Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:08
Static task
static1
Behavioral task
behavioral1
Sample
886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe
Resource
win10v2004-20230221-en
General
-
Target
886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe
-
Size
700KB
-
MD5
311c19c2ce42030d816be57d17cf323b
-
SHA1
ee83b830c1b64ebd6862591ce779973aa75c80dd
-
SHA256
886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be
-
SHA512
966509a7ee7c77c41d648f98cec1cd4c025e824e27e12a4fb2d7a2794e4da9992d3c2a0e2956082a0988c913d6cca0395a67d79b83b92e74ffd3daeac4fa50f1
-
SSDEEP
12288:AMrmy903hjzbEgiuS3wp2YSu26u/1CuZ5BRv7llOr9IBXX37:WyWrEgDY4c/1C45dlOr9IBH37
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6795.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5012-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-219-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline behavioral1/memory/5012-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-226-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-228-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 636 un679985.exe 3464 pro6795.exe 5012 qu3958.exe 3464 si230391.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6795.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un679985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un679985.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5092 3464 WerFault.exe 77 2428 5012 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3464 pro6795.exe 3464 pro6795.exe 5012 qu3958.exe 5012 qu3958.exe 3464 si230391.exe 3464 si230391.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3464 pro6795.exe Token: SeDebugPrivilege 5012 qu3958.exe Token: SeDebugPrivilege 3464 si230391.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4508 wrote to memory of 636 4508 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe 76 PID 4508 wrote to memory of 636 4508 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe 76 PID 4508 wrote to memory of 636 4508 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe 76 PID 636 wrote to memory of 3464 636 un679985.exe 77 PID 636 wrote to memory of 3464 636 un679985.exe 77 PID 636 wrote to memory of 3464 636 un679985.exe 77 PID 636 wrote to memory of 5012 636 un679985.exe 86 PID 636 wrote to memory of 5012 636 un679985.exe 86 PID 636 wrote to memory of 5012 636 un679985.exe 86 PID 4508 wrote to memory of 3464 4508 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe 89 PID 4508 wrote to memory of 3464 4508 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe 89 PID 4508 wrote to memory of 3464 4508 886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe"C:\Users\Admin\AppData\Local\Temp\886d0c2d3cca650cd26bb1752e302d0c05675358c213a0bc1985a8b9a56b52be.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679985.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679985.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6795.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6795.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 10844⤵
- Program crash
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3958.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3958.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 16604⤵
- Program crash
PID:2428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si230391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si230391.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3464 -ip 34641⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5012 -ip 50121⤵PID:688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51b2a8bc1ee8ea3e4bae0498919a9a94b
SHA1dd900da3bf8e97435b1019c9faa5ec3cf51a3a2d
SHA2568717e4306a8cc6aff12503b9227c3cbeb4905d83bffe62387960b0ac2c5de3d1
SHA51285e7f23b6f9d9bb7be774f1a4bc5eb5a08c9a12ba1b2a4081541d502f6da5fbac92ae9210c92a759b0ed493336d2ee81e1a4a5acbd4ec16ce5243f4b9dc39e80
-
Filesize
175KB
MD51b2a8bc1ee8ea3e4bae0498919a9a94b
SHA1dd900da3bf8e97435b1019c9faa5ec3cf51a3a2d
SHA2568717e4306a8cc6aff12503b9227c3cbeb4905d83bffe62387960b0ac2c5de3d1
SHA51285e7f23b6f9d9bb7be774f1a4bc5eb5a08c9a12ba1b2a4081541d502f6da5fbac92ae9210c92a759b0ed493336d2ee81e1a4a5acbd4ec16ce5243f4b9dc39e80
-
Filesize
558KB
MD5539f7d3764c280df6ab5b54e4df48a68
SHA112eaaee5ed27ece7eabff7fe0f751bddcee63b3f
SHA25699544ef66f065e3bf240d410a6d5651aab16de5b3763cb5d49f4629fbd8b4c71
SHA512569923fe68a2a3fd4e391b53e53d71b76cbf1dec8f0de8c218efc5d1b0d3a7b087041c98bc882b1c92866e17124e72f18c5d9aa270ef6ac5b7161aa720ec06a4
-
Filesize
558KB
MD5539f7d3764c280df6ab5b54e4df48a68
SHA112eaaee5ed27ece7eabff7fe0f751bddcee63b3f
SHA25699544ef66f065e3bf240d410a6d5651aab16de5b3763cb5d49f4629fbd8b4c71
SHA512569923fe68a2a3fd4e391b53e53d71b76cbf1dec8f0de8c218efc5d1b0d3a7b087041c98bc882b1c92866e17124e72f18c5d9aa270ef6ac5b7161aa720ec06a4
-
Filesize
308KB
MD569c16a5a485d992026469925c857d6f8
SHA12c7670d390280911a76145caa0afc22dd770104c
SHA256d7c6be1a2c754f795edfe5b01bfaa87676451b82b9a88d89a2af5e68cacb87d0
SHA51257be24608228963ebdffb61fafcaa198a4a9cf0f1bf981db9c4270aa05db5a1ef6bd84edc62390da03221847affa894d6d68023f08611fd1812ba32ce0a1a0bd
-
Filesize
308KB
MD569c16a5a485d992026469925c857d6f8
SHA12c7670d390280911a76145caa0afc22dd770104c
SHA256d7c6be1a2c754f795edfe5b01bfaa87676451b82b9a88d89a2af5e68cacb87d0
SHA51257be24608228963ebdffb61fafcaa198a4a9cf0f1bf981db9c4270aa05db5a1ef6bd84edc62390da03221847affa894d6d68023f08611fd1812ba32ce0a1a0bd
-
Filesize
366KB
MD504bf6116f3d0774b805fef688c6437fa
SHA134322bb783c53944ec0d529f96be3285428e34fe
SHA256e3591828625c73210bf498543d51473f65bc8c87250748e4a1b09cf9fd981eb8
SHA512b26759ed546da8dc41eb53015f5c8d2f5e611311f190e08f78ad8260b6279ddbd34b23d43480f951b89851edbbb0db3975d498b56eaf77dc5e312c5ed1849835
-
Filesize
366KB
MD504bf6116f3d0774b805fef688c6437fa
SHA134322bb783c53944ec0d529f96be3285428e34fe
SHA256e3591828625c73210bf498543d51473f65bc8c87250748e4a1b09cf9fd981eb8
SHA512b26759ed546da8dc41eb53015f5c8d2f5e611311f190e08f78ad8260b6279ddbd34b23d43480f951b89851edbbb0db3975d498b56eaf77dc5e312c5ed1849835