Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 11:35
Static task
static1
Behavioral task
behavioral1
Sample
66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe
Resource
win10v2004-20230220-en
General
-
Target
66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe
-
Size
1010KB
-
MD5
d3aba768253b69f0104739b89f1381cd
-
SHA1
74cf818b9492fac55379e5138deaae21db63bf82
-
SHA256
66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b
-
SHA512
723d12512bd58948f2ac36f93dde2558a0dbc0cf5c417e59c35b7373693e743654808974285b015283993bd576189ed1404ed5804ac93ab8c98d928f393862d7
-
SSDEEP
24576:Py6g2mULnDMoRe8/2bIPBbOzHsmh/dkTdJ5v5bNeB:aomUrDrX5CsmsTffNe
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Processes:
cor9128.exebus2985.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor9128.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus2985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus2985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus2985.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor9128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor9128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor9128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor9128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor9128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus2985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus2985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus2985.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-212-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-214-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-216-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-218-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-220-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-222-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-224-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-226-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-228-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-230-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-232-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-234-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-236-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-238-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-240-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-242-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-244-0x0000000007720000-0x000000000775E000-memory.dmp family_redline behavioral1/memory/2348-246-0x0000000007720000-0x000000000775E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
kino8363.exekino0776.exekino8978.exebus2985.execor9128.exedVm95s64.exepid process 1912 kino8363.exe 5028 kino0776.exe 4032 kino8978.exe 1988 bus2985.exe 4340 cor9128.exe 2348 dVm95s64.exe -
Processes:
bus2985.execor9128.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus2985.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor9128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor9128.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kino8978.exe66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exekino8363.exekino0776.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino8978.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino8363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino8363.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino0776.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino0776.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino8978.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4348 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1488 4340 WerFault.exe cor9128.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bus2985.execor9128.exepid process 1988 bus2985.exe 1988 bus2985.exe 4340 cor9128.exe 4340 cor9128.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bus2985.execor9128.exedVm95s64.exedescription pid process Token: SeDebugPrivilege 1988 bus2985.exe Token: SeDebugPrivilege 4340 cor9128.exe Token: SeDebugPrivilege 2348 dVm95s64.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exekino8363.exekino0776.exekino8978.exedescription pid process target process PID 860 wrote to memory of 1912 860 66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe kino8363.exe PID 860 wrote to memory of 1912 860 66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe kino8363.exe PID 860 wrote to memory of 1912 860 66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe kino8363.exe PID 1912 wrote to memory of 5028 1912 kino8363.exe kino0776.exe PID 1912 wrote to memory of 5028 1912 kino8363.exe kino0776.exe PID 1912 wrote to memory of 5028 1912 kino8363.exe kino0776.exe PID 5028 wrote to memory of 4032 5028 kino0776.exe kino8978.exe PID 5028 wrote to memory of 4032 5028 kino0776.exe kino8978.exe PID 5028 wrote to memory of 4032 5028 kino0776.exe kino8978.exe PID 4032 wrote to memory of 1988 4032 kino8978.exe bus2985.exe PID 4032 wrote to memory of 1988 4032 kino8978.exe bus2985.exe PID 4032 wrote to memory of 4340 4032 kino8978.exe cor9128.exe PID 4032 wrote to memory of 4340 4032 kino8978.exe cor9128.exe PID 4032 wrote to memory of 4340 4032 kino8978.exe cor9128.exe PID 5028 wrote to memory of 2348 5028 kino0776.exe dVm95s64.exe PID 5028 wrote to memory of 2348 5028 kino0776.exe dVm95s64.exe PID 5028 wrote to memory of 2348 5028 kino0776.exe dVm95s64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe"C:\Users\Admin\AppData\Local\Temp\66db7d578fb62158eb80ea7c18c800b852561317ad30ca2f7d9998c02e5a563b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8363.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0776.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0776.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8978.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8978.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2985.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus2985.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9128.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9128.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 10806⤵
- Program crash
PID:1488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVm95s64.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVm95s64.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4340 -ip 43401⤵PID:3768
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD508da943cfb9c4ecf32afb95695931540
SHA19f04ba186b9db86641e7d1b80faf84f3fe7ae697
SHA256d8404d0940243d13646d9462edaa5b48e6de9b212a12bdb79fd2607aade4a99d
SHA512da60b3cc04bc547063ed383869753ffab72e6a5294b5048d67594aac10d7d5a6040a5f34cbb12ed374607f9af0a601af2932c386a135bf022ece64e104cf71b4
-
Filesize
828KB
MD508da943cfb9c4ecf32afb95695931540
SHA19f04ba186b9db86641e7d1b80faf84f3fe7ae697
SHA256d8404d0940243d13646d9462edaa5b48e6de9b212a12bdb79fd2607aade4a99d
SHA512da60b3cc04bc547063ed383869753ffab72e6a5294b5048d67594aac10d7d5a6040a5f34cbb12ed374607f9af0a601af2932c386a135bf022ece64e104cf71b4
-
Filesize
686KB
MD544a5908aeee3da58ae25b5bdfb05255f
SHA146a4fcb85102ccf222246a9c3b41519390c9645f
SHA256799382e44c1535d15df57c785433657d188c0b761ec86d1996b0696e7ebb3fbf
SHA512afcb13767cb50885cc23f6f1c51ed5daf14405a5929ff9f641e3a8f2e43b65953b6f34ed1e91cc2d22b1597985805eb33c2d6eb8f6252932033edbe6eb7aea98
-
Filesize
686KB
MD544a5908aeee3da58ae25b5bdfb05255f
SHA146a4fcb85102ccf222246a9c3b41519390c9645f
SHA256799382e44c1535d15df57c785433657d188c0b761ec86d1996b0696e7ebb3fbf
SHA512afcb13767cb50885cc23f6f1c51ed5daf14405a5929ff9f641e3a8f2e43b65953b6f34ed1e91cc2d22b1597985805eb33c2d6eb8f6252932033edbe6eb7aea98
-
Filesize
356KB
MD5dc8bc3ada4465cc97bbf9cb36ada09e6
SHA1ab0613045376a7348912a602ff06dc6517471532
SHA256036467419d51cd148109252c6759644f064d4cb8391577e96ed71cc8faa713ee
SHA512ae13b11e82cec423760d1049bbb240a72519130e44d55acd6ee29e37609a3af4eae3b58f6b9594eb971b60ee1000ce485a12fefba72281ff4c4028b3fc68c4a4
-
Filesize
356KB
MD5dc8bc3ada4465cc97bbf9cb36ada09e6
SHA1ab0613045376a7348912a602ff06dc6517471532
SHA256036467419d51cd148109252c6759644f064d4cb8391577e96ed71cc8faa713ee
SHA512ae13b11e82cec423760d1049bbb240a72519130e44d55acd6ee29e37609a3af4eae3b58f6b9594eb971b60ee1000ce485a12fefba72281ff4c4028b3fc68c4a4
-
Filesize
340KB
MD50279ab1078e9aa7d1c054a9a43fbef83
SHA12becb3b82c6ce1f01474caa3f5ceed1b7817ee62
SHA25638d3b845e7fcfaecdfa2cec34bccf8a8ee9cc9c4cb89c887598017279be0c36b
SHA512c81432f5e52edef70cf74f2443d5e13c1834f1ff470cb1b7e04bfab3d417691a19bb844fa3a6853f98b08ec492b244f9dd9c5f6e3beb309426155f33c7e18266
-
Filesize
340KB
MD50279ab1078e9aa7d1c054a9a43fbef83
SHA12becb3b82c6ce1f01474caa3f5ceed1b7817ee62
SHA25638d3b845e7fcfaecdfa2cec34bccf8a8ee9cc9c4cb89c887598017279be0c36b
SHA512c81432f5e52edef70cf74f2443d5e13c1834f1ff470cb1b7e04bfab3d417691a19bb844fa3a6853f98b08ec492b244f9dd9c5f6e3beb309426155f33c7e18266
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
298KB
MD5d411616e763f548fa0cdd0e4ac864974
SHA151b0fac3cade3405d7f39b80f7652bcfc4b491d2
SHA2563d66bac456e10a1d41cf699892abdb9d3c45a2eedb59cf2e9fcdcec628f47d07
SHA512451a19d445f038a917e667d92b1c363814394dfdd69fd36894f2c2611948a2578232b6e02c7f6579163bd53831d75226be3d74e76c24f3f6c2cf0c72ac56cb72
-
Filesize
298KB
MD5d411616e763f548fa0cdd0e4ac864974
SHA151b0fac3cade3405d7f39b80f7652bcfc4b491d2
SHA2563d66bac456e10a1d41cf699892abdb9d3c45a2eedb59cf2e9fcdcec628f47d07
SHA512451a19d445f038a917e667d92b1c363814394dfdd69fd36894f2c2611948a2578232b6e02c7f6579163bd53831d75226be3d74e76c24f3f6c2cf0c72ac56cb72