Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:04
Static task
static1
Behavioral task
behavioral1
Sample
498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe
Resource
win10v2004-20230221-en
General
-
Target
498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe
-
Size
700KB
-
MD5
477a99fe36ab85edba8bb059c1f48019
-
SHA1
6f8fd3d6331637b359d74eb377be7003898414ed
-
SHA256
498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add
-
SHA512
5890f3e4d578be364b5b9922cf688963fa5c066494861ab0fe77a3747d4029ce3993a1bce3855339ecf70cb88f21c45891b0987962b85b7ba8185ee07788fdc0
-
SSDEEP
12288:wMrty90zchAajkSdlDIjUBwZredJiXNKZ4dWUZ9uZLSfl3BRv35U6pgwj:NyBhdP8Qy4dcXNKZiZ9l3j5Uyj
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0406.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0406.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0406.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0406.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0406.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0406.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1468-190-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-191-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-193-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-195-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-197-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-199-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-201-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-203-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-205-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-207-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-213-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-210-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-217-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-214-0x0000000004F40000-0x0000000004F50000-memory.dmp family_redline behavioral1/memory/1468-219-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-221-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-223-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-225-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1468-227-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2008 un502733.exe 2072 pro0406.exe 1468 qu9135.exe 1400 si690375.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0406.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0406.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un502733.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un502733.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2968 2072 WerFault.exe 83 4496 1468 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2072 pro0406.exe 2072 pro0406.exe 1468 qu9135.exe 1468 qu9135.exe 1400 si690375.exe 1400 si690375.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2072 pro0406.exe Token: SeDebugPrivilege 1468 qu9135.exe Token: SeDebugPrivilege 1400 si690375.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4488 wrote to memory of 2008 4488 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe 82 PID 4488 wrote to memory of 2008 4488 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe 82 PID 4488 wrote to memory of 2008 4488 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe 82 PID 2008 wrote to memory of 2072 2008 un502733.exe 83 PID 2008 wrote to memory of 2072 2008 un502733.exe 83 PID 2008 wrote to memory of 2072 2008 un502733.exe 83 PID 2008 wrote to memory of 1468 2008 un502733.exe 90 PID 2008 wrote to memory of 1468 2008 un502733.exe 90 PID 2008 wrote to memory of 1468 2008 un502733.exe 90 PID 4488 wrote to memory of 1400 4488 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe 96 PID 4488 wrote to memory of 1400 4488 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe 96 PID 4488 wrote to memory of 1400 4488 498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe"C:\Users\Admin\AppData\Local\Temp\498d6c8af0b3e8ccd89056a8870a44aac4fb404c14c91855a64b2cb344812add.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502733.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502733.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0406.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0406.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 10844⤵
- Program crash
PID:2968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9135.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9135.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 15164⤵
- Program crash
PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690375.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690375.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2072 -ip 20721⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1468 -ip 14681⤵PID:4524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD540ce086c8facda9a392b5e41ca670ac8
SHA12597724e6edc3132741439c511b1b518daf12cd0
SHA256fccec93a40b96ecb098bc3c2e44eeaf6915997ea120af80da495689b7d1bb2ae
SHA512b70a0b7f92c4d35284d6565747271d9c06b942fbeba156370e953a49208dfcad43996d1104324d2cc41ee3caaa519fdffeda546e68adeab91d4b60596badc410
-
Filesize
175KB
MD540ce086c8facda9a392b5e41ca670ac8
SHA12597724e6edc3132741439c511b1b518daf12cd0
SHA256fccec93a40b96ecb098bc3c2e44eeaf6915997ea120af80da495689b7d1bb2ae
SHA512b70a0b7f92c4d35284d6565747271d9c06b942fbeba156370e953a49208dfcad43996d1104324d2cc41ee3caaa519fdffeda546e68adeab91d4b60596badc410
-
Filesize
558KB
MD5f1c7c8e69e02470b21fc062df3e06c1b
SHA1e5704215087e19fe55396006b4703008f066b9cc
SHA25684b4d5e506e7a5fc20f704ee6187a3cd3d1c3e76ffdd88013b793586aeb27514
SHA5123ce958ddd4aae41639ec1f53b39d26ad76a4c1456e96c647b6a134ab66119e3850e15a658f264392a4c61a522aa36ada8a68f72c72f5ecc17140404bde7bce30
-
Filesize
558KB
MD5f1c7c8e69e02470b21fc062df3e06c1b
SHA1e5704215087e19fe55396006b4703008f066b9cc
SHA25684b4d5e506e7a5fc20f704ee6187a3cd3d1c3e76ffdd88013b793586aeb27514
SHA5123ce958ddd4aae41639ec1f53b39d26ad76a4c1456e96c647b6a134ab66119e3850e15a658f264392a4c61a522aa36ada8a68f72c72f5ecc17140404bde7bce30
-
Filesize
308KB
MD5e5c2c88bae8ffc5d3d7ad8a1b9231ba5
SHA1edbd530f2ef533f3b66c3bef3d5d1b90b2aa517b
SHA256b51571ce92f2777b917a036e8ed70437b8f9dd2a2014930aac3a41e94c07804c
SHA5128871da79f552b9a1915ba4320a62cc0e318e68060a601b50bf5be6eb3e668631b042f22bae56dba0fdae51d2510a04b09c1e954766c391af0a80a48c4a6c5b7a
-
Filesize
308KB
MD5e5c2c88bae8ffc5d3d7ad8a1b9231ba5
SHA1edbd530f2ef533f3b66c3bef3d5d1b90b2aa517b
SHA256b51571ce92f2777b917a036e8ed70437b8f9dd2a2014930aac3a41e94c07804c
SHA5128871da79f552b9a1915ba4320a62cc0e318e68060a601b50bf5be6eb3e668631b042f22bae56dba0fdae51d2510a04b09c1e954766c391af0a80a48c4a6c5b7a
-
Filesize
366KB
MD5a94937c919e281c07cca9bbe9ecf115b
SHA19c7d249b2b98e87c3226d1b160e6c982399a6cb6
SHA256c2aeb46e30442c3ccd158a5335270d69ee616e011043da090633a470e753026e
SHA5120141e7c95544faa37fabe1e3efea3f2e249937b7260447d681b5cd8bd0825e48ce3ae9dbc0ce56d13b5112cdbe72be6579405db2cdb26a13f7244f113d912150
-
Filesize
366KB
MD5a94937c919e281c07cca9bbe9ecf115b
SHA19c7d249b2b98e87c3226d1b160e6c982399a6cb6
SHA256c2aeb46e30442c3ccd158a5335270d69ee616e011043da090633a470e753026e
SHA5120141e7c95544faa37fabe1e3efea3f2e249937b7260447d681b5cd8bd0825e48ce3ae9dbc0ce56d13b5112cdbe72be6579405db2cdb26a13f7244f113d912150