Analysis
-
max time kernel
91s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:31
Static task
static1
Behavioral task
behavioral1
Sample
e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe
Resource
win10v2004-20230220-en
General
-
Target
e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe
-
Size
695KB
-
MD5
4dc730b1237b797e97f4b402a98696c9
-
SHA1
ea1f7a59005671334ea05c5d5bf790efbcb4b273
-
SHA256
e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc
-
SHA512
1bc42090b6fd73313bcf3ff98428fd30a99b3f73a4514f2faa50df1201b3309ecb69ed0e5478c5ed51ea62b8e4a5dbfefa7143aeaa15f7659b39d51f7ccfd93e
-
SSDEEP
12288:PMr5y90zEG7gdNVdPABMcFRG5G+eEIoW/yHH9N9H8qBRAAn4qAK:eymJ9MKG5GWWq9TH8q34w
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4105.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1108-191-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-192-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-195-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-198-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-202-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-204-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-206-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-208-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-210-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-212-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-214-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-216-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-218-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-220-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-222-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-224-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-226-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline behavioral1/memory/1108-228-0x00000000053B0000-0x00000000053EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4872 un698126.exe 4544 pro4105.exe 1108 qu4081.exe 1248 si124345.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4105.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un698126.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un698126.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1432 4544 WerFault.exe 84 636 1108 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4544 pro4105.exe 4544 pro4105.exe 1108 qu4081.exe 1108 qu4081.exe 1248 si124345.exe 1248 si124345.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4544 pro4105.exe Token: SeDebugPrivilege 1108 qu4081.exe Token: SeDebugPrivilege 1248 si124345.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4872 1020 e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe 83 PID 1020 wrote to memory of 4872 1020 e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe 83 PID 1020 wrote to memory of 4872 1020 e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe 83 PID 4872 wrote to memory of 4544 4872 un698126.exe 84 PID 4872 wrote to memory of 4544 4872 un698126.exe 84 PID 4872 wrote to memory of 4544 4872 un698126.exe 84 PID 4872 wrote to memory of 1108 4872 un698126.exe 93 PID 4872 wrote to memory of 1108 4872 un698126.exe 93 PID 4872 wrote to memory of 1108 4872 un698126.exe 93 PID 1020 wrote to memory of 1248 1020 e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe 98 PID 1020 wrote to memory of 1248 1020 e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe 98 PID 1020 wrote to memory of 1248 1020 e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe"C:\Users\Admin\AppData\Local\Temp\e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698126.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698126.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4105.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4105.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 10884⤵
- Program crash
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4081.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 18204⤵
- Program crash
PID:636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124345.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124345.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4544 -ip 45441⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1108 -ip 11081⤵PID:4388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56ad65f0cfdeb90cc95c5e312100d1ac6
SHA13ba0fc118b9f0a5a7d2df544b4e7e6214e7e8242
SHA25691299cb0afc308475131a45f6e812ca839b6eceadd7ca7b96d207541d4756923
SHA5122bc37e4e3ab381fa64477f92e86ffafb52ff2e90e824a779cabd0b6dfa8b2620e90fc08b5965631242ada9f03918a462426a658f354c82890c1611561c2ced33
-
Filesize
175KB
MD56ad65f0cfdeb90cc95c5e312100d1ac6
SHA13ba0fc118b9f0a5a7d2df544b4e7e6214e7e8242
SHA25691299cb0afc308475131a45f6e812ca839b6eceadd7ca7b96d207541d4756923
SHA5122bc37e4e3ab381fa64477f92e86ffafb52ff2e90e824a779cabd0b6dfa8b2620e90fc08b5965631242ada9f03918a462426a658f354c82890c1611561c2ced33
-
Filesize
553KB
MD55701e076df9aa96546118eaf5398121a
SHA16545933f7c0d54b9c2b16006a2ed2e047fde7593
SHA2569c3f4652ab0b2ba97bd0549d3315e447e05c24a6a209db3601acda0e81239304
SHA512ae5aea17c1ab9c00688d82e219e523aa165f6a9e1097510adc26184613b9c679508c073359f0b46cd80f9ae894c318c7d0f68f09ca8b52bd2b292312437435c6
-
Filesize
553KB
MD55701e076df9aa96546118eaf5398121a
SHA16545933f7c0d54b9c2b16006a2ed2e047fde7593
SHA2569c3f4652ab0b2ba97bd0549d3315e447e05c24a6a209db3601acda0e81239304
SHA512ae5aea17c1ab9c00688d82e219e523aa165f6a9e1097510adc26184613b9c679508c073359f0b46cd80f9ae894c318c7d0f68f09ca8b52bd2b292312437435c6
-
Filesize
292KB
MD59c6154c8e20e175d4dee607b9b8e59ae
SHA1437328721dbbbf19c1960f56450becc9264139fc
SHA256e5b9866b502afeca5a02a2355b32009bd5a496f892aeae9a6307590e5bb061a7
SHA512bad766b7919e5a1f51cd33006956fc9d941e58e82306fb1043158ac1f138e3f16b456b2004b93d5b3a07bc4578ecab1c1b7c8aa835796aecc172de8f6d8b8cb4
-
Filesize
292KB
MD59c6154c8e20e175d4dee607b9b8e59ae
SHA1437328721dbbbf19c1960f56450becc9264139fc
SHA256e5b9866b502afeca5a02a2355b32009bd5a496f892aeae9a6307590e5bb061a7
SHA512bad766b7919e5a1f51cd33006956fc9d941e58e82306fb1043158ac1f138e3f16b456b2004b93d5b3a07bc4578ecab1c1b7c8aa835796aecc172de8f6d8b8cb4
-
Filesize
366KB
MD53e88c5b4166135391274443012da2134
SHA1a69cfa9e1b315507b7c2b088bc979065bdf3427b
SHA2567f6c784673307a06fc55ae846928da3e7f55315b74c18840328a24dd462d098e
SHA512b2b8a8042f7b02f41e091669431228181715302549eb058544640fc6b6eef41bb73f36bd28adb903579350075650484a327fdafb4f7070847b2dafceae1a3f9b
-
Filesize
366KB
MD53e88c5b4166135391274443012da2134
SHA1a69cfa9e1b315507b7c2b088bc979065bdf3427b
SHA2567f6c784673307a06fc55ae846928da3e7f55315b74c18840328a24dd462d098e
SHA512b2b8a8042f7b02f41e091669431228181715302549eb058544640fc6b6eef41bb73f36bd28adb903579350075650484a327fdafb4f7070847b2dafceae1a3f9b