Analysis
-
max time kernel
53s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 15:34
Static task
static1
Behavioral task
behavioral1
Sample
d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe
Resource
win10-20230220-en
General
-
Target
d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe
-
Size
700KB
-
MD5
3e2c1e5b60d9e69e193c61e22d65cef2
-
SHA1
8e6eb24a364ccba7fad6dc19a82b10293c08682a
-
SHA256
d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9
-
SHA512
41b1787556460cf826d543c90257950e461560bdc08dd5d6c35f812a0ad97a63020e4d23a59019cf5284ad64498d5830c6274b7dee6c948eeaa10237dbcda567
-
SSDEEP
12288:jMreOy90uAh6SsKBCRBVPp7Abq3HyUGuqpLXY2aBmCBzU0o+D9fBRveRmEu+DBC:6yUh6SZCb6SHyfCxzdFfWBC
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4820-178-0x00000000024E0000-0x0000000002526000-memory.dmp family_redline behavioral1/memory/4820-179-0x0000000005210000-0x0000000005254000-memory.dmp family_redline behavioral1/memory/4820-181-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-180-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-183-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-185-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-187-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-191-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-195-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-197-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-199-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-201-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-203-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-205-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-207-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-209-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-211-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-213-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-215-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/4820-217-0x0000000005210000-0x000000000524E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3840 un308578.exe 4924 pro8054.exe 4820 qu5689.exe 3076 si514138.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8054.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un308578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un308578.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4924 pro8054.exe 4924 pro8054.exe 4820 qu5689.exe 4820 qu5689.exe 3076 si514138.exe 3076 si514138.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4924 pro8054.exe Token: SeDebugPrivilege 4820 qu5689.exe Token: SeDebugPrivilege 3076 si514138.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 376 wrote to memory of 3840 376 d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe 66 PID 376 wrote to memory of 3840 376 d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe 66 PID 376 wrote to memory of 3840 376 d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe 66 PID 3840 wrote to memory of 4924 3840 un308578.exe 67 PID 3840 wrote to memory of 4924 3840 un308578.exe 67 PID 3840 wrote to memory of 4924 3840 un308578.exe 67 PID 3840 wrote to memory of 4820 3840 un308578.exe 68 PID 3840 wrote to memory of 4820 3840 un308578.exe 68 PID 3840 wrote to memory of 4820 3840 un308578.exe 68 PID 376 wrote to memory of 3076 376 d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe 70 PID 376 wrote to memory of 3076 376 d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe 70 PID 376 wrote to memory of 3076 376 d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe"C:\Users\Admin\AppData\Local\Temp\d2ee3b2f6d18c655d8474ae68713adfc758dff11cddcda0a85d2b1146ead2cf9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5689.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514138.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514138.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5400a1a97b07b7253f1af74f8be31ef82
SHA11d79c8bc28e1e383d2e712114eb637fed9c586a2
SHA25621ba1f33a15874e4ae1633b0234ba3b1e50c6146aa8dbbffb790cc9ed68c4b26
SHA5124db7c0ab585136cb040d60752e457da025dc9f01262fb200a7798831a62d26421f180c21b1972b6dc570a5301314df2675f1204bdaab6cccf7e2cf771677b701
-
Filesize
175KB
MD5400a1a97b07b7253f1af74f8be31ef82
SHA11d79c8bc28e1e383d2e712114eb637fed9c586a2
SHA25621ba1f33a15874e4ae1633b0234ba3b1e50c6146aa8dbbffb790cc9ed68c4b26
SHA5124db7c0ab585136cb040d60752e457da025dc9f01262fb200a7798831a62d26421f180c21b1972b6dc570a5301314df2675f1204bdaab6cccf7e2cf771677b701
-
Filesize
558KB
MD54d2ca20f26d141dac8f550cf89796058
SHA17caa60fca4c28e2459264c209d235c2035fc7e63
SHA256d4944b046924816bbdd7fce5edf79980dfe3eecca9450311820a04663d39a1bf
SHA512d3b4b28664edb7712521ea913a78e338fdc4aa18e758801f653bf64e026440d7593e5c9cb22617405b1b888946bd12c3785e60ce19edb637ea5db77e005af578
-
Filesize
558KB
MD54d2ca20f26d141dac8f550cf89796058
SHA17caa60fca4c28e2459264c209d235c2035fc7e63
SHA256d4944b046924816bbdd7fce5edf79980dfe3eecca9450311820a04663d39a1bf
SHA512d3b4b28664edb7712521ea913a78e338fdc4aa18e758801f653bf64e026440d7593e5c9cb22617405b1b888946bd12c3785e60ce19edb637ea5db77e005af578
-
Filesize
308KB
MD59721912b866f5af4059f3eb8a952584c
SHA1954570bc42026db20c58d348bbba2c2355c71aea
SHA25657a86b63ecb1c616c8bbc91c0b00bdd940e9d3f3f7603c4c1254a981210fd62a
SHA51224bf86bc93271e7ec519de1e0862d51860246cacb436c1da61259840c1431a531c664a97d3ac6fcefbe7f655d9eb2ebabd57dc94b95ed1a56d13e93c31fc5250
-
Filesize
308KB
MD59721912b866f5af4059f3eb8a952584c
SHA1954570bc42026db20c58d348bbba2c2355c71aea
SHA25657a86b63ecb1c616c8bbc91c0b00bdd940e9d3f3f7603c4c1254a981210fd62a
SHA51224bf86bc93271e7ec519de1e0862d51860246cacb436c1da61259840c1431a531c664a97d3ac6fcefbe7f655d9eb2ebabd57dc94b95ed1a56d13e93c31fc5250
-
Filesize
366KB
MD53128a6864c116600b13f6615ab6c7555
SHA1ec037cdabe8e942dd92176af5d3c5137f57ef250
SHA256ca9cf2082c983bf831f10566a8318bb6b467c09ca11617e2991e55d84f2bbaad
SHA512540a289c1fec7dbc60e6d315b22642960dba593e210271b265dac958981edf7aa83fc0e5eb80fc646c7017c1c36e1854beec1a52f6ac1296d15af51a7abb79ef
-
Filesize
366KB
MD53128a6864c116600b13f6615ab6c7555
SHA1ec037cdabe8e942dd92176af5d3c5137f57ef250
SHA256ca9cf2082c983bf831f10566a8318bb6b467c09ca11617e2991e55d84f2bbaad
SHA512540a289c1fec7dbc60e6d315b22642960dba593e210271b265dac958981edf7aa83fc0e5eb80fc646c7017c1c36e1854beec1a52f6ac1296d15af51a7abb79ef