Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 15:58
Static task
static1
Behavioral task
behavioral1
Sample
e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe
Resource
win10v2004-20230220-en
General
-
Target
e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe
-
Size
701KB
-
MD5
6bc6e4675c1a34e7e9a031d2fe088a80
-
SHA1
e656fe8c96812cfb45f8af313b4c0c5477e8ea8e
-
SHA256
e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501
-
SHA512
a439c31a8b23dc1353bd28cb3247ad5fea71c08d64f7c0559220055f689831f96db05d1c3f1c3d2f43f50f24afd3755c077be9ce7b7e0ecbe8f2f038c9d3ef14
-
SSDEEP
12288:XMrHy90er+k9I1+Z5phNXgKp4YRuRsFN5+/4RU1EPfUkBRv8+xLN+N:UyDbZXgKp4L8XR5Mk4i4
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8379.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8379.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8379.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3920-191-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-193-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-196-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-198-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-200-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-202-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-204-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-206-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-208-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-210-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-212-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-214-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-216-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-218-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-220-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-222-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-226-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3920-224-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4384 un532047.exe 3352 pro8379.exe 3920 qu5712.exe 3196 si824762.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8379.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8379.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un532047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un532047.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2012 3352 WerFault.exe 85 3056 3920 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3352 pro8379.exe 3352 pro8379.exe 3920 qu5712.exe 3920 qu5712.exe 3196 si824762.exe 3196 si824762.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3352 pro8379.exe Token: SeDebugPrivilege 3920 qu5712.exe Token: SeDebugPrivilege 3196 si824762.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3408 wrote to memory of 4384 3408 e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe 84 PID 3408 wrote to memory of 4384 3408 e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe 84 PID 3408 wrote to memory of 4384 3408 e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe 84 PID 4384 wrote to memory of 3352 4384 un532047.exe 85 PID 4384 wrote to memory of 3352 4384 un532047.exe 85 PID 4384 wrote to memory of 3352 4384 un532047.exe 85 PID 4384 wrote to memory of 3920 4384 un532047.exe 94 PID 4384 wrote to memory of 3920 4384 un532047.exe 94 PID 4384 wrote to memory of 3920 4384 un532047.exe 94 PID 3408 wrote to memory of 3196 3408 e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe 99 PID 3408 wrote to memory of 3196 3408 e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe 99 PID 3408 wrote to memory of 3196 3408 e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe"C:\Users\Admin\AppData\Local\Temp\e552563110c3c5022eb5dadf84a5bcad2250b619beebc3bb4b837569b6059501.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8379.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8379.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 10884⤵
- Program crash
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5712.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 19604⤵
- Program crash
PID:3056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824762.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3352 -ip 33521⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3920 -ip 39201⤵PID:3844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD519accd9c0aff25ded7d82ba3f8d42002
SHA181300e086c77ef04616ee381f0e51b39e893ce44
SHA256599cd5d2f82bf50bef647ed7af32e05f1f8dd0ab1b627c1aa6c83551be414aa2
SHA512e6e0b135cadf51402cea97ff4a0eeb0fc3dbca4944b960c9f6742e06baccccc6d416746d19308f4aa425c22d976a38c2dc016f76fb397942b12b63977b01937a
-
Filesize
175KB
MD519accd9c0aff25ded7d82ba3f8d42002
SHA181300e086c77ef04616ee381f0e51b39e893ce44
SHA256599cd5d2f82bf50bef647ed7af32e05f1f8dd0ab1b627c1aa6c83551be414aa2
SHA512e6e0b135cadf51402cea97ff4a0eeb0fc3dbca4944b960c9f6742e06baccccc6d416746d19308f4aa425c22d976a38c2dc016f76fb397942b12b63977b01937a
-
Filesize
558KB
MD57013686ee98e70f5f7273999d39f8480
SHA1799d952e0c2680355011909565b5f633f226f04e
SHA25602d8f9140fae2759dc726f3cf775dd7792b4c0c60306ac37bb454ca60aee5247
SHA512ae864ed34249104fed08128571a056022a07ac9e3a268608c3a0e38aa45d1b531ae23c4e842eb49453f19990c0fc9815be6441471cf0bd70ba23f91659b72d55
-
Filesize
558KB
MD57013686ee98e70f5f7273999d39f8480
SHA1799d952e0c2680355011909565b5f633f226f04e
SHA25602d8f9140fae2759dc726f3cf775dd7792b4c0c60306ac37bb454ca60aee5247
SHA512ae864ed34249104fed08128571a056022a07ac9e3a268608c3a0e38aa45d1b531ae23c4e842eb49453f19990c0fc9815be6441471cf0bd70ba23f91659b72d55
-
Filesize
308KB
MD50ace290088fd4027970d69e691cec4aa
SHA1d3aa8c0f3242fb81276146866fc1c515286c4354
SHA256e74dcb94b6c79b0b7379dc9e09510851d5c4eb818cee38c637fd18c9a862f839
SHA512da0130948508edf9f0bf59f65c331b8abb3336b7559c5e8e6774f525ed89723cf66804315330fc981a0f48e91a98f61a814555491415e7c84c025ff6bc6f50f8
-
Filesize
308KB
MD50ace290088fd4027970d69e691cec4aa
SHA1d3aa8c0f3242fb81276146866fc1c515286c4354
SHA256e74dcb94b6c79b0b7379dc9e09510851d5c4eb818cee38c637fd18c9a862f839
SHA512da0130948508edf9f0bf59f65c331b8abb3336b7559c5e8e6774f525ed89723cf66804315330fc981a0f48e91a98f61a814555491415e7c84c025ff6bc6f50f8
-
Filesize
366KB
MD5ac2bb24261b45906ff59c0025a1b0ba4
SHA13504c0efbf8b00f2abc0f18a5d0eedce30fbfa14
SHA25674ba20d2dae8dfde27c8740a94982f78215e485cee96cc53b0624316f18b6143
SHA5121be727f8c4a802677809f04aa7b842e7e4a158ddfedf7c8830dfe755ee2e3c3c7001d1fda3dda2a1464c0b46e61ca0e0c1a4741767dbd6a62f81f8f1638b03f4
-
Filesize
366KB
MD5ac2bb24261b45906ff59c0025a1b0ba4
SHA13504c0efbf8b00f2abc0f18a5d0eedce30fbfa14
SHA25674ba20d2dae8dfde27c8740a94982f78215e485cee96cc53b0624316f18b6143
SHA5121be727f8c4a802677809f04aa7b842e7e4a158ddfedf7c8830dfe755ee2e3c3c7001d1fda3dda2a1464c0b46e61ca0e0c1a4741767dbd6a62f81f8f1638b03f4