Analysis
-
max time kernel
64s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe
Resource
win10v2004-20230220-en
General
-
Target
49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe
-
Size
700KB
-
MD5
69f978873cef2054e89160172ea64262
-
SHA1
d3d2b3a5a7b26d5067f1228a046f555498bf24b0
-
SHA256
49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df
-
SHA512
e20ecf4ef203af84be75f0e242a1c621070ce39d6e4e6ace056dff2e97a2c996f337861b283242803539eeee067ae56407a77fec13e23a18e5b28a1bfaa49887
-
SSDEEP
12288:5MrDy90EFimL4U/ZvtWETvVtkoieGQquzAzkaMTkWcBRvqKjwuBp:CyvFvL4U/zRgoieGYThTNcxj
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4354.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4632-190-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-191-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-193-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-195-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-197-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-199-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-201-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-203-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-205-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-207-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-209-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-211-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-213-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-215-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-217-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-219-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-221-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/4632-223-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4264 un467547.exe 2028 pro4354.exe 4632 qu0604.exe 2208 si649152.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4354.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un467547.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un467547.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 988 2028 WerFault.exe 83 4464 4632 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2028 pro4354.exe 2028 pro4354.exe 4632 qu0604.exe 4632 qu0604.exe 2208 si649152.exe 2208 si649152.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2028 pro4354.exe Token: SeDebugPrivilege 4632 qu0604.exe Token: SeDebugPrivilege 2208 si649152.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4264 2288 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe 82 PID 2288 wrote to memory of 4264 2288 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe 82 PID 2288 wrote to memory of 4264 2288 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe 82 PID 4264 wrote to memory of 2028 4264 un467547.exe 83 PID 4264 wrote to memory of 2028 4264 un467547.exe 83 PID 4264 wrote to memory of 2028 4264 un467547.exe 83 PID 4264 wrote to memory of 4632 4264 un467547.exe 89 PID 4264 wrote to memory of 4632 4264 un467547.exe 89 PID 4264 wrote to memory of 4632 4264 un467547.exe 89 PID 2288 wrote to memory of 2208 2288 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe 92 PID 2288 wrote to memory of 2208 2288 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe 92 PID 2288 wrote to memory of 2208 2288 49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe"C:\Users\Admin\AppData\Local\Temp\49533e1b3ee6c7ef7d20a79400eb37f43af02f995f5b7de63d7532f2197393df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467547.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4354.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 10844⤵
- Program crash
PID:988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0604.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 19644⤵
- Program crash
PID:4464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649152.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2028 -ip 20281⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4632 -ip 46321⤵PID:3948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59933d6d1c2d4de7ca57386d07164eb99
SHA12aa88a4fc797cf280a773952a7f20de19d2f19b2
SHA2561e10d58b66d4e91c599d00fb371d72994c3ffc671ed142c397139c02dd0e5405
SHA5123c3dccc8f63e5e7443df422e46f4f79453cc4fba705bb6479539d32f36e351e685532d243b23cc1d12ff80ac3f6909b2f39b157b7c18c6fa0fd4c420dbe24718
-
Filesize
175KB
MD59933d6d1c2d4de7ca57386d07164eb99
SHA12aa88a4fc797cf280a773952a7f20de19d2f19b2
SHA2561e10d58b66d4e91c599d00fb371d72994c3ffc671ed142c397139c02dd0e5405
SHA5123c3dccc8f63e5e7443df422e46f4f79453cc4fba705bb6479539d32f36e351e685532d243b23cc1d12ff80ac3f6909b2f39b157b7c18c6fa0fd4c420dbe24718
-
Filesize
558KB
MD5a6410a13664bdb2420de525d3dfb462e
SHA11060f36bdbee1acdc14b683df467951bc1fbbcb4
SHA256b4fbdadf84c1b0c924d41c70ee472f3b7082bb65c6cac4e0b5138618fc1fb066
SHA51201b34292dd7ce764bdc7dc8e491d0805ace41c8e369b6c6ddce530e88ec4a6342a813dd1ec93338af847787da4939bd80a947839f8e863fe80e5784084692d71
-
Filesize
558KB
MD5a6410a13664bdb2420de525d3dfb462e
SHA11060f36bdbee1acdc14b683df467951bc1fbbcb4
SHA256b4fbdadf84c1b0c924d41c70ee472f3b7082bb65c6cac4e0b5138618fc1fb066
SHA51201b34292dd7ce764bdc7dc8e491d0805ace41c8e369b6c6ddce530e88ec4a6342a813dd1ec93338af847787da4939bd80a947839f8e863fe80e5784084692d71
-
Filesize
308KB
MD58c5423cdcef6ab7ffd750dd450568ad1
SHA1713104d09675f7f29f679f9cb81d69274a6c04f4
SHA256016c11fd580ca2c205606d12de2f2bbdec00430fc6fa96285cbdb07f14fbd7f7
SHA512df4123f32446313615198a44fc856d5da545e47a98103abbab7f1184ec1b8ada3f5955e5cb4c5b3143d0ed01a77e093e3f33be8a483a2bd92fddbe1df39e0d19
-
Filesize
308KB
MD58c5423cdcef6ab7ffd750dd450568ad1
SHA1713104d09675f7f29f679f9cb81d69274a6c04f4
SHA256016c11fd580ca2c205606d12de2f2bbdec00430fc6fa96285cbdb07f14fbd7f7
SHA512df4123f32446313615198a44fc856d5da545e47a98103abbab7f1184ec1b8ada3f5955e5cb4c5b3143d0ed01a77e093e3f33be8a483a2bd92fddbe1df39e0d19
-
Filesize
366KB
MD5d6616d0a1122bb4363847a0fb0e70e72
SHA1f45c40cd8299b93f30b424dd79e6658ac99a22a7
SHA2561f43dbe0979ab1f3324110f9197d355f76a2862ba3ff2e3a87ac14efecbeb97e
SHA51213b6504710472d0b4623cbd4732e6f18d9aa54e8860b533c7fabe63354eaba6e884aae00d58dba97da673a65415beb2e1c15215fdec75d4f233931b5b5fa980b
-
Filesize
366KB
MD5d6616d0a1122bb4363847a0fb0e70e72
SHA1f45c40cd8299b93f30b424dd79e6658ac99a22a7
SHA2561f43dbe0979ab1f3324110f9197d355f76a2862ba3ff2e3a87ac14efecbeb97e
SHA51213b6504710472d0b4623cbd4732e6f18d9aa54e8860b533c7fabe63354eaba6e884aae00d58dba97da673a65415beb2e1c15215fdec75d4f233931b5b5fa980b