Analysis
-
max time kernel
60s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe
Resource
win10v2004-20230220-en
General
-
Target
dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe
-
Size
685KB
-
MD5
2099b0cbff7871ad9f2f50e3987794f6
-
SHA1
bd61b3898e1a42f7227a442e3cb7e939b124f045
-
SHA256
dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1
-
SHA512
acb6d339e04e2580fb99d6a73b54115456b791e9ae5493a6262c2b54865d9a81adc3d85bb51f452e17dce4a872d63ad68399a982ad3b2adde1e1f0050aae22ee
-
SSDEEP
12288:+Mr2y9068efCXyIDO6aS1qJxkiY/qsXmQLYB77qEBSCHE6ytxPP9J:EyNvmgIqWNdMF7BgCHE6ytxP1J
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8211.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8211.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4068-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-225-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/4068-227-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4124 un123559.exe 2108 pro8211.exe 4068 qu5716.exe 5096 si699242.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8211.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un123559.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un123559.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 112 2108 WerFault.exe 83 4924 4068 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2108 pro8211.exe 2108 pro8211.exe 4068 qu5716.exe 4068 qu5716.exe 5096 si699242.exe 5096 si699242.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2108 pro8211.exe Token: SeDebugPrivilege 4068 qu5716.exe Token: SeDebugPrivilege 5096 si699242.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4124 3924 dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe 82 PID 3924 wrote to memory of 4124 3924 dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe 82 PID 3924 wrote to memory of 4124 3924 dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe 82 PID 4124 wrote to memory of 2108 4124 un123559.exe 83 PID 4124 wrote to memory of 2108 4124 un123559.exe 83 PID 4124 wrote to memory of 2108 4124 un123559.exe 83 PID 4124 wrote to memory of 4068 4124 un123559.exe 93 PID 4124 wrote to memory of 4068 4124 un123559.exe 93 PID 4124 wrote to memory of 4068 4124 un123559.exe 93 PID 3924 wrote to memory of 5096 3924 dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe 97 PID 3924 wrote to memory of 5096 3924 dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe 97 PID 3924 wrote to memory of 5096 3924 dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe"C:\Users\Admin\AppData\Local\Temp\dd0c7e97e325c16559776c821df9ba6dbcd926e94f112a098903b787f0b889e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un123559.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un123559.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 10844⤵
- Program crash
PID:112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5716.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 20444⤵
- Program crash
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si699242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si699242.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2108 -ip 21081⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4068 -ip 40681⤵PID:1980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b86b6091c5d5f792c9ea439a9b497341
SHA13b9560a27ace45b1901a16009d6c78b9790506ca
SHA256838b6e65abfc91f766f2cebd7b9d30b9333f820571c72b61966d2f6d344494dc
SHA512ac3b52e57e1649a4a5f6b68c3ca6557f7b161205606cabdc38c8408b287b62edd296086a5b9c0154fc95950c19171fcbb62a13844632e581dbb80234bb8a5275
-
Filesize
175KB
MD5b86b6091c5d5f792c9ea439a9b497341
SHA13b9560a27ace45b1901a16009d6c78b9790506ca
SHA256838b6e65abfc91f766f2cebd7b9d30b9333f820571c72b61966d2f6d344494dc
SHA512ac3b52e57e1649a4a5f6b68c3ca6557f7b161205606cabdc38c8408b287b62edd296086a5b9c0154fc95950c19171fcbb62a13844632e581dbb80234bb8a5275
-
Filesize
543KB
MD5d6abe0c4a567b520aeef8bb410e6891d
SHA1d91f93fee71aee7dcc4c7ef6f81427854e2a3a72
SHA25621bcf9f32b635cc1ab2d791e0133d9418f65fd033c60ad9f3eb2a2cfa81a143a
SHA51268db79cdd94b19a59b774327319da9c58f135568b7464054d0e5f8c7d960352e2e7fbe340174092902af0538317b0b80d8b51f244f2a0d867f1bf4007e666302
-
Filesize
543KB
MD5d6abe0c4a567b520aeef8bb410e6891d
SHA1d91f93fee71aee7dcc4c7ef6f81427854e2a3a72
SHA25621bcf9f32b635cc1ab2d791e0133d9418f65fd033c60ad9f3eb2a2cfa81a143a
SHA51268db79cdd94b19a59b774327319da9c58f135568b7464054d0e5f8c7d960352e2e7fbe340174092902af0538317b0b80d8b51f244f2a0d867f1bf4007e666302
-
Filesize
292KB
MD5437192d69386586d86d79f4c99b0bc69
SHA1693f0b08e7df57f6072ad75a8fbc9cf4440a896a
SHA25668b82357917d1853343c262ee5b2d0d998e3daa110b6771425c595e3c3e6fdd7
SHA51206b80c37ba99309314c27fc2fc77090a557039210ecaf9a7d88d57178798d4eeec2d3580cbe35876214351290ca4360df7feb11b79ac88fc96969228285c3be8
-
Filesize
292KB
MD5437192d69386586d86d79f4c99b0bc69
SHA1693f0b08e7df57f6072ad75a8fbc9cf4440a896a
SHA25668b82357917d1853343c262ee5b2d0d998e3daa110b6771425c595e3c3e6fdd7
SHA51206b80c37ba99309314c27fc2fc77090a557039210ecaf9a7d88d57178798d4eeec2d3580cbe35876214351290ca4360df7feb11b79ac88fc96969228285c3be8
-
Filesize
350KB
MD5c200cd55bc92bba25cfa366756ed6cc5
SHA1c88c2856ea18c08e309e5f4577f3124f3f259686
SHA256096d5909de42c926f88e67a56d8a4699da1a0a6c6d317140bae98a7e9bc7aeb9
SHA512e1f5962d828523ebf1f512921f580d5e85eadf1f35fbfdfe7d448cd235295573644512dd805d0eb6365317cfcee42ad8a6b77fa1145c1d96bf6e534e4e273604
-
Filesize
350KB
MD5c200cd55bc92bba25cfa366756ed6cc5
SHA1c88c2856ea18c08e309e5f4577f3124f3f259686
SHA256096d5909de42c926f88e67a56d8a4699da1a0a6c6d317140bae98a7e9bc7aeb9
SHA512e1f5962d828523ebf1f512921f580d5e85eadf1f35fbfdfe7d448cd235295573644512dd805d0eb6365317cfcee42ad8a6b77fa1145c1d96bf6e534e4e273604