Analysis
-
max time kernel
52s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe
Resource
win10-20230220-en
General
-
Target
78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe
-
Size
700KB
-
MD5
d86fc8a140887d37b23f0cb8fd2ecd04
-
SHA1
5a7936bf707ff268d6cdb18db5be63d44862f4d3
-
SHA256
78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0
-
SHA512
49f29d9d64e08f9a38849392bc957d7f7b0933a67340708a733f38d8185d5f78af5fbb24b4f7984d54f329dfff70ba8f2b8ecf8d843de4ecc5abc02e5d021398
-
SSDEEP
12288:sMrOy90OoeqoN8yxAhqPvyABJRcryAW1U4hdBRvWD2WFXH1C:6yBPIEDneyAW1U4hde5C
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6147.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4628-181-0x00000000025A0000-0x00000000025E6000-memory.dmp family_redline behavioral1/memory/4628-182-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/4628-183-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-186-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-184-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-188-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-190-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-192-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-194-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-196-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-198-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-202-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-206-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-208-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-210-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-212-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-214-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-216-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-218-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-220-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/4628-1104-0x0000000004F00000-0x0000000004F10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1440 un494724.exe 1776 pro6147.exe 4628 qu3199.exe 1528 si359112.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6147.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un494724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un494724.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1776 pro6147.exe 1776 pro6147.exe 4628 qu3199.exe 4628 qu3199.exe 1528 si359112.exe 1528 si359112.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1776 pro6147.exe Token: SeDebugPrivilege 4628 qu3199.exe Token: SeDebugPrivilege 1528 si359112.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1440 1228 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe 66 PID 1228 wrote to memory of 1440 1228 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe 66 PID 1228 wrote to memory of 1440 1228 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe 66 PID 1440 wrote to memory of 1776 1440 un494724.exe 67 PID 1440 wrote to memory of 1776 1440 un494724.exe 67 PID 1440 wrote to memory of 1776 1440 un494724.exe 67 PID 1440 wrote to memory of 4628 1440 un494724.exe 68 PID 1440 wrote to memory of 4628 1440 un494724.exe 68 PID 1440 wrote to memory of 4628 1440 un494724.exe 68 PID 1228 wrote to memory of 1528 1228 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe 70 PID 1228 wrote to memory of 1528 1228 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe 70 PID 1228 wrote to memory of 1528 1228 78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe"C:\Users\Admin\AppData\Local\Temp\78503a7e46168511288307103859c761f9430ea8cf8cbf61a445ea33d26698b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494724.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494724.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6147.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6147.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3199.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3199.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359112.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359112.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cf924f4f445e165d170441f677aa8c69
SHA14e8e68f07fd2e3cf7fc3c9015ee9bc70bc41f596
SHA256d779b71b19d02e00fcc84515a2eb7a25da05dc0421a1ae08cf30b51135cdba13
SHA5126bdcfdfc6235a168a56ba97bfa36a9b5c689cc2f1c670ac575ff8750ff79bde65d2ffad34a47a14c26cee2df86af8738b36450e81d09177f4fabbf46b2459997
-
Filesize
175KB
MD5cf924f4f445e165d170441f677aa8c69
SHA14e8e68f07fd2e3cf7fc3c9015ee9bc70bc41f596
SHA256d779b71b19d02e00fcc84515a2eb7a25da05dc0421a1ae08cf30b51135cdba13
SHA5126bdcfdfc6235a168a56ba97bfa36a9b5c689cc2f1c670ac575ff8750ff79bde65d2ffad34a47a14c26cee2df86af8738b36450e81d09177f4fabbf46b2459997
-
Filesize
558KB
MD5463de27d96ed3c1029de56cff11b0ba0
SHA1e052b1d7a9cd4b2897b4e5f7fc3c890d85c6784e
SHA2568b56c57fd6497beab14fb5231e9a02d0b27772bcb9399e9d2a427296073d69ab
SHA512bc2c7bdcacef705d802f6704c5b7215128bf56deefa3bcaa3d7e916ef901e3d648b5f8ec82bbed3bf27d3ed80b616a10369d40127e1676c0408df3dc09138837
-
Filesize
558KB
MD5463de27d96ed3c1029de56cff11b0ba0
SHA1e052b1d7a9cd4b2897b4e5f7fc3c890d85c6784e
SHA2568b56c57fd6497beab14fb5231e9a02d0b27772bcb9399e9d2a427296073d69ab
SHA512bc2c7bdcacef705d802f6704c5b7215128bf56deefa3bcaa3d7e916ef901e3d648b5f8ec82bbed3bf27d3ed80b616a10369d40127e1676c0408df3dc09138837
-
Filesize
308KB
MD5fc245cbe26e1e9d83e9982c128074334
SHA1a0e5bea76f463d4a24612fba6fd520427d15c654
SHA256b9ec42680b87957f5ba5accf816d02109c529acecf9be5abddd44a102a09dbfd
SHA512a9414b84874a7d2d5d3022cda68f799beeb30bb138f3d9386733eb3564c971dc7b2ac9102a8354e75caa84ab778c36c4c56f5ab523536ac224d87829ac90a582
-
Filesize
308KB
MD5fc245cbe26e1e9d83e9982c128074334
SHA1a0e5bea76f463d4a24612fba6fd520427d15c654
SHA256b9ec42680b87957f5ba5accf816d02109c529acecf9be5abddd44a102a09dbfd
SHA512a9414b84874a7d2d5d3022cda68f799beeb30bb138f3d9386733eb3564c971dc7b2ac9102a8354e75caa84ab778c36c4c56f5ab523536ac224d87829ac90a582
-
Filesize
366KB
MD5a2d23f08dfec9b707ca2c9fe2616a32e
SHA123b149db1cc1c4bfaa335f4cd16c961270e80906
SHA256538913ad690f4f71b4496953754aa33a19320bd5cbed87bcaf39e2ed7b403941
SHA512261d1cb8de25e5f41dddaf9b4c8e5563d828d1cb08b662801f1fb3e914ef0caa3b7446060bb31523f21fcd50c108f114f259abedfd6433b65cc8696f1e0e235f
-
Filesize
366KB
MD5a2d23f08dfec9b707ca2c9fe2616a32e
SHA123b149db1cc1c4bfaa335f4cd16c961270e80906
SHA256538913ad690f4f71b4496953754aa33a19320bd5cbed87bcaf39e2ed7b403941
SHA512261d1cb8de25e5f41dddaf9b4c8e5563d828d1cb08b662801f1fb3e914ef0caa3b7446060bb31523f21fcd50c108f114f259abedfd6433b65cc8696f1e0e235f