Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:58
Static task
static1
Behavioral task
behavioral1
Sample
7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe
Resource
win10v2004-20230220-en
General
-
Target
7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe
-
Size
700KB
-
MD5
0d1457b62e573fc100c4697245f8aa26
-
SHA1
951c15d415d4415a20a409c2df3f6f2eace2c7a8
-
SHA256
7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5
-
SHA512
68d74b5fb267f1733962eb3a18a7f96767b2fe0b91d6a7f9e29cdab9eaa22e275b7be03742c0328fbed3ec9978c1c1abddf1792235e5295acd891af42bac5303
-
SSDEEP
12288:JMrHy90HWWvsIh6HcBbrQTj0Fo4rGSui7idVrNBRvhGcXRWNB4jUN3Hngu8:uy0/vv68BATj0e4rG+0VrNc6kNBhFn2
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7857.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7857.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1992-191-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-192-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-194-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-196-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-198-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-200-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-202-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-204-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-206-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-208-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-210-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-212-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-214-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-217-0x0000000002520000-0x0000000002530000-memory.dmp family_redline behavioral1/memory/1992-218-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-219-0x0000000002520000-0x0000000002530000-memory.dmp family_redline behavioral1/memory/1992-221-0x0000000002520000-0x0000000002530000-memory.dmp family_redline behavioral1/memory/1992-222-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-224-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-226-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/1992-228-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1528 un993191.exe 644 pro7857.exe 1992 qu5110.exe 2912 si708377.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7857.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un993191.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un993191.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4896 644 WerFault.exe 84 1652 1992 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 644 pro7857.exe 644 pro7857.exe 1992 qu5110.exe 1992 qu5110.exe 2912 si708377.exe 2912 si708377.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 644 pro7857.exe Token: SeDebugPrivilege 1992 qu5110.exe Token: SeDebugPrivilege 2912 si708377.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4924 wrote to memory of 1528 4924 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe 83 PID 4924 wrote to memory of 1528 4924 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe 83 PID 4924 wrote to memory of 1528 4924 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe 83 PID 1528 wrote to memory of 644 1528 un993191.exe 84 PID 1528 wrote to memory of 644 1528 un993191.exe 84 PID 1528 wrote to memory of 644 1528 un993191.exe 84 PID 1528 wrote to memory of 1992 1528 un993191.exe 90 PID 1528 wrote to memory of 1992 1528 un993191.exe 90 PID 1528 wrote to memory of 1992 1528 un993191.exe 90 PID 4924 wrote to memory of 2912 4924 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe 94 PID 4924 wrote to memory of 2912 4924 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe 94 PID 4924 wrote to memory of 2912 4924 7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe"C:\Users\Admin\AppData\Local\Temp\7a2eed1757a60174c3bffbdac6980fd2471feb4ef8ea8bd8673ff06f65d4c3b5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un993191.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un993191.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7857.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 10844⤵
- Program crash
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5110.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5110.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 18284⤵
- Program crash
PID:1652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si708377.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si708377.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 644 -ip 6441⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1992 -ip 19921⤵PID:1816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5de77c44cad727c75419e19792ff8f8d3
SHA1830384b91dd060d5cb3a8a4c1c5853528b59301a
SHA256d5483cf6a7e79bb6831d3b7695b0509088b2aeaa3b5508a082d0e10b42b0e27a
SHA5121618dfce720455e814f8ebc144729b0c5e469bcf695afdc6f39734958cc0f244261e6eb0d6804480d88428970650e5de43ffc354c8d170935d998f80c6910107
-
Filesize
175KB
MD5de77c44cad727c75419e19792ff8f8d3
SHA1830384b91dd060d5cb3a8a4c1c5853528b59301a
SHA256d5483cf6a7e79bb6831d3b7695b0509088b2aeaa3b5508a082d0e10b42b0e27a
SHA5121618dfce720455e814f8ebc144729b0c5e469bcf695afdc6f39734958cc0f244261e6eb0d6804480d88428970650e5de43ffc354c8d170935d998f80c6910107
-
Filesize
558KB
MD556ef4cf218b7659af2591672f5a017e4
SHA193ce96fe9cccc25f75a7823d4a3a1e67a6d40f74
SHA256a1238d3e90ba450ccf47d42297115729b075344776114a6432f643f163ecc3e2
SHA5122598046b1b58edf9f8eaf81a72fb45563fcf0e5e056de8129f35ab165b13777b4c9f855e88b2de9f26d30316c8b51109b329ee35dfd870cdfe7a77ba8250951f
-
Filesize
558KB
MD556ef4cf218b7659af2591672f5a017e4
SHA193ce96fe9cccc25f75a7823d4a3a1e67a6d40f74
SHA256a1238d3e90ba450ccf47d42297115729b075344776114a6432f643f163ecc3e2
SHA5122598046b1b58edf9f8eaf81a72fb45563fcf0e5e056de8129f35ab165b13777b4c9f855e88b2de9f26d30316c8b51109b329ee35dfd870cdfe7a77ba8250951f
-
Filesize
308KB
MD5b319d47cc52f9445a0d95722f9a4fcb7
SHA1dac2714995d318af20812033e0b0c33acd7b6336
SHA256df33cf2442dea3091f6de1774d269949bfeaecdc48dc40e724ac1e225cc22194
SHA512436113036580436d591cfa06d09073767b1666e58936bf4df48e9ef06491aa51fe95f6d313eb584e77bb1daef969889954ebaa65a6825aa63a4cff654d015896
-
Filesize
308KB
MD5b319d47cc52f9445a0d95722f9a4fcb7
SHA1dac2714995d318af20812033e0b0c33acd7b6336
SHA256df33cf2442dea3091f6de1774d269949bfeaecdc48dc40e724ac1e225cc22194
SHA512436113036580436d591cfa06d09073767b1666e58936bf4df48e9ef06491aa51fe95f6d313eb584e77bb1daef969889954ebaa65a6825aa63a4cff654d015896
-
Filesize
366KB
MD54993c8e0668c96955e1a475ec7202734
SHA1f42da47af1c41544bde92a9e23f52bf435c382c3
SHA256b7a793a9edf3243907af8943644fe6e8fca5cc45175ca6caed820af7caca68eb
SHA512beaef6e5e52827ea75021e0563196d6799e1bbf32331d5331dcae46745fa1ba9f02cc10bf3752fb231769da2993ef53470ff2da491f6292c47d48dfe7f9f76a3
-
Filesize
366KB
MD54993c8e0668c96955e1a475ec7202734
SHA1f42da47af1c41544bde92a9e23f52bf435c382c3
SHA256b7a793a9edf3243907af8943644fe6e8fca5cc45175ca6caed820af7caca68eb
SHA512beaef6e5e52827ea75021e0563196d6799e1bbf32331d5331dcae46745fa1ba9f02cc10bf3752fb231769da2993ef53470ff2da491f6292c47d48dfe7f9f76a3