Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:37
Static task
static1
Behavioral task
behavioral1
Sample
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe
Resource
win10v2004-20230220-en
General
-
Target
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe
-
Size
700KB
-
MD5
960e70f2fc9f1d96d9fff7112204cf19
-
SHA1
d9b37954335e38fc380400ba2c556bce907c7eab
-
SHA256
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0
-
SHA512
c4edfbeafd93e9505359da380a436c9d6e871ee6ec901f6ccf3f6bef52cee69df7ba34cdc0f2577c0a0cadae92b3b83f882b5b8ed650f63957d49a82132f468c
-
SSDEEP
12288:fMr2y90krjXZk3T5oLZFr+pa4unSO7X20afJBRvZKAjOGy:py3fQ5c88z7ifJFOD
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7286.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1104-190-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-191-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-193-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-195-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-197-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-199-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-201-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-203-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-205-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-207-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-209-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-211-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-213-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-215-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-219-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-223-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-225-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-227-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1104-1106-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1596 un811237.exe 1984 pro7286.exe 1104 qu6762.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7286.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un811237.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un811237.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5104 1984 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 pro7286.exe 1984 pro7286.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1984 pro7286.exe Token: SeDebugPrivilege 1104 qu6762.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5076 wrote to memory of 1596 5076 cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe 79 PID 5076 wrote to memory of 1596 5076 cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe 79 PID 5076 wrote to memory of 1596 5076 cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe 79 PID 1596 wrote to memory of 1984 1596 un811237.exe 80 PID 1596 wrote to memory of 1984 1596 un811237.exe 80 PID 1596 wrote to memory of 1984 1596 un811237.exe 80 PID 1596 wrote to memory of 1104 1596 un811237.exe 88 PID 1596 wrote to memory of 1104 1596 un811237.exe 88 PID 1596 wrote to memory of 1104 1596 un811237.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe"C:\Users\Admin\AppData\Local\Temp\cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811237.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7286.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 10884⤵
- Program crash
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6762.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1984 -ip 19841⤵PID:4100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5800d3d8601475ea9862c4e10d7f03751
SHA1234af468c7581b1c901783445554c5c14726abfc
SHA2567a7fa820f811fc622dbf303bc07111105f6dcedaf1eae40e0801c796e06c3196
SHA512b62bf008b52e1a449a6360a62d604219e696e7a4e49a3c2bf7a48b7c6713b47fd967bd235f216b2c25ee1e83156fb575078b8698202cfd1f5e971346d3543bbb
-
Filesize
558KB
MD5800d3d8601475ea9862c4e10d7f03751
SHA1234af468c7581b1c901783445554c5c14726abfc
SHA2567a7fa820f811fc622dbf303bc07111105f6dcedaf1eae40e0801c796e06c3196
SHA512b62bf008b52e1a449a6360a62d604219e696e7a4e49a3c2bf7a48b7c6713b47fd967bd235f216b2c25ee1e83156fb575078b8698202cfd1f5e971346d3543bbb
-
Filesize
308KB
MD513b4e0a321e2062d73e7b6f4f42b29e8
SHA1234812f0a239ae777d09d01873208be68f0e8fcd
SHA256f0fb8c31caab3ca580568855be68fa92d2af2034faef33365fce6c4d1800991a
SHA5127d6c024b2da84a34646222e0c8f49465938095e64d23b1114d7dc57fe9c6f246198383d60e1a1db537b440c328ee3030d9fcffddaf28862610de4ddf38376cf5
-
Filesize
308KB
MD513b4e0a321e2062d73e7b6f4f42b29e8
SHA1234812f0a239ae777d09d01873208be68f0e8fcd
SHA256f0fb8c31caab3ca580568855be68fa92d2af2034faef33365fce6c4d1800991a
SHA5127d6c024b2da84a34646222e0c8f49465938095e64d23b1114d7dc57fe9c6f246198383d60e1a1db537b440c328ee3030d9fcffddaf28862610de4ddf38376cf5
-
Filesize
366KB
MD5ddbaa62506f235f09ba2fb4fc7ab0fff
SHA19cba03ec0c725a5ce40d60a5ec75cc1535d2bcaa
SHA256601029b0360c2167799f36cfe03e06b8afce13615fbe4ca1da1153c271e6c09f
SHA5121cfd43bd9c5b03269b2bcb11a8350a27c3f2d8a664762cb88f13ce70729e54c6d62a277b0fb51a1ea72af5e37d59fa15d952a750e9f753e2e56ba65249948ba5
-
Filesize
366KB
MD5ddbaa62506f235f09ba2fb4fc7ab0fff
SHA19cba03ec0c725a5ce40d60a5ec75cc1535d2bcaa
SHA256601029b0360c2167799f36cfe03e06b8afce13615fbe4ca1da1153c271e6c09f
SHA5121cfd43bd9c5b03269b2bcb11a8350a27c3f2d8a664762cb88f13ce70729e54c6d62a277b0fb51a1ea72af5e37d59fa15d952a750e9f753e2e56ba65249948ba5