Analysis
-
max time kernel
50s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 16:05
Static task
static1
Behavioral task
behavioral1
Sample
76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe
Resource
win10-20230220-en
General
-
Target
76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe
-
Size
700KB
-
MD5
70858320a154b629eecdda5e0bbf99d4
-
SHA1
693db7e8fac2f28a36329500d0eddbb9151a31bc
-
SHA256
76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72
-
SHA512
f8363cb39cea6196edf3907e8c55017c467fa2b3f240a5fa5e102f75a1bec5fe6cc53cf9e560a802fab9b83433ec55cd763fe83eb149f7bc76d4186e6a985dd2
-
SSDEEP
12288:HMrDy90tsQ8nmBuq+IAyqTI1uSRret7BKUMCIQgBRv1GchO2VsH:0y0sjmTXTQuRqt7BKtCvgcchPVsH
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1233.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3088-180-0x0000000004C00000-0x0000000004C46000-memory.dmp family_redline behavioral1/memory/3088-181-0x0000000005190000-0x00000000051D4000-memory.dmp family_redline behavioral1/memory/3088-182-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-183-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-185-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-187-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-189-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-191-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-193-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-195-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-197-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-199-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-201-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-203-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-205-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-207-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-209-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-211-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-213-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3088-215-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2296 un320871.exe 2420 pro1233.exe 3088 qu1956.exe 4264 si605079.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1233.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un320871.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un320871.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2420 pro1233.exe 2420 pro1233.exe 3088 qu1956.exe 3088 qu1956.exe 4264 si605079.exe 4264 si605079.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2420 pro1233.exe Token: SeDebugPrivilege 3088 qu1956.exe Token: SeDebugPrivilege 4264 si605079.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2296 1780 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe 66 PID 1780 wrote to memory of 2296 1780 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe 66 PID 1780 wrote to memory of 2296 1780 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe 66 PID 2296 wrote to memory of 2420 2296 un320871.exe 67 PID 2296 wrote to memory of 2420 2296 un320871.exe 67 PID 2296 wrote to memory of 2420 2296 un320871.exe 67 PID 2296 wrote to memory of 3088 2296 un320871.exe 68 PID 2296 wrote to memory of 3088 2296 un320871.exe 68 PID 2296 wrote to memory of 3088 2296 un320871.exe 68 PID 1780 wrote to memory of 4264 1780 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe 70 PID 1780 wrote to memory of 4264 1780 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe 70 PID 1780 wrote to memory of 4264 1780 76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe"C:\Users\Admin\AppData\Local\Temp\76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320871.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320871.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1233.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1956.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1956.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605079.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605079.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5123b0e749c2b05dcb98aed37e12595be
SHA172e9f5ba5ee22588a3fd1956acfb1cf9139b6c44
SHA2566d745976e279c4f9b5b02ce723f9be3c169683db25e07848c6113be9a2ed7659
SHA5123b35b42013e17562bd89eec700f709275c1c49f3a4c7ddf5764e3618c83ac34ad118fa25a8cf51d5b111d8a5a67633ae80beb9eb2cb629dbd0c8ad29eccac2f8
-
Filesize
175KB
MD5123b0e749c2b05dcb98aed37e12595be
SHA172e9f5ba5ee22588a3fd1956acfb1cf9139b6c44
SHA2566d745976e279c4f9b5b02ce723f9be3c169683db25e07848c6113be9a2ed7659
SHA5123b35b42013e17562bd89eec700f709275c1c49f3a4c7ddf5764e3618c83ac34ad118fa25a8cf51d5b111d8a5a67633ae80beb9eb2cb629dbd0c8ad29eccac2f8
-
Filesize
558KB
MD5521ce4353ae007c0c26cc3593eec6339
SHA183f39191e5fc27318c92cadc2be22edbe2a12bdf
SHA256cce14fe6de5a5aa8481bb83b87427aee7a71586e0694171e4aee123e067d30e4
SHA5123c50673134e8142fdf3f7f4a8f3cafea2a9895f94ca81ae4d8d2c01d09731df5f28af9de30abb12da8558d86e0e9e3c30804946f0b4e553c20153ac228216fa6
-
Filesize
558KB
MD5521ce4353ae007c0c26cc3593eec6339
SHA183f39191e5fc27318c92cadc2be22edbe2a12bdf
SHA256cce14fe6de5a5aa8481bb83b87427aee7a71586e0694171e4aee123e067d30e4
SHA5123c50673134e8142fdf3f7f4a8f3cafea2a9895f94ca81ae4d8d2c01d09731df5f28af9de30abb12da8558d86e0e9e3c30804946f0b4e553c20153ac228216fa6
-
Filesize
308KB
MD539dfc85845faa700ecf01c7e6f81d8f5
SHA1d68f53a539418419ae9a5e459a3129d47a5c42f8
SHA256846ff4de580aa551e497f2a91aa9c9a4e4411f093bad3773a35efc18b55d72b7
SHA512c5587db8f27b73970da6f81b7905ec1a8babe01c87d1ce4f73bdcd1f1e3953e3caf77be697da96dff9af76bbddd617c04d3ed158fb0fd08dea9535ad331416e4
-
Filesize
308KB
MD539dfc85845faa700ecf01c7e6f81d8f5
SHA1d68f53a539418419ae9a5e459a3129d47a5c42f8
SHA256846ff4de580aa551e497f2a91aa9c9a4e4411f093bad3773a35efc18b55d72b7
SHA512c5587db8f27b73970da6f81b7905ec1a8babe01c87d1ce4f73bdcd1f1e3953e3caf77be697da96dff9af76bbddd617c04d3ed158fb0fd08dea9535ad331416e4
-
Filesize
366KB
MD5065e84dcc0b268db8581b44a7748dcac
SHA17c7f30520c588592c476ed0ff98ce364ff589f04
SHA256fc00dc9c58a519f2230e9558be29d0126d8b36d283751e26433e01536d270f03
SHA512b21546559408f1b8d2837fe3534d47fd30818e570c1c16dc0f55c731ec27a58f4b0a7f142c74e5ca884357750f4c507d66f81185f0b0753541e8b89c3634af23
-
Filesize
366KB
MD5065e84dcc0b268db8581b44a7748dcac
SHA17c7f30520c588592c476ed0ff98ce364ff589f04
SHA256fc00dc9c58a519f2230e9558be29d0126d8b36d283751e26433e01536d270f03
SHA512b21546559408f1b8d2837fe3534d47fd30818e570c1c16dc0f55c731ec27a58f4b0a7f142c74e5ca884357750f4c507d66f81185f0b0753541e8b89c3634af23