Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:38
Static task
static1
Behavioral task
behavioral1
Sample
2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe
Resource
win10v2004-20230221-en
General
-
Target
2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe
-
Size
701KB
-
MD5
22581e2a6375324392b24f36993b57a7
-
SHA1
078b45eb00c5250da66304fc1ff2ca6fca7f481f
-
SHA256
2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3
-
SHA512
1499044d52b13edc8b17d89d664bdfc5a764c30a6798e149a572e7d074b52033cdca836d1ae3f2cd07f33642b62568ea81a69cc51e0de938da1549e129747306
-
SSDEEP
12288:OMrXy908sCwiUU1DeUN/yv+snuimeoWlBEzIOTpnSBRvGjyRgoUq+Oy657i:5yDmwegEoWOZRSayCoXFG
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1802.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1802.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3932-188-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-191-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-189-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-193-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-195-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-197-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-199-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-201-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-203-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-205-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-207-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-211-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-217-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-214-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-219-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-221-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-223-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-225-0x0000000002550000-0x000000000258E000-memory.dmp family_redline behavioral1/memory/3932-1104-0x0000000004FE0000-0x0000000004FF0000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1528 un773997.exe 2344 pro1802.exe 3932 qu6927.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1802.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1802.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un773997.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un773997.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5108 2344 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2344 pro1802.exe 2344 pro1802.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2344 pro1802.exe Token: SeDebugPrivilege 3932 qu6927.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1528 2736 2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe 83 PID 2736 wrote to memory of 1528 2736 2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe 83 PID 2736 wrote to memory of 1528 2736 2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe 83 PID 1528 wrote to memory of 2344 1528 un773997.exe 84 PID 1528 wrote to memory of 2344 1528 un773997.exe 84 PID 1528 wrote to memory of 2344 1528 un773997.exe 84 PID 1528 wrote to memory of 3932 1528 un773997.exe 90 PID 1528 wrote to memory of 3932 1528 un773997.exe 90 PID 1528 wrote to memory of 3932 1528 un773997.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe"C:\Users\Admin\AppData\Local\Temp\2829641f8e40f08bea48997b3f3c6f737ecfc5c3737f4ffdf7df8ba3667b40f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un773997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un773997.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1802.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1802.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 10844⤵
- Program crash
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6927.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6927.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2344 -ip 23441⤵PID:2972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5300cae281dbc0f5144ebb0a837331fb1
SHA13e5495f6a80e14abda0b4ec2b5222709a137237e
SHA256da363b25b58919210a6629f63afcad8bcdcf5233a834d779fc05f9a236c09d72
SHA512234257a6b04b021c25dc9569ac7e91d925198395f4d7e669e2c2f32a908735d7635a43853e0b2c9d86c449d8d867e893950792fd69ba2f77f71e5c31e9d9fa8f
-
Filesize
558KB
MD5300cae281dbc0f5144ebb0a837331fb1
SHA13e5495f6a80e14abda0b4ec2b5222709a137237e
SHA256da363b25b58919210a6629f63afcad8bcdcf5233a834d779fc05f9a236c09d72
SHA512234257a6b04b021c25dc9569ac7e91d925198395f4d7e669e2c2f32a908735d7635a43853e0b2c9d86c449d8d867e893950792fd69ba2f77f71e5c31e9d9fa8f
-
Filesize
308KB
MD5822c5c61c02f49c22b3271a788d636ad
SHA1362b52f5fe6f57e10e1df465a830c28c0eba63a2
SHA25612771a25d467178f51407f97b7fdb2867f6ba121d5436b7792c3b5677956d68a
SHA51273aa66ff08ebdf7831d0e48926cf6ca4491579fb84ab9ab7dce8c7826177add967dadfcf5c0bcd3208f248d14ce48324dce068c10b501eb8b8acc3ae8f3a9c3c
-
Filesize
308KB
MD5822c5c61c02f49c22b3271a788d636ad
SHA1362b52f5fe6f57e10e1df465a830c28c0eba63a2
SHA25612771a25d467178f51407f97b7fdb2867f6ba121d5436b7792c3b5677956d68a
SHA51273aa66ff08ebdf7831d0e48926cf6ca4491579fb84ab9ab7dce8c7826177add967dadfcf5c0bcd3208f248d14ce48324dce068c10b501eb8b8acc3ae8f3a9c3c
-
Filesize
366KB
MD59ab79219891cac5c15011f36e5eea89e
SHA17dd7db97516ce7e0fa996a7dcde2c0a4ed036ba1
SHA256d1066b516ddc0ef139f22d57d68e3fc9a7e25016eb763c7ec8e29272a6cc305a
SHA512d3a9e739302ea529985554abe953e8727cc52bf93b7beff9865bdfef646f19beda43d3929a50f18b86d148682e2e2605f31b30bb25bf5ee0f418542b43af0674
-
Filesize
366KB
MD59ab79219891cac5c15011f36e5eea89e
SHA17dd7db97516ce7e0fa996a7dcde2c0a4ed036ba1
SHA256d1066b516ddc0ef139f22d57d68e3fc9a7e25016eb763c7ec8e29272a6cc305a
SHA512d3a9e739302ea529985554abe953e8727cc52bf93b7beff9865bdfef646f19beda43d3929a50f18b86d148682e2e2605f31b30bb25bf5ee0f418542b43af0674