Analysis
-
max time kernel
102s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:53
Static task
static1
Behavioral task
behavioral1
Sample
bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe
Resource
win10v2004-20230220-en
General
-
Target
bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe
-
Size
700KB
-
MD5
6e3a072561b4d9204576b9a8f362ac5b
-
SHA1
fc373910a191a7789110e72e03c465e4180cc9ab
-
SHA256
bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df
-
SHA512
8f4ede90f691bae8c7a213b1fc0e621d9aa5fb5be6df864f87d9d2687db31dc8ee2fe2d950eebc38c987b1f7f227c3a147a63b55d0993cdbb4c8d317ef7740a6
-
SSDEEP
12288:KMr9y90/Wvg83QiFTAfAv2LYXeugMBhyZDSfjkayacXo1P/BRvgNllOm9xPmd8GQ:HyUg7P4ho8GfjkqP/sjlOm9xOd2
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7389.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7389.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4464-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-202-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-206-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-214-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-213-0x0000000004D50000-0x0000000004D60000-memory.dmp family_redline behavioral1/memory/4464-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-218-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-220-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-224-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-226-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/4464-228-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1448 un813008.exe 1168 pro7389.exe 4464 qu4984.exe 3044 si359753.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7389.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un813008.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un813008.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1308 1168 WerFault.exe 85 2268 4464 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1168 pro7389.exe 1168 pro7389.exe 4464 qu4984.exe 4464 qu4984.exe 3044 si359753.exe 3044 si359753.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1168 pro7389.exe Token: SeDebugPrivilege 4464 qu4984.exe Token: SeDebugPrivilege 3044 si359753.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1448 5056 bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe 84 PID 5056 wrote to memory of 1448 5056 bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe 84 PID 5056 wrote to memory of 1448 5056 bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe 84 PID 1448 wrote to memory of 1168 1448 un813008.exe 85 PID 1448 wrote to memory of 1168 1448 un813008.exe 85 PID 1448 wrote to memory of 1168 1448 un813008.exe 85 PID 1448 wrote to memory of 4464 1448 un813008.exe 91 PID 1448 wrote to memory of 4464 1448 un813008.exe 91 PID 1448 wrote to memory of 4464 1448 un813008.exe 91 PID 5056 wrote to memory of 3044 5056 bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe 94 PID 5056 wrote to memory of 3044 5056 bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe 94 PID 5056 wrote to memory of 3044 5056 bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe"C:\Users\Admin\AppData\Local\Temp\bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813008.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813008.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7389.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10844⤵
- Program crash
PID:1308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4984.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4984.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11884⤵
- Program crash
PID:2268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359753.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359753.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1168 -ip 11681⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4464 -ip 44641⤵PID:1552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bf46024197b62c690cbca48b9f83a480
SHA1caf704c7b7257017eb3ee477d949f74e06bcdd37
SHA25620435357eaadbbd00b6ae609e3154a5a2d5a11354315877da58ceadbc46ade34
SHA5125edb0922782589a21657dc4e4ba47acef880afbe707125a7a63e5d872c78f79830dc1f0c5b3e63501bdfa64643d9d1e4adf8ed642b1030b96223cf5074a60ed1
-
Filesize
175KB
MD5bf46024197b62c690cbca48b9f83a480
SHA1caf704c7b7257017eb3ee477d949f74e06bcdd37
SHA25620435357eaadbbd00b6ae609e3154a5a2d5a11354315877da58ceadbc46ade34
SHA5125edb0922782589a21657dc4e4ba47acef880afbe707125a7a63e5d872c78f79830dc1f0c5b3e63501bdfa64643d9d1e4adf8ed642b1030b96223cf5074a60ed1
-
Filesize
558KB
MD5c45f0705790c47366b9382e92a5d4ff7
SHA1de0c380351eec47acdebe643004349e179ddd46b
SHA2561c17b3390655254ac9d610c44bac0c442847b247d0a96219c36d9610dd426ef6
SHA51272272ae029d095697a1ebf31dcf387a225c4f78bc2a2987a3e631fea79102881f5a8b410cd5a2146b9b6fee6328828043333f74ba8b7e4e4e5cc00a7ba45bffd
-
Filesize
558KB
MD5c45f0705790c47366b9382e92a5d4ff7
SHA1de0c380351eec47acdebe643004349e179ddd46b
SHA2561c17b3390655254ac9d610c44bac0c442847b247d0a96219c36d9610dd426ef6
SHA51272272ae029d095697a1ebf31dcf387a225c4f78bc2a2987a3e631fea79102881f5a8b410cd5a2146b9b6fee6328828043333f74ba8b7e4e4e5cc00a7ba45bffd
-
Filesize
308KB
MD5d7279cb7544215d0e93a38b7486246fb
SHA1910acd0a8f45d5b9c452027cf50edd68ab4037fb
SHA2560d327c980d4353b62584bf2eeeb590807eff158af1180de0229541f3619f1575
SHA5123cce7e6197ad2842073515caf4a1777b05137bfca33e965b3b9982a7baddee5f3d14fea7ab773e40be2aa9f386a3021c77ceac27616ae96902798c4c9bda1b2b
-
Filesize
308KB
MD5d7279cb7544215d0e93a38b7486246fb
SHA1910acd0a8f45d5b9c452027cf50edd68ab4037fb
SHA2560d327c980d4353b62584bf2eeeb590807eff158af1180de0229541f3619f1575
SHA5123cce7e6197ad2842073515caf4a1777b05137bfca33e965b3b9982a7baddee5f3d14fea7ab773e40be2aa9f386a3021c77ceac27616ae96902798c4c9bda1b2b
-
Filesize
366KB
MD5dc46a47c91baef44cf971a44d5d59964
SHA13446cb77244e55d61841d5d1144e95f961fad06e
SHA256797ec23ed0edcb289cf034947f87ff97d015170a04a449555dbfcb5a49084375
SHA512da7598352bc1958d7882c5574caa373f485f1e1d0df76e6a60a63e5205b6354a1e8ca2e0e41a2ef8856b46fbc7450de4bfe515fd8c37254c24dd21a2ae0d2690
-
Filesize
366KB
MD5dc46a47c91baef44cf971a44d5d59964
SHA13446cb77244e55d61841d5d1144e95f961fad06e
SHA256797ec23ed0edcb289cf034947f87ff97d015170a04a449555dbfcb5a49084375
SHA512da7598352bc1958d7882c5574caa373f485f1e1d0df76e6a60a63e5205b6354a1e8ca2e0e41a2ef8856b46fbc7450de4bfe515fd8c37254c24dd21a2ae0d2690