Analysis
-
max time kernel
85s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:32
Static task
static1
Behavioral task
behavioral1
Sample
7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe
Resource
win10v2004-20230221-en
General
-
Target
7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe
-
Size
701KB
-
MD5
1daef88f752fac26eba4037075b90294
-
SHA1
40f6384c96ea60467bb24b6453e932de6ad9fdaa
-
SHA256
7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd
-
SHA512
3d72b95529159bd3d4f68db1dfe1129970dc6319240b767079b28b7c7228da3f5f0a1f9b06b824fda85afea6ce2fd0b4d3e2c7c9ccba1b9cf646bd955bd1c8f5
-
SSDEEP
12288:aMrLy90Hercq9xx+HyfpWVWrykQ1PdCCTLZuVWuwNewF1zbBRvrP86kCbI6+:xyGeOScgVnWZN7Dzb3rkW+
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6335.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6335.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3584-190-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-191-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-193-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-195-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-197-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-199-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-201-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-203-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-205-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-209-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-210-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline behavioral1/memory/3584-213-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-215-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-217-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-219-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-221-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-223-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-225-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-227-0x0000000004D20000-0x0000000004D5E000-memory.dmp family_redline behavioral1/memory/3584-1110-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 896 un761664.exe 2176 pro6335.exe 3584 qu8646.exe 1332 si161009.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6335.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un761664.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un761664.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3056 2176 WerFault.exe 83 3104 3584 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2176 pro6335.exe 2176 pro6335.exe 3584 qu8646.exe 3584 qu8646.exe 1332 si161009.exe 1332 si161009.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2176 pro6335.exe Token: SeDebugPrivilege 3584 qu8646.exe Token: SeDebugPrivilege 1332 si161009.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4416 wrote to memory of 896 4416 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe 82 PID 4416 wrote to memory of 896 4416 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe 82 PID 4416 wrote to memory of 896 4416 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe 82 PID 896 wrote to memory of 2176 896 un761664.exe 83 PID 896 wrote to memory of 2176 896 un761664.exe 83 PID 896 wrote to memory of 2176 896 un761664.exe 83 PID 896 wrote to memory of 3584 896 un761664.exe 89 PID 896 wrote to memory of 3584 896 un761664.exe 89 PID 896 wrote to memory of 3584 896 un761664.exe 89 PID 4416 wrote to memory of 1332 4416 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe 92 PID 4416 wrote to memory of 1332 4416 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe 92 PID 4416 wrote to memory of 1332 4416 7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe"C:\Users\Admin\AppData\Local\Temp\7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un761664.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un761664.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6335.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6335.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 10844⤵
- Program crash
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8646.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8646.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 14844⤵
- Program crash
PID:3104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161009.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2176 -ip 21761⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3584 -ip 35841⤵PID:3680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ed662f4b728aed8bd763b87e1d599748
SHA1090521832789aead88b149b1369ebcd7f4abbc04
SHA256cd5ab39caaf6475dd2aeef19233d983d0c905d5fbed4f381bf19fc3491ffb87a
SHA51211c9e5c684bdf807f9a9ff12a46f986934ca20becb9ebb340fc768864bbd36d54ed4d49edef900c6c3b052f01b3bfc4952a625e6259f9f79ac1e720fcf911aaa
-
Filesize
175KB
MD5ed662f4b728aed8bd763b87e1d599748
SHA1090521832789aead88b149b1369ebcd7f4abbc04
SHA256cd5ab39caaf6475dd2aeef19233d983d0c905d5fbed4f381bf19fc3491ffb87a
SHA51211c9e5c684bdf807f9a9ff12a46f986934ca20becb9ebb340fc768864bbd36d54ed4d49edef900c6c3b052f01b3bfc4952a625e6259f9f79ac1e720fcf911aaa
-
Filesize
558KB
MD57e611c6090d6ff61fc5ebce1721d4f32
SHA19698043e6a72cdfb9994479f1fb7eab736b68bcd
SHA256e2302ded0d277c94e376c774b9af8fb6634e171647f54fea9e30c6a72fc9fb3d
SHA5122209e733f298aad66f75b9faf86df74f2d1e8c8aab45d5ca86cb1d4457a753981553d9611594e0c2b25ccffc0b50027f039079dae9a6255df156a327b711e69c
-
Filesize
558KB
MD57e611c6090d6ff61fc5ebce1721d4f32
SHA19698043e6a72cdfb9994479f1fb7eab736b68bcd
SHA256e2302ded0d277c94e376c774b9af8fb6634e171647f54fea9e30c6a72fc9fb3d
SHA5122209e733f298aad66f75b9faf86df74f2d1e8c8aab45d5ca86cb1d4457a753981553d9611594e0c2b25ccffc0b50027f039079dae9a6255df156a327b711e69c
-
Filesize
308KB
MD5007f766d9eeef7aceb071081b05d5263
SHA1e880ec2eacbbab1f5f19f233514ec458b21b147e
SHA256d85836cb9e7e6e001b6165e6fae90d6ec20ffdce8e745efe83aa610bc7fbcba4
SHA5129471c4fb7f0b915c49e9bb9b5f1170a9ecfd49231dfeb67b27281e047e107831cccb3b978b587990cb2749f99669809cf2607ae0dba021bf7e789874fcf296a0
-
Filesize
308KB
MD5007f766d9eeef7aceb071081b05d5263
SHA1e880ec2eacbbab1f5f19f233514ec458b21b147e
SHA256d85836cb9e7e6e001b6165e6fae90d6ec20ffdce8e745efe83aa610bc7fbcba4
SHA5129471c4fb7f0b915c49e9bb9b5f1170a9ecfd49231dfeb67b27281e047e107831cccb3b978b587990cb2749f99669809cf2607ae0dba021bf7e789874fcf296a0
-
Filesize
366KB
MD5d3f6bcc6fe5beb8a8f42288e7cf43304
SHA123eb989319634c23c881d3458e0b7a3b94f8dd50
SHA2560db86ecea444327109c0b1596c4676ed0ef73490a67005e6b0ce514729ab03ef
SHA5122f7c7ef9ecee1a1725ef6950d70c2011aea06bba284ef36a9b4c4f8426338c47099fca6c8ff510f929611f6778fd942a479e29c59945e63b7040cc7a8c90a6bc
-
Filesize
366KB
MD5d3f6bcc6fe5beb8a8f42288e7cf43304
SHA123eb989319634c23c881d3458e0b7a3b94f8dd50
SHA2560db86ecea444327109c0b1596c4676ed0ef73490a67005e6b0ce514729ab03ef
SHA5122f7c7ef9ecee1a1725ef6950d70c2011aea06bba284ef36a9b4c4f8426338c47099fca6c8ff510f929611f6778fd942a479e29c59945e63b7040cc7a8c90a6bc