Analysis
-
max time kernel
16s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 23:46
Static task
static1
Behavioral task
behavioral1
Sample
6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe
Resource
win10v2004-20230220-en
General
-
Target
6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe
-
Size
699KB
-
MD5
ce663ef1c86e6834115127889800eeb4
-
SHA1
c32a3b182cd487ced7736708136f924b12dbadfa
-
SHA256
6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a
-
SHA512
8a80fb741dbf46ea32c6e80ad6603051b875159d6366b75cdb2669ce6440aa2b18e3ee5f2d436a72240abf548cc869fc70d718f91a7a68ed13696b4a93e3df78
-
SSDEEP
12288:oMr8y90AogMQxvwDV9D5gcAQVcPpqNBqufTQ6xs4VFywPMiW:kydFME4DcQVcPpqqE7vp6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Processes:
pro9607.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9607.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4544-193-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4544-194-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4544-196-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4544-198-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline behavioral1/memory/4544-200-0x00000000052A0000-0x00000000052DF000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
un963741.exepro9607.exequ4358.exepid process 1364 un963741.exe 4060 pro9607.exe 4544 qu4358.exe -
Processes:
pro9607.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9607.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9607.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exeun963741.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un963741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un963741.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5036 4060 WerFault.exe pro9607.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9607.exepid process 4060 pro9607.exe 4060 pro9607.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9607.exequ4358.exedescription pid process Token: SeDebugPrivilege 4060 pro9607.exe Token: SeDebugPrivilege 4544 qu4358.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exeun963741.exedescription pid process target process PID 4184 wrote to memory of 1364 4184 6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe un963741.exe PID 4184 wrote to memory of 1364 4184 6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe un963741.exe PID 4184 wrote to memory of 1364 4184 6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe un963741.exe PID 1364 wrote to memory of 4060 1364 un963741.exe pro9607.exe PID 1364 wrote to memory of 4060 1364 un963741.exe pro9607.exe PID 1364 wrote to memory of 4060 1364 un963741.exe pro9607.exe PID 1364 wrote to memory of 4544 1364 un963741.exe qu4358.exe PID 1364 wrote to memory of 4544 1364 un963741.exe qu4358.exe PID 1364 wrote to memory of 4544 1364 un963741.exe qu4358.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe"C:\Users\Admin\AppData\Local\Temp\6c698d54f0b40b3a4c50f6c44b6ea3d0a03b2812b186970998daa9d407dc1c2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963741.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963741.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9607.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 10844⤵
- Program crash
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4358.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4358.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4060 -ip 40601⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5c1a9edeb234e60e82956a5c9cedd128b
SHA1c947ea6c2f3d8668eda4eb89b262c7be624d765d
SHA25612e1c63007b220bcde434e9bc70b7e7fefc852a545a56e1089cac4b3a784ec40
SHA512ea0f8919ba9e5fd789837c1fecdc9f02e98a1a78bca77fa04b14b02a02b7d0afaa5aa947ccdb296a8addfafba96df7b715e02fdbff9bb8833b5546a93d8c85d4
-
Filesize
558KB
MD5c1a9edeb234e60e82956a5c9cedd128b
SHA1c947ea6c2f3d8668eda4eb89b262c7be624d765d
SHA25612e1c63007b220bcde434e9bc70b7e7fefc852a545a56e1089cac4b3a784ec40
SHA512ea0f8919ba9e5fd789837c1fecdc9f02e98a1a78bca77fa04b14b02a02b7d0afaa5aa947ccdb296a8addfafba96df7b715e02fdbff9bb8833b5546a93d8c85d4
-
Filesize
307KB
MD5fc2230c97cb7d7698d30305f16e1bd6e
SHA1bd25ba513540dd871ff3b38546ef3d1587fd1721
SHA2565097a9d09bfd28a70849cfb7e479121c1f285b22fbacb0fd6b2d7c0abd3529dd
SHA512d92eabf232c7b14e258e559305632cdde601be7e0710ca42ab0e485e1d2b27c25d6448c7b99f109b2a452edcf9dcd0b64a77fcf0e3331c6ee371b31e7b580cbd
-
Filesize
307KB
MD5fc2230c97cb7d7698d30305f16e1bd6e
SHA1bd25ba513540dd871ff3b38546ef3d1587fd1721
SHA2565097a9d09bfd28a70849cfb7e479121c1f285b22fbacb0fd6b2d7c0abd3529dd
SHA512d92eabf232c7b14e258e559305632cdde601be7e0710ca42ab0e485e1d2b27c25d6448c7b99f109b2a452edcf9dcd0b64a77fcf0e3331c6ee371b31e7b580cbd
-
Filesize
365KB
MD5b996b1a321593eec9eb2d6f8c43b70b2
SHA153bf8d77565f2714253d91d07c9a452a5c8b6465
SHA25693db462dbcd11e091f137f80c1facd4819f69a478eb4f7d0294299e4cb552e91
SHA512257f06dd82857577187c4541c1a89c06ef8641687331eb46e297625e29751a2b23256862839a0c2396b5001a82a58ed27a736706e771b6775b5e3a47b2a61f76
-
Filesize
365KB
MD5b996b1a321593eec9eb2d6f8c43b70b2
SHA153bf8d77565f2714253d91d07c9a452a5c8b6465
SHA25693db462dbcd11e091f137f80c1facd4819f69a478eb4f7d0294299e4cb552e91
SHA512257f06dd82857577187c4541c1a89c06ef8641687331eb46e297625e29751a2b23256862839a0c2396b5001a82a58ed27a736706e771b6775b5e3a47b2a61f76