Analysis
-
max time kernel
57s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 15:51
Static task
static1
Behavioral task
behavioral1
Sample
ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe
Resource
win10-20230220-en
General
-
Target
ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe
-
Size
700KB
-
MD5
0759df3330fd841d0828018e1c7b7ad0
-
SHA1
b4011148794d09202b84ebd6f0919fc8b002e0d0
-
SHA256
ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103
-
SHA512
0dac49297f6a764959af5cf1b4ae48d36b9fad33503a816e74580acd7baf0103ab986537b08a7f4c07a19a0a59d590d065c2fd67b0b4ee2bb670f2408c2ce7c7
-
SSDEEP
12288:PMr9y90CTRocufToUF5lAmqXwK717O7KNOiAjBRv7YK+YGT:GyFT/erF3nCZO7uOiAjwKt8
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9558.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4164-176-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/4164-177-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/4164-179-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-178-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-181-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-183-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-185-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-187-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-189-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-191-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-193-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-195-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-197-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-201-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-203-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-199-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-205-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-207-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-209-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-211-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4164-214-0x0000000002580000-0x0000000002590000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1812 un118039.exe 1372 pro9558.exe 4164 qu7154.exe 4908 si981458.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9558.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un118039.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un118039.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1372 pro9558.exe 1372 pro9558.exe 4164 qu7154.exe 4164 qu7154.exe 4908 si981458.exe 4908 si981458.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1372 pro9558.exe Token: SeDebugPrivilege 4164 qu7154.exe Token: SeDebugPrivilege 4908 si981458.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1812 3712 ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe 67 PID 3712 wrote to memory of 1812 3712 ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe 67 PID 3712 wrote to memory of 1812 3712 ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe 67 PID 1812 wrote to memory of 1372 1812 un118039.exe 68 PID 1812 wrote to memory of 1372 1812 un118039.exe 68 PID 1812 wrote to memory of 1372 1812 un118039.exe 68 PID 1812 wrote to memory of 4164 1812 un118039.exe 69 PID 1812 wrote to memory of 4164 1812 un118039.exe 69 PID 1812 wrote to memory of 4164 1812 un118039.exe 69 PID 3712 wrote to memory of 4908 3712 ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe 71 PID 3712 wrote to memory of 4908 3712 ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe 71 PID 3712 wrote to memory of 4908 3712 ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe"C:\Users\Admin\AppData\Local\Temp\ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un118039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un118039.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9558.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7154.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7154.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981458.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a858dfd4ee7ee382a39f7dc12893acdc
SHA19253d99f6860b197ddbe2c5e09bc19a45018b6ba
SHA256b3e35c40a276093203c106a1e1300928a4103f422962504c2653e1d37c31f629
SHA512ce20d58b301866fc353822118c97c5da1cd1384407bef61c039f796c83e0308d5d53282ad33595aa5233bdd80e3283ff967012142653901e5b2d06e2f09cad3b
-
Filesize
175KB
MD5a858dfd4ee7ee382a39f7dc12893acdc
SHA19253d99f6860b197ddbe2c5e09bc19a45018b6ba
SHA256b3e35c40a276093203c106a1e1300928a4103f422962504c2653e1d37c31f629
SHA512ce20d58b301866fc353822118c97c5da1cd1384407bef61c039f796c83e0308d5d53282ad33595aa5233bdd80e3283ff967012142653901e5b2d06e2f09cad3b
-
Filesize
558KB
MD5acb0757b60edb43c155d4e80090d9fb3
SHA12acb15ed4d839cd2cd05be4e0e9d98b03ebf0c0f
SHA256b5c598a8db474c38e3c571be5a7ec8e6fee81245ea59c3aba839739fca370673
SHA512b5922fa6b8af0f28a0a87f0b5fc3fa3c80d0a2db009756546bcbb50aa411be919baf66e26293085478b5dce535576e4f4c1be205e1a23e609604f8ea87de35ba
-
Filesize
558KB
MD5acb0757b60edb43c155d4e80090d9fb3
SHA12acb15ed4d839cd2cd05be4e0e9d98b03ebf0c0f
SHA256b5c598a8db474c38e3c571be5a7ec8e6fee81245ea59c3aba839739fca370673
SHA512b5922fa6b8af0f28a0a87f0b5fc3fa3c80d0a2db009756546bcbb50aa411be919baf66e26293085478b5dce535576e4f4c1be205e1a23e609604f8ea87de35ba
-
Filesize
308KB
MD526b6cde7959f64c3458ebddfe1f3825b
SHA1e23ee21193f58250a08da5686080009f538f6070
SHA2565de9ca974f2d617af789454a2498df2e12a7ee2fdfa9888933d81dd1fdd5dab1
SHA512f1940d67b8ad19f3216db75f83a57a6183ca5abf379f1979803e45417f617efb96391dc08369b35f33d58751c19f40f24fc1618170ce2f7d73362249ba48c469
-
Filesize
308KB
MD526b6cde7959f64c3458ebddfe1f3825b
SHA1e23ee21193f58250a08da5686080009f538f6070
SHA2565de9ca974f2d617af789454a2498df2e12a7ee2fdfa9888933d81dd1fdd5dab1
SHA512f1940d67b8ad19f3216db75f83a57a6183ca5abf379f1979803e45417f617efb96391dc08369b35f33d58751c19f40f24fc1618170ce2f7d73362249ba48c469
-
Filesize
366KB
MD554cc65e578ed6a3add9f6b552cb40370
SHA13c01c10a049282cae3a27bd336e1dc8c3757fb57
SHA2567b3860a0e8c27f08aa0644fead5be1cccc7fd3ad3e965698f0d38aa2ea0ac7a4
SHA5128a266d8b9b3287e22848fbc843a6f241a83cfe4480177b95837073710521473ae45bf9c25cce1cc6474bf4be2b44a00050fb599d8e1a5c4c8897e82a8b346717
-
Filesize
366KB
MD554cc65e578ed6a3add9f6b552cb40370
SHA13c01c10a049282cae3a27bd336e1dc8c3757fb57
SHA2567b3860a0e8c27f08aa0644fead5be1cccc7fd3ad3e965698f0d38aa2ea0ac7a4
SHA5128a266d8b9b3287e22848fbc843a6f241a83cfe4480177b95837073710521473ae45bf9c25cce1cc6474bf4be2b44a00050fb599d8e1a5c4c8897e82a8b346717