Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:42
Static task
static1
Behavioral task
behavioral1
Sample
45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe
Resource
win10v2004-20230221-en
General
-
Target
45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe
-
Size
700KB
-
MD5
913c44c77c9bc83b7faba6334e5d2c66
-
SHA1
dd3b6f32bd43a865ce18665efe9c26f81d70b5e3
-
SHA256
45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22
-
SHA512
7c3446a3c2b98918ee71aa4fba297cce0f05b036107e963e10348cba4d1483f0155a68b825f209be32596f365c7a0fcbdff9e13623e4ec0be2e69793ae8851a0
-
SSDEEP
12288:WMrHy90yP75gFPq63LyDpeXA/qaeeXsuj/IL83EIMHjTBRvJ7GcEh0hRNH:xy95eFDXWftgL80xjT3dhRNH
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5921.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1564-190-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-191-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-193-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-195-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-197-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-199-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-201-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-203-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-205-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-207-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-212-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-215-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-217-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-219-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-221-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-223-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-225-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/1564-227-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4808 un189504.exe 4324 pro5921.exe 1564 qu0890.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5921.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un189504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un189504.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4424 4324 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4324 pro5921.exe 4324 pro5921.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4324 pro5921.exe Token: SeDebugPrivilege 1564 qu0890.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4808 2116 45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe 82 PID 2116 wrote to memory of 4808 2116 45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe 82 PID 2116 wrote to memory of 4808 2116 45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe 82 PID 4808 wrote to memory of 4324 4808 un189504.exe 83 PID 4808 wrote to memory of 4324 4808 un189504.exe 83 PID 4808 wrote to memory of 4324 4808 un189504.exe 83 PID 4808 wrote to memory of 1564 4808 un189504.exe 89 PID 4808 wrote to memory of 1564 4808 un189504.exe 89 PID 4808 wrote to memory of 1564 4808 un189504.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe"C:\Users\Admin\AppData\Local\Temp\45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un189504.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un189504.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5921.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10924⤵
- Program crash
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0890.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4324 -ip 43241⤵PID:2560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5b403ad178859c5b759a1ba8b7092742f
SHA10be48aa08617301aa9426090b5fe3f3f525d60c9
SHA2565184b6975ffbf42b6e34d614b069bb903a600057dad7c9c1bacad755a8ddaa33
SHA5120bd33483f208399f4fe8e14e0ca36692964315077bc46c721a8423b4927810a83a04ad0233f7a74271a01051817ac1e70d3060536ea21cdd044a545ff3a80217
-
Filesize
558KB
MD5b403ad178859c5b759a1ba8b7092742f
SHA10be48aa08617301aa9426090b5fe3f3f525d60c9
SHA2565184b6975ffbf42b6e34d614b069bb903a600057dad7c9c1bacad755a8ddaa33
SHA5120bd33483f208399f4fe8e14e0ca36692964315077bc46c721a8423b4927810a83a04ad0233f7a74271a01051817ac1e70d3060536ea21cdd044a545ff3a80217
-
Filesize
308KB
MD530db79ca6eb76f177e88ca8062e7b256
SHA1193033ad97734d3c8b81eb13290e8bec3f588a58
SHA25662a3402016e74bf3734a6cabfcd8a599ff45f2f115a989a94ae979d586aa6607
SHA5128e9ae91837e24f0f46971848d627f134c4400336961a7beca97ef574e6412b0ecdda987f627aa95d0826da105722c3e1bdc4600ba80f445dd6f76c2d4a6c8165
-
Filesize
308KB
MD530db79ca6eb76f177e88ca8062e7b256
SHA1193033ad97734d3c8b81eb13290e8bec3f588a58
SHA25662a3402016e74bf3734a6cabfcd8a599ff45f2f115a989a94ae979d586aa6607
SHA5128e9ae91837e24f0f46971848d627f134c4400336961a7beca97ef574e6412b0ecdda987f627aa95d0826da105722c3e1bdc4600ba80f445dd6f76c2d4a6c8165
-
Filesize
366KB
MD5c745ac6d1937ec34a26e57215c8c502a
SHA161709863226370af838210150846f70720625a53
SHA2567f3c712cde14a46aad7bcabaf09ffe0e57f8147df8bd245a70e85e8afdd9e1bd
SHA51263d3193a52d3bb898d7909ef0ccac02ba18b5f901515ddff9c3c36e9ff83630e3d1d69fa4d2595dffda8200271a7ddef3018cfea562202c65a299b52e1d81f10
-
Filesize
366KB
MD5c745ac6d1937ec34a26e57215c8c502a
SHA161709863226370af838210150846f70720625a53
SHA2567f3c712cde14a46aad7bcabaf09ffe0e57f8147df8bd245a70e85e8afdd9e1bd
SHA51263d3193a52d3bb898d7909ef0ccac02ba18b5f901515ddff9c3c36e9ff83630e3d1d69fa4d2595dffda8200271a7ddef3018cfea562202c65a299b52e1d81f10