Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:12
Static task
static1
Behavioral task
behavioral1
Sample
5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe
Resource
win10v2004-20230220-en
General
-
Target
5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe
-
Size
700KB
-
MD5
4501f68734fd2c74213b9f9fbfde2f78
-
SHA1
f1a4a18b887ddcb31c6fd0226fe5c3e9980b11ed
-
SHA256
5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd
-
SHA512
c866cc26c5fd935a8166cd78b103892681a5445dd36c221fa0ab27d46bcda197c4dc4fd5b24c2786aa63c52ff884c54ec620643f81293c99431dd795b5645f2c
-
SSDEEP
12288:XMrVy90Ow1l6EJbFvSy0vdGAbqG2Oa3uKvESOVGeqTfBRvg/HJDp1moV3a:Cyp4oExFvSy0UyT2OspYqTfMv53lV3a
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3627.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3627.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3312-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-218-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-220-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-222-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-224-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-226-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-228-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3312-1112-0x0000000004E90000-0x0000000004EA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5040 un507689.exe 4468 pro3627.exe 3312 qu2691.exe 2416 si662373.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3627.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3627.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un507689.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un507689.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 892 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4648 4468 WerFault.exe 83 2744 3312 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4468 pro3627.exe 4468 pro3627.exe 3312 qu2691.exe 3312 qu2691.exe 2416 si662373.exe 2416 si662373.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4468 pro3627.exe Token: SeDebugPrivilege 3312 qu2691.exe Token: SeDebugPrivilege 2416 si662373.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1348 wrote to memory of 5040 1348 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe 82 PID 1348 wrote to memory of 5040 1348 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe 82 PID 1348 wrote to memory of 5040 1348 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe 82 PID 5040 wrote to memory of 4468 5040 un507689.exe 83 PID 5040 wrote to memory of 4468 5040 un507689.exe 83 PID 5040 wrote to memory of 4468 5040 un507689.exe 83 PID 5040 wrote to memory of 3312 5040 un507689.exe 91 PID 5040 wrote to memory of 3312 5040 un507689.exe 91 PID 5040 wrote to memory of 3312 5040 un507689.exe 91 PID 1348 wrote to memory of 2416 1348 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe 95 PID 1348 wrote to memory of 2416 1348 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe 95 PID 1348 wrote to memory of 2416 1348 5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe"C:\Users\Admin\AppData\Local\Temp\5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un507689.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un507689.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3627.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 10844⤵
- Program crash
PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2691.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 17524⤵
- Program crash
PID:2744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662373.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662373.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4468 -ip 44681⤵PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3312 -ip 33121⤵PID:2040
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD573d5a0e0074778d5524d1de1f96595c6
SHA11d881849f3480550232ab030e411d1ca00d7ee8e
SHA25671887326c19140fb7e5be41ade6cc28569d44e058998d01492291d02ac2ca652
SHA512051bcbfc28d098bdd0a5feb42604b04a675adc59b136588be7a46f9ba913754176dd840c9166f8be03a70fb31c1c1a0b31dc68b34d377370b742bf0eb62cf390
-
Filesize
175KB
MD573d5a0e0074778d5524d1de1f96595c6
SHA11d881849f3480550232ab030e411d1ca00d7ee8e
SHA25671887326c19140fb7e5be41ade6cc28569d44e058998d01492291d02ac2ca652
SHA512051bcbfc28d098bdd0a5feb42604b04a675adc59b136588be7a46f9ba913754176dd840c9166f8be03a70fb31c1c1a0b31dc68b34d377370b742bf0eb62cf390
-
Filesize
558KB
MD54efcd368dc3f59dc443ad5a67f37ac9d
SHA11341987093c817fb53b0a9750b7da06e8f4b28ba
SHA256e0efe4f32eeafdf3b37ff3f20fbd9eb8f2b9a75d46159433a51b1114941900d7
SHA5124ed50ee3e377f8864c5e32ca0f4ebc088ba24d6d2039059102eb6316316b1973491aaae9a2ea18ef0d12ac2bfb5b8851c4981c2663ac76cfb2fa0ca964305d63
-
Filesize
558KB
MD54efcd368dc3f59dc443ad5a67f37ac9d
SHA11341987093c817fb53b0a9750b7da06e8f4b28ba
SHA256e0efe4f32eeafdf3b37ff3f20fbd9eb8f2b9a75d46159433a51b1114941900d7
SHA5124ed50ee3e377f8864c5e32ca0f4ebc088ba24d6d2039059102eb6316316b1973491aaae9a2ea18ef0d12ac2bfb5b8851c4981c2663ac76cfb2fa0ca964305d63
-
Filesize
308KB
MD5a86b55712b830fae099adb2406d8e12a
SHA111dacc3f843d662d58a3c3b84855e190ae41b3fc
SHA2563bad664bff8167ed2caf91bf40adf580489e77321b2352b62f82de02542c65ee
SHA5127dd8ae9a846e1cea5c5f2da8516e366cca8f694cc0f1f8d6992e0a6cbdc43accadbc86925d92617e8b78e46fb2d9f777010bf2f37a3bf8dd1b5085856bfb6d1b
-
Filesize
308KB
MD5a86b55712b830fae099adb2406d8e12a
SHA111dacc3f843d662d58a3c3b84855e190ae41b3fc
SHA2563bad664bff8167ed2caf91bf40adf580489e77321b2352b62f82de02542c65ee
SHA5127dd8ae9a846e1cea5c5f2da8516e366cca8f694cc0f1f8d6992e0a6cbdc43accadbc86925d92617e8b78e46fb2d9f777010bf2f37a3bf8dd1b5085856bfb6d1b
-
Filesize
366KB
MD5d0ac3fb0871d107cd6ba0cb71037521a
SHA1162a4db35c3a65311052a5b465c8b869d9552c19
SHA2562f8b422b95ee3ab4613c749bc551846d95d8c6cfa3883da0082fdd63174aa15d
SHA512b4bce6afdc50629e4e41aa06d5ed930cad0036e46243e62ccf923057d4fcdf56e6314c3e46acf28ef115517fe7c731ddcef06f7e285f9f017d9e9efc5ceac687
-
Filesize
366KB
MD5d0ac3fb0871d107cd6ba0cb71037521a
SHA1162a4db35c3a65311052a5b465c8b869d9552c19
SHA2562f8b422b95ee3ab4613c749bc551846d95d8c6cfa3883da0082fdd63174aa15d
SHA512b4bce6afdc50629e4e41aa06d5ed930cad0036e46243e62ccf923057d4fcdf56e6314c3e46acf28ef115517fe7c731ddcef06f7e285f9f017d9e9efc5ceac687