf294af5f0b338063f611423251eae4d7836f310b97a6f3d288ab4341e49011fd0c64e0adb8053bac0da63fed75a24b00a1a916efbe85ba9e4a5127a9742f3
-
Filesize
292KB
MD56bee0b358a1d7356fdd6b049a99a6635
SHA1939782c4793d7c94f890bc35c9c3865353afdf17
SHA256a90f6535594b6835ee44c3a677f12d9cfa59e0710ab9b87ceb8e0275d1491592
SHA512a0e7692b72637ed64763dfa7f35747dcf07b79d9774b33a353e7d6d1520a59e88e63c3394ddf2a61a5ef43c07571a33605b9692f5cf416ea436e4b537ef6c337
-
Filesize
292KB
MD56bee0b358a1d7356fdd6b049a99a6635
SHA1939782c4793d7c94f890bc35c9c3865353afdf17
SHA256a90f6535594b6835ee44c3a677f12d9cfa59e0710ab9b87ceb8e0275d1491592
SHA512a0e7692b72637ed64763dfa7f35747dcf07b79d9774b33a353e7d6d1520a59e88e63c3394ddf2a61a5ef43c07571a33605b9692f5cf416ea436e4b537ef6c337
-
Filesize
350KB
MD55c9f6f1edbd19612090654e214ce4bf5
SHA1fd0fbba1fe4365fcae3e9f7cde3b559c96f7a5d1
SHA2566243acb68a521eab85ca3d30399cf6d5b040a639802f7bf0881ffe0bcce25ae9
SHA512e2c292702a223be67af46c75098ebccb2a6c0e55d6bfbdbe96b9f3e715ad8423e5e7321e74b435221ef39b79e2136c1ea2eb8a685ff237e2044882cdcf0a4a60
-
Filesize
350KB
MD55c9f6f1edbd19612090654e214ce4bf5
SHA1fd0fbba1fe4365fcae3e9f7cde3b559c96f7a5d1
SHA2566243acb68a521eab85ca3d30399cf6d5b040a639802f7bf0881ffe0bcce25ae9
SHA512e2c292702a223be67af46c75098ebccb2a6c0e55d6bfbdbe96b9f3e715ad8423e5e7321e74b435221ef39b79e2136c1ea2eb8a685ff237e2044882cdcf0a4a60