Analysis
-
max time kernel
62s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:10
Static task
static1
Behavioral task
behavioral1
Sample
50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe
Resource
win10v2004-20230220-en
General
-
Target
50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe
-
Size
700KB
-
MD5
5f3968b74f43367f85137f48fd256cbe
-
SHA1
f6314642c3f0315d7a049bbf6ab28cbf43311cbf
-
SHA256
50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573
-
SHA512
71709c3eb06700ad6f4bd95c8e2ee509bf1aabc05b89ac7bdd596998ed7ef84b8f958b018b50bf79e8a6e7efb1ee821991833d2d4903e86c2499638751b6f296
-
SSDEEP
12288:zMrly90ZTpmix/jwRnAVqNUDrej4NWdSHCllVBRvHIgD0gHjZt8Y+q:CyeTpj/cZs7XejFUHclVTbYq
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5992.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1768-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-210-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-214-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-218-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-220-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-222-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-224-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1768-288-0x0000000004DE0000-0x0000000004DF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2480 un504615.exe 4464 pro5992.exe 1768 qu3868.exe 2356 si651348.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5992.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un504615.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un504615.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 432 4464 WerFault.exe 85 560 1768 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4464 pro5992.exe 4464 pro5992.exe 1768 qu3868.exe 1768 qu3868.exe 2356 si651348.exe 2356 si651348.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4464 pro5992.exe Token: SeDebugPrivilege 1768 qu3868.exe Token: SeDebugPrivilege 2356 si651348.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4144 wrote to memory of 2480 4144 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe 84 PID 4144 wrote to memory of 2480 4144 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe 84 PID 4144 wrote to memory of 2480 4144 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe 84 PID 2480 wrote to memory of 4464 2480 un504615.exe 85 PID 2480 wrote to memory of 4464 2480 un504615.exe 85 PID 2480 wrote to memory of 4464 2480 un504615.exe 85 PID 2480 wrote to memory of 1768 2480 un504615.exe 94 PID 2480 wrote to memory of 1768 2480 un504615.exe 94 PID 2480 wrote to memory of 1768 2480 un504615.exe 94 PID 4144 wrote to memory of 2356 4144 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe 99 PID 4144 wrote to memory of 2356 4144 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe 99 PID 4144 wrote to memory of 2356 4144 50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe"C:\Users\Admin\AppData\Local\Temp\50744c2293052e8bcedf1b309a2bf66ac1d3dbc8f0cc8bfe98e277ff6f122573.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un504615.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un504615.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5992.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5992.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 10884⤵
- Program crash
PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3868.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 18364⤵
- Program crash
PID:560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651348.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4464 -ip 44641⤵PID:484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1768 -ip 17681⤵PID:3400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5500e82e7d85e2c7f06ada6474093d74d
SHA1bc78dd68285cd1aebac9c4ce9af99bf8bebd2ba4
SHA25632c0d94394301393824a989839759344e6b538b269c646b1e415866f18e52478
SHA512b00b016a19c2d61c2fb504c7d5c6ce202d1532c413a944e6a3bd0b1675dd5910813cf6ff50fab3d62960c1408426efe5c49fd8a1cf418f5c3cd63e41c25a5b00
-
Filesize
175KB
MD5500e82e7d85e2c7f06ada6474093d74d
SHA1bc78dd68285cd1aebac9c4ce9af99bf8bebd2ba4
SHA25632c0d94394301393824a989839759344e6b538b269c646b1e415866f18e52478
SHA512b00b016a19c2d61c2fb504c7d5c6ce202d1532c413a944e6a3bd0b1675dd5910813cf6ff50fab3d62960c1408426efe5c49fd8a1cf418f5c3cd63e41c25a5b00
-
Filesize
558KB
MD5e3983fbe1b738c4bff4b70af6780e0ab
SHA1645be0904c0c22c742256a1fd3b18498c47d9ef9
SHA256867c587079d443d0399e2847546bda35bfbbdd80fd399e2f52045e649354e759
SHA5123c2ccc8237689e9e9f47c31a39dbf939ea9016dc6fc8bc2b94b0110007910f84dce39efb83766f102e29e468c888d208003b98780c8bba03f3c1f3f2260cbae8
-
Filesize
558KB
MD5e3983fbe1b738c4bff4b70af6780e0ab
SHA1645be0904c0c22c742256a1fd3b18498c47d9ef9
SHA256867c587079d443d0399e2847546bda35bfbbdd80fd399e2f52045e649354e759
SHA5123c2ccc8237689e9e9f47c31a39dbf939ea9016dc6fc8bc2b94b0110007910f84dce39efb83766f102e29e468c888d208003b98780c8bba03f3c1f3f2260cbae8
-
Filesize
308KB
MD5b60ca4b26a3e61261ae702b137cf695d
SHA17c636f58e0121ae9ebbc8ca3c1ac1c82e43d85b0
SHA256028443314e5aac08b7dfebd55f1c0a2fc8daeee6122b6aecc6af8eca8f8b2760
SHA512eef48e5b0907229fb8c210dbc6640718810727bd9d82f01f23e4a2d7d0d34e66cee980156846caa09d1fdbc81aa00ea2408361a076250f6725ae1fe9aeafe61f
-
Filesize
308KB
MD5b60ca4b26a3e61261ae702b137cf695d
SHA17c636f58e0121ae9ebbc8ca3c1ac1c82e43d85b0
SHA256028443314e5aac08b7dfebd55f1c0a2fc8daeee6122b6aecc6af8eca8f8b2760
SHA512eef48e5b0907229fb8c210dbc6640718810727bd9d82f01f23e4a2d7d0d34e66cee980156846caa09d1fdbc81aa00ea2408361a076250f6725ae1fe9aeafe61f
-
Filesize
366KB
MD5058d4fc1e00c43e723982996caef3828
SHA16c3c5f6a02581f9980e8e9d3485503885463e063
SHA256f61a2b9f2e3641fc8e4a08a5779405275acfa7e67c3c486fbbcadb326c7895c6
SHA512fe4cf2d3df813a361ac8d3b7c0451f2473b318c31bae0e4b694eea04818befd83b41fe63ab71c6054790da5d675433ff3d5a01d74aa37cc6c2a783b22fc78a1c
-
Filesize
366KB
MD5058d4fc1e00c43e723982996caef3828
SHA16c3c5f6a02581f9980e8e9d3485503885463e063
SHA256f61a2b9f2e3641fc8e4a08a5779405275acfa7e67c3c486fbbcadb326c7895c6
SHA512fe4cf2d3df813a361ac8d3b7c0451f2473b318c31bae0e4b694eea04818befd83b41fe63ab71c6054790da5d675433ff3d5a01d74aa37cc6c2a783b22fc78a1c