Analysis
-
max time kernel
60s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:00
Static task
static1
Behavioral task
behavioral1
Sample
2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe
Resource
win10v2004-20230220-en
General
-
Target
2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe
-
Size
699KB
-
MD5
ea03a1f3db43e9eda88d6e6adaf54f38
-
SHA1
67b67f7907c4d3cba05dd79190013ed98420b87c
-
SHA256
2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59
-
SHA512
78bb92770d783d6563aeff9e14c7ca5acb15677553713a3d008ad63a499f9d98bf47451d39692edd45b546addf824e846ffe6402828f828e63f4c189ac1e92df
-
SSDEEP
12288:fMr3y905TLbxOWac2Aqq//x0K5HS/2M61A7VMAmRw9BRviIgD0gP8J4Bss:ky0L9hac2Lk/SKZS5AA7Vkw903ss
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2747.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1352-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-202-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-206-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-211-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-218-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-220-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-224-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-226-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1352-228-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5028 un098033.exe 2012 pro2747.exe 1352 qu4117.exe 3676 si911691.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2747.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un098033.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un098033.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2596 2012 WerFault.exe 86 4716 1352 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2012 pro2747.exe 2012 pro2747.exe 1352 qu4117.exe 1352 qu4117.exe 3676 si911691.exe 3676 si911691.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2012 pro2747.exe Token: SeDebugPrivilege 1352 qu4117.exe Token: SeDebugPrivilege 3676 si911691.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 384 wrote to memory of 5028 384 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe 85 PID 384 wrote to memory of 5028 384 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe 85 PID 384 wrote to memory of 5028 384 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe 85 PID 5028 wrote to memory of 2012 5028 un098033.exe 86 PID 5028 wrote to memory of 2012 5028 un098033.exe 86 PID 5028 wrote to memory of 2012 5028 un098033.exe 86 PID 5028 wrote to memory of 1352 5028 un098033.exe 95 PID 5028 wrote to memory of 1352 5028 un098033.exe 95 PID 5028 wrote to memory of 1352 5028 un098033.exe 95 PID 384 wrote to memory of 3676 384 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe 99 PID 384 wrote to memory of 3676 384 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe 99 PID 384 wrote to memory of 3676 384 2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe"C:\Users\Admin\AppData\Local\Temp\2a9fb0c1bd9e028c16943f7c00014b90526a89acdc00b7bfbd7e4d16ffaebd59.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098033.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2747.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2747.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 10884⤵
- Program crash
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4117.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4117.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 17764⤵
- Program crash
PID:4716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si911691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si911691.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2012 -ip 20121⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1352 -ip 13521⤵PID:4616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5605d99a25baae59c41342a9ad26b19e1
SHA130e59e0331f54fe4072263b2f0a0b517f1d6154a
SHA2561b284567c3cb686d9bcc4d8b05a0d06410fe4e305754cf3b2661919479d81f64
SHA512230ab14ff93215a79a55c205937d7c27fc62c355d2df4f74e1da294cad05f136c2356757cbeda6fada0585d49f7e2a0835ac56501f8e6cfc1a136173860ee758
-
Filesize
175KB
MD5605d99a25baae59c41342a9ad26b19e1
SHA130e59e0331f54fe4072263b2f0a0b517f1d6154a
SHA2561b284567c3cb686d9bcc4d8b05a0d06410fe4e305754cf3b2661919479d81f64
SHA512230ab14ff93215a79a55c205937d7c27fc62c355d2df4f74e1da294cad05f136c2356757cbeda6fada0585d49f7e2a0835ac56501f8e6cfc1a136173860ee758
-
Filesize
557KB
MD545e58fd4d4ee29d3ba9b3bf864439a0b
SHA1f6e1baac9dee9c9433567754f64d2f8aa5839bbf
SHA25678f58ebb417a6b7a2d1675776ef29466515d77c45641199abc07f5786a326dab
SHA512bc5a90dc9907639de03898f98440eef263c3e542aa14a4b121700b6f2ea0dba4f4dd993603ef2a14a764670452776c95e7e22e05d62e1c61fc1e4831dfa042c9
-
Filesize
557KB
MD545e58fd4d4ee29d3ba9b3bf864439a0b
SHA1f6e1baac9dee9c9433567754f64d2f8aa5839bbf
SHA25678f58ebb417a6b7a2d1675776ef29466515d77c45641199abc07f5786a326dab
SHA512bc5a90dc9907639de03898f98440eef263c3e542aa14a4b121700b6f2ea0dba4f4dd993603ef2a14a764670452776c95e7e22e05d62e1c61fc1e4831dfa042c9
-
Filesize
308KB
MD51711164712a47c20397a93b1c594c6f8
SHA18c661f989f7743ba1d1b5caea0793075a7feb50d
SHA256ed858bfce2d461d873bfab119f8fa50e8683a8e43b6e3f7fb12b94f95160c461
SHA512d2291c36149af78610f8f66cba62e046bdbd756d37474615cad6ab527f5757fd85657a634fdb9058de8c2fa350919dfccd0c2cacfeef172e8b26ac05afb3ee1e
-
Filesize
308KB
MD51711164712a47c20397a93b1c594c6f8
SHA18c661f989f7743ba1d1b5caea0793075a7feb50d
SHA256ed858bfce2d461d873bfab119f8fa50e8683a8e43b6e3f7fb12b94f95160c461
SHA512d2291c36149af78610f8f66cba62e046bdbd756d37474615cad6ab527f5757fd85657a634fdb9058de8c2fa350919dfccd0c2cacfeef172e8b26ac05afb3ee1e
-
Filesize
366KB
MD55f61f2192b1f2a6a4cdad57a77799baa
SHA1fd1d3a9a4fb26e6453cea6fb898a30c8f9f988ec
SHA256f66d47ea5fb296989ce7e90de0080a129407d658749da88e36b273fd984ed042
SHA5125dd251ff9869e21d0b8fcb1d6f4dde2e4117dbbb58e41d877de55b069f90eff9accb7d22d03e086cf3d95aea1c727179a0b9338d91e8782e3f1099d2c7c44fce
-
Filesize
366KB
MD55f61f2192b1f2a6a4cdad57a77799baa
SHA1fd1d3a9a4fb26e6453cea6fb898a30c8f9f988ec
SHA256f66d47ea5fb296989ce7e90de0080a129407d658749da88e36b273fd984ed042
SHA5125dd251ff9869e21d0b8fcb1d6f4dde2e4117dbbb58e41d877de55b069f90eff9accb7d22d03e086cf3d95aea1c727179a0b9338d91e8782e3f1099d2c7c44fce