Analysis
-
max time kernel
80s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:07
Static task
static1
Behavioral task
behavioral1
Sample
90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe
Resource
win10v2004-20230221-en
General
-
Target
90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe
-
Size
701KB
-
MD5
83f9046c39ae2a70e34e8c1654c496b6
-
SHA1
e44ae86ef34724a8f3bc12c1aa3e59b9861796ad
-
SHA256
90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443
-
SHA512
97c63551f19e3ed42b7c8a5ac084470a85e814cb0fff32772552387b5daf64ae18fbf6a11d82b838558e3b284dd26556d4cbe929dea84a3f00312573073b0370
-
SSDEEP
12288:iMrTy90edMaALDAWEvXfCn6zzyDCFCuaDzSm5701vgcBRv7xXEOYMi4:Jyt34MXfCnYzymF9aDz9YNgcPF79i4
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7424.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7424.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4436-192-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-194-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-197-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-200-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-202-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-204-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-206-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-208-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-210-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-212-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-214-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-216-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-218-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-220-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-222-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-224-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-226-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline behavioral1/memory/4436-228-0x00000000052A0000-0x00000000052DE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4648 un370749.exe 1964 pro7424.exe 4436 qu5635.exe 4268 si747748.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7424.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7424.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un370749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un370749.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 848 1964 WerFault.exe 84 3816 4436 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1964 pro7424.exe 1964 pro7424.exe 4436 qu5635.exe 4436 qu5635.exe 4268 si747748.exe 4268 si747748.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1964 pro7424.exe Token: SeDebugPrivilege 4436 qu5635.exe Token: SeDebugPrivilege 4268 si747748.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4648 4216 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe 83 PID 4216 wrote to memory of 4648 4216 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe 83 PID 4216 wrote to memory of 4648 4216 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe 83 PID 4648 wrote to memory of 1964 4648 un370749.exe 84 PID 4648 wrote to memory of 1964 4648 un370749.exe 84 PID 4648 wrote to memory of 1964 4648 un370749.exe 84 PID 4648 wrote to memory of 4436 4648 un370749.exe 90 PID 4648 wrote to memory of 4436 4648 un370749.exe 90 PID 4648 wrote to memory of 4436 4648 un370749.exe 90 PID 4216 wrote to memory of 4268 4216 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe 93 PID 4216 wrote to memory of 4268 4216 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe 93 PID 4216 wrote to memory of 4268 4216 90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe"C:\Users\Admin\AppData\Local\Temp\90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370749.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370749.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7424.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 10844⤵
- Program crash
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5635.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 19924⤵
- Program crash
PID:3816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747748.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747748.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1964 -ip 19641⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4436 -ip 44361⤵PID:1612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57835ed9696209985d00249d3eafe3574
SHA1d27a4c03a1db60e6fbbabe86abf7319e9153f951
SHA256d4edbe1559ff05ecf7bfa54c79eff91fad00210c746329ab5c323ad671e01d3b
SHA512ba6f144ea5f4761a7c7d04fabc1d88fcc1fc9e0166495bee2aa8455e3171bbd6449b6276b1106003b3a0895db544de4526cd87ae016ba2ec24c7dfb0892ed2db
-
Filesize
175KB
MD57835ed9696209985d00249d3eafe3574
SHA1d27a4c03a1db60e6fbbabe86abf7319e9153f951
SHA256d4edbe1559ff05ecf7bfa54c79eff91fad00210c746329ab5c323ad671e01d3b
SHA512ba6f144ea5f4761a7c7d04fabc1d88fcc1fc9e0166495bee2aa8455e3171bbd6449b6276b1106003b3a0895db544de4526cd87ae016ba2ec24c7dfb0892ed2db
-
Filesize
558KB
MD5ee6d6b8c8b9251544b43a32ee096cb69
SHA10b93a6a4ace67d96c6c25c1bee7d93d53befda99
SHA25637cd96d43133635f2b412e89bd6d4cfbe30315ab49fef8d85c00758228cc713d
SHA51240d1f1656e85b85b8fa5c02413d0c3664cee47e136d470d684702643cbd7408f8a8d732ce06824fd03f7361f5fd5738e544aea0d120ca49cab6db865ada09225
-
Filesize
558KB
MD5ee6d6b8c8b9251544b43a32ee096cb69
SHA10b93a6a4ace67d96c6c25c1bee7d93d53befda99
SHA25637cd96d43133635f2b412e89bd6d4cfbe30315ab49fef8d85c00758228cc713d
SHA51240d1f1656e85b85b8fa5c02413d0c3664cee47e136d470d684702643cbd7408f8a8d732ce06824fd03f7361f5fd5738e544aea0d120ca49cab6db865ada09225
-
Filesize
308KB
MD5524f142187297c877061222d9329255c
SHA1764d3a29bca15d4e401f6c7b7a8e7eb667d0fdce
SHA256d175b99872a038128e20fd36c0c1ad09d7200a39b849de63be3bc54265289c64
SHA512b91189da76f88734b2fa675515e9db244d0a3a4fbe8a49b15d3a7ef3b09d5e67c565c06601cdc580a3f0ea2fe908daafb92156a3d198e369a2793e08867bdbad
-
Filesize
308KB
MD5524f142187297c877061222d9329255c
SHA1764d3a29bca15d4e401f6c7b7a8e7eb667d0fdce
SHA256d175b99872a038128e20fd36c0c1ad09d7200a39b849de63be3bc54265289c64
SHA512b91189da76f88734b2fa675515e9db244d0a3a4fbe8a49b15d3a7ef3b09d5e67c565c06601cdc580a3f0ea2fe908daafb92156a3d198e369a2793e08867bdbad
-
Filesize
366KB
MD56c215eb38c0c5acfda7405620bb1882e
SHA1b1b20c836d78fd6747928b8d61c0d65bc50ce27f
SHA256e45005fa550b6ac7d3e517b689e26ca80b477fb0442742cfd838cf464b52819c
SHA5125fcc0c6ee68a6048e0122b23070cc150297b3f1478006522210ff02c424b8a93e05f514baa6143581835abe3371dbe90dee3a6f8114e54e94454be230c6de0fb
-
Filesize
366KB
MD56c215eb38c0c5acfda7405620bb1882e
SHA1b1b20c836d78fd6747928b8d61c0d65bc50ce27f
SHA256e45005fa550b6ac7d3e517b689e26ca80b477fb0442742cfd838cf464b52819c
SHA5125fcc0c6ee68a6048e0122b23070cc150297b3f1478006522210ff02c424b8a93e05f514baa6143581835abe3371dbe90dee3a6f8114e54e94454be230c6de0fb