Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:28
Static task
static1
Behavioral task
behavioral1
Sample
8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe
Resource
win10v2004-20230221-en
General
-
Target
8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe
-
Size
685KB
-
MD5
10801c7fd51bae4dabeb275ef884946d
-
SHA1
68da32701e487cd4abb8a7457d395ab0a31204e1
-
SHA256
8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46
-
SHA512
b3b11e478d3cbf45d059eae610aed6b55bc30bc5ddc30ca0e51c523ebc07438d184a39879873bd4e1b00c419a16edea526a4ab4f18c89ae9bc51642fb27223c2
-
SSDEEP
12288:RMr4y90DwBu/ecnpzLqdIBasOMSMu3OHw/VL3vHnQuggrEsp8BlwzEZJIKefft:xyW/3ntkIBZS73nR3fQJBHwzEZult
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1937.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1937.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3876-192-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-191-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-194-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-198-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-200-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-196-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-202-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-204-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-206-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-208-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-210-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-212-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-214-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-216-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-218-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-220-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-222-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-224-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/3876-1113-0x00000000023A0000-0x00000000023B0000-memory.dmp family_redline behavioral1/memory/3876-1114-0x00000000023A0000-0x00000000023B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1136 un946582.exe 4504 pro1937.exe 3876 qu3709.exe 4524 si489882.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1937.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un946582.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un946582.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3640 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3996 4504 WerFault.exe 83 3988 3876 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 pro1937.exe 4504 pro1937.exe 3876 qu3709.exe 3876 qu3709.exe 4524 si489882.exe 4524 si489882.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 pro1937.exe Token: SeDebugPrivilege 3876 qu3709.exe Token: SeDebugPrivilege 4524 si489882.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1136 2320 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe 82 PID 2320 wrote to memory of 1136 2320 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe 82 PID 2320 wrote to memory of 1136 2320 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe 82 PID 1136 wrote to memory of 4504 1136 un946582.exe 83 PID 1136 wrote to memory of 4504 1136 un946582.exe 83 PID 1136 wrote to memory of 4504 1136 un946582.exe 83 PID 1136 wrote to memory of 3876 1136 un946582.exe 89 PID 1136 wrote to memory of 3876 1136 un946582.exe 89 PID 1136 wrote to memory of 3876 1136 un946582.exe 89 PID 2320 wrote to memory of 4524 2320 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe 93 PID 2320 wrote to memory of 4524 2320 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe 93 PID 2320 wrote to memory of 4524 2320 8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe"C:\Users\Admin\AppData\Local\Temp\8c385e80a6ad98382186087494179bef1d013e7f1ee1de473a3eec0304b4ba46.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946582.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946582.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1937.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 10844⤵
- Program crash
PID:3996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3709.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3709.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 17724⤵
- Program crash
PID:3988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si489882.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si489882.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4504 -ip 45041⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3876 -ip 38761⤵PID:4528
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5161334e0bc0372e48f4ebf3a56acc244
SHA11f255d8a0c2012e191cd0e849d92c2292b369128
SHA256a53a49bf3d00f3cefe627709460cfa36576dfd3c57648411059e4dfafd2b4984
SHA51230e557efd3ae1d4e41df7282cc81718bb2448582d1b491adaeb7292881c5ba8a58238a8ccd7b971360421bec40b04b18e8f7c37f3558fa36107cc5d6e2f4313f
-
Filesize
175KB
MD5161334e0bc0372e48f4ebf3a56acc244
SHA11f255d8a0c2012e191cd0e849d92c2292b369128
SHA256a53a49bf3d00f3cefe627709460cfa36576dfd3c57648411059e4dfafd2b4984
SHA51230e557efd3ae1d4e41df7282cc81718bb2448582d1b491adaeb7292881c5ba8a58238a8ccd7b971360421bec40b04b18e8f7c37f3558fa36107cc5d6e2f4313f
-
Filesize
543KB
MD538dc73cb3099269c2ff368e21a0a6d11
SHA15f61849c262fe7e9e42d8d097d10f86c78ed32f6
SHA256e3cd863c065079bec08b129b45b51f5e56c4d4e3a5ab541d4b30c305c0c78980
SHA512e5d2ac6c74f3184712df86d50a1451a3e75f4614c871e919de64807512be858768bc74eff057d534fdb9880a4e8665fa7c655382e64074c426d8c7214e66f551
-
Filesize
543KB
MD538dc73cb3099269c2ff368e21a0a6d11
SHA15f61849c262fe7e9e42d8d097d10f86c78ed32f6
SHA256e3cd863c065079bec08b129b45b51f5e56c4d4e3a5ab541d4b30c305c0c78980
SHA512e5d2ac6c74f3184712df86d50a1451a3e75f4614c871e919de64807512be858768bc74eff057d534fdb9880a4e8665fa7c655382e64074c426d8c7214e66f551
-
Filesize
292KB
MD528da5447c2df6479b65abac75848faeb
SHA1954fec98f3138c73bdb278bba467c8cdf8d1b13f
SHA256840596e5bf2377b095df152c47d9368c9a127e92d6c9cc49755c796a0b026fb1
SHA512ce28ee9fae82598bd9d3d5897fc1935d9d4c0854911339a3a5afbb2af507c51c12bc00b801666da9813a4a9464d9dd493db91926c38f4f8b8f4eac79582a5410
-
Filesize
292KB
MD528da5447c2df6479b65abac75848faeb
SHA1954fec98f3138c73bdb278bba467c8cdf8d1b13f
SHA256840596e5bf2377b095df152c47d9368c9a127e92d6c9cc49755c796a0b026fb1
SHA512ce28ee9fae82598bd9d3d5897fc1935d9d4c0854911339a3a5afbb2af507c51c12bc00b801666da9813a4a9464d9dd493db91926c38f4f8b8f4eac79582a5410
-
Filesize
350KB
MD582539e649193631ac2327c840ec3d49c
SHA12b5bb1a88ce60020585d68faab6e20706d3efa31
SHA256547b1392315c381d811866547180824055772b8a97d8ebafa0b0abab547d3b1d
SHA512edf6bd1329ddfa32fdd1ad6304d2ee69809861e75dc05771007b39fa9db3472c90546dae1564d719c6c7e2baf003ebaf4f4516deb0f967e1eddc4ac8121668cd
-
Filesize
350KB
MD582539e649193631ac2327c840ec3d49c
SHA12b5bb1a88ce60020585d68faab6e20706d3efa31
SHA256547b1392315c381d811866547180824055772b8a97d8ebafa0b0abab547d3b1d
SHA512edf6bd1329ddfa32fdd1ad6304d2ee69809861e75dc05771007b39fa9db3472c90546dae1564d719c6c7e2baf003ebaf4f4516deb0f967e1eddc4ac8121668cd