Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe
Resource
win10v2004-20230220-en
General
-
Target
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe
-
Size
701KB
-
MD5
8737604f6d39831dc15e9299117f1974
-
SHA1
e648205a9628330276c73464f2e6bc4f1299aa39
-
SHA256
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d
-
SHA512
064808ba56edf31df1cb05b00ebeb771b7e8ae2eaf5ea6e85f5ae0a4475c8466d76cde32c86e87b43b86d70db2f7d020c432031b3aa049209d7d4da7d673a0d3
-
SSDEEP
12288:BMrty90/12LdSoi4YMu/jpZ0zm570k7MABRvJcXRmVL2iVW:kyM12JBXy/jbY8MA96gVC
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3104.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3104.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4696-191-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-192-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-194-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-196-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-198-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-200-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-202-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-204-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-206-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-208-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-210-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-212-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-214-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-216-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-218-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-220-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-222-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-224-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4696-305-0x0000000002210000-0x0000000002220000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1068 un447487.exe 4336 pro3104.exe 4696 qu9392.exe 4208 si998705.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3104.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un447487.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un447487.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1584 4336 WerFault.exe 84 3300 4696 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4336 pro3104.exe 4336 pro3104.exe 4696 qu9392.exe 4696 qu9392.exe 4208 si998705.exe 4208 si998705.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4336 pro3104.exe Token: SeDebugPrivilege 4696 qu9392.exe Token: SeDebugPrivilege 4208 si998705.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1068 1448 cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe 83 PID 1448 wrote to memory of 1068 1448 cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe 83 PID 1448 wrote to memory of 1068 1448 cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe 83 PID 1068 wrote to memory of 4336 1068 un447487.exe 84 PID 1068 wrote to memory of 4336 1068 un447487.exe 84 PID 1068 wrote to memory of 4336 1068 un447487.exe 84 PID 1068 wrote to memory of 4696 1068 un447487.exe 87 PID 1068 wrote to memory of 4696 1068 un447487.exe 87 PID 1068 wrote to memory of 4696 1068 un447487.exe 87 PID 1448 wrote to memory of 4208 1448 cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe 90 PID 1448 wrote to memory of 4208 1448 cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe 90 PID 1448 wrote to memory of 4208 1448 cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe"C:\Users\Admin\AppData\Local\Temp\cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3104.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 10844⤵
- Program crash
PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9392.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9392.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 19044⤵
- Program crash
PID:3300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si998705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si998705.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4336 -ip 43361⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4696 -ip 46961⤵PID:3860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57e3d4c751deb6fbdc682f8f55625c13b
SHA1a1d81484676b76f7c0895a8cf30b915995d9e400
SHA2562b64363767a428d826990f15542a43c5e594b7e97736c059f09e1a6fcb244fa4
SHA512a36c5df117b2deaa8a51a52a1d5e5301747f4295a7b2659fd3921528750c3d80cc4b6e726860b4d07d4572b01265ffc159caddf15555b7128f387d2fc7e9fa1c
-
Filesize
175KB
MD57e3d4c751deb6fbdc682f8f55625c13b
SHA1a1d81484676b76f7c0895a8cf30b915995d9e400
SHA2562b64363767a428d826990f15542a43c5e594b7e97736c059f09e1a6fcb244fa4
SHA512a36c5df117b2deaa8a51a52a1d5e5301747f4295a7b2659fd3921528750c3d80cc4b6e726860b4d07d4572b01265ffc159caddf15555b7128f387d2fc7e9fa1c
-
Filesize
558KB
MD5e97f2f1914752032a17b47d9eb68712e
SHA1cd603a418f2b590086ba79079a824d1eb41e7a00
SHA256d4e44f18b6a0ca34d16da3a3333399ba13d043c60d5bd48c936be5e707a6758c
SHA512095d42c8feb17e15143507bd4ff2311b4f7b641d8e9433b584db200219166930c6c03ded89136d02a63064c4b870115336a6f80efc5be24e75f7b61afb83d7c9
-
Filesize
558KB
MD5e97f2f1914752032a17b47d9eb68712e
SHA1cd603a418f2b590086ba79079a824d1eb41e7a00
SHA256d4e44f18b6a0ca34d16da3a3333399ba13d043c60d5bd48c936be5e707a6758c
SHA512095d42c8feb17e15143507bd4ff2311b4f7b641d8e9433b584db200219166930c6c03ded89136d02a63064c4b870115336a6f80efc5be24e75f7b61afb83d7c9
-
Filesize
308KB
MD549789436f02b684bceebb46b29ded6f9
SHA1e8faa4fc37814d7b37ff40e9894ac3961bfc18f2
SHA2569f192b721604f8e234e2aea1286aa5f4dcb436671fe50428750325144b1ed965
SHA51238b4a94509a57e66e8f4485053be5184882ef7ed72c4f29525557bd7222590601298e0106e34d4c1d8839a5d9a3b879cea7cbfc90586e1abe8fc67dd2ecbfbe9
-
Filesize
308KB
MD549789436f02b684bceebb46b29ded6f9
SHA1e8faa4fc37814d7b37ff40e9894ac3961bfc18f2
SHA2569f192b721604f8e234e2aea1286aa5f4dcb436671fe50428750325144b1ed965
SHA51238b4a94509a57e66e8f4485053be5184882ef7ed72c4f29525557bd7222590601298e0106e34d4c1d8839a5d9a3b879cea7cbfc90586e1abe8fc67dd2ecbfbe9
-
Filesize
366KB
MD57363026a93ec0dfac8638c5dfc846a4c
SHA1eff6d1b5ceeb5aac418ee424ba498bdfb94a2146
SHA256ac7eb3243b3f9ab8fcc809756f3bdc2f21a2bddb8b55c6b29806a3d3b643cbf9
SHA512f89ad689e2300d3a84d7a5c0e1a16d217dc62de6ff810d4d70b53ec0f0b76eef7cce6ed88c5a78b190aa11a037021a430c5d1de02e8229fc16eb20338a5457c6
-
Filesize
366KB
MD57363026a93ec0dfac8638c5dfc846a4c
SHA1eff6d1b5ceeb5aac418ee424ba498bdfb94a2146
SHA256ac7eb3243b3f9ab8fcc809756f3bdc2f21a2bddb8b55c6b29806a3d3b643cbf9
SHA512f89ad689e2300d3a84d7a5c0e1a16d217dc62de6ff810d4d70b53ec0f0b76eef7cce6ed88c5a78b190aa11a037021a430c5d1de02e8229fc16eb20338a5457c6