Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:31
Static task
static1
Behavioral task
behavioral1
Sample
555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe
Resource
win10v2004-20230220-en
General
-
Target
555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe
-
Size
700KB
-
MD5
96517a53b37d9729480eee29fd3c249c
-
SHA1
41841b3041ecdb69cc670c95ce23c2fb74cc6d3f
-
SHA256
555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17
-
SHA512
43fc99ffdb5991ead7ad3fabaff09a799b6a34029dfc814720c37bf1f346ab230384f967995b21fb871128251470b39a1a23f7dfc6e311869fdfc5a8a9f9ea62
-
SSDEEP
12288:LMrly90tx27GbrwPP64WtA8q6qlqufFdJvsxcIuBRvn0QYKFFvC:+y77swK4uJ5OnJUDuTF8
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3431.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1788-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1788-332-0x0000000004D00000-0x0000000004D10000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1540 un412676.exe 3956 pro3431.exe 1788 qu3497.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3431.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un412676.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un412676.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1012 3956 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3956 pro3431.exe 3956 pro3431.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3956 pro3431.exe Token: SeDebugPrivilege 1788 qu3497.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1540 2828 555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe 85 PID 2828 wrote to memory of 1540 2828 555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe 85 PID 2828 wrote to memory of 1540 2828 555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe 85 PID 1540 wrote to memory of 3956 1540 un412676.exe 86 PID 1540 wrote to memory of 3956 1540 un412676.exe 86 PID 1540 wrote to memory of 3956 1540 un412676.exe 86 PID 1540 wrote to memory of 1788 1540 un412676.exe 92 PID 1540 wrote to memory of 1788 1540 un412676.exe 92 PID 1540 wrote to memory of 1788 1540 un412676.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe"C:\Users\Admin\AppData\Local\Temp\555bf10092df0368b987fad59b226104ad225a5bd5ae95d60ee7bb92662c2a17.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un412676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un412676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3431.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 10844⤵
- Program crash
PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3497.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3497.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3956 -ip 39561⤵PID:4264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5cd91b0d087b8b92adbc38d738b5e6043
SHA16b3ffa543c9766a609ed229f3127db5fb558b83d
SHA2568ed2dd51a5eb0224a77ad33dcb05d595c6870e11b8cbecd07ab5e7a1e83d392e
SHA51217ea7ebcc929e3aa2287b77245bdfa1caf506e7451a216a24b088236074f78090d0bbb509c9d8323ea010767d44c47afe63c96de4dd72cc014f3dde179382ec9
-
Filesize
558KB
MD5cd91b0d087b8b92adbc38d738b5e6043
SHA16b3ffa543c9766a609ed229f3127db5fb558b83d
SHA2568ed2dd51a5eb0224a77ad33dcb05d595c6870e11b8cbecd07ab5e7a1e83d392e
SHA51217ea7ebcc929e3aa2287b77245bdfa1caf506e7451a216a24b088236074f78090d0bbb509c9d8323ea010767d44c47afe63c96de4dd72cc014f3dde179382ec9
-
Filesize
308KB
MD536a962ebf7c2e2ee0db5da6a6933fc24
SHA16d2f46a83e1c81edc3bc3717feb9a612e12bef9d
SHA256b8605b18b388f66cc0930ca4669685d370369b896e1a4e0c387b460e6351360b
SHA5124cc2aa72ad03bb301971ea9637227fd0d86fb2f8665b4210212ea91755c1db1aac7e1f0ad6a353b7dc522506e190524eff17dc691bfef99fd75325ff3b0a2cd1
-
Filesize
308KB
MD536a962ebf7c2e2ee0db5da6a6933fc24
SHA16d2f46a83e1c81edc3bc3717feb9a612e12bef9d
SHA256b8605b18b388f66cc0930ca4669685d370369b896e1a4e0c387b460e6351360b
SHA5124cc2aa72ad03bb301971ea9637227fd0d86fb2f8665b4210212ea91755c1db1aac7e1f0ad6a353b7dc522506e190524eff17dc691bfef99fd75325ff3b0a2cd1
-
Filesize
366KB
MD5791c8d2babea4f083ec61b1ec4403147
SHA13c7e595658d3fef056df3528968865ac89d05674
SHA256124bb86bf2340ce35dd3246aa949d743b4117c1c3370eee221aa431ef3985fb1
SHA512b202d1908a440f79f0415720c60670b185b9b8b5b39bceedce6d583d3b12cc31a7148ebb6af09892cb01656d9f6826023fc1a0324a31369dced7baac1d2cfea0
-
Filesize
366KB
MD5791c8d2babea4f083ec61b1ec4403147
SHA13c7e595658d3fef056df3528968865ac89d05674
SHA256124bb86bf2340ce35dd3246aa949d743b4117c1c3370eee221aa431ef3985fb1
SHA512b202d1908a440f79f0415720c60670b185b9b8b5b39bceedce6d583d3b12cc31a7148ebb6af09892cb01656d9f6826023fc1a0324a31369dced7baac1d2cfea0