Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe
Resource
win10-20230220-en
General
-
Target
e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe
-
Size
701KB
-
MD5
95317174f79d9763d85a42482e2e5dde
-
SHA1
bb521d2cde9f4467d322d26ecc4098b87497438f
-
SHA256
e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d
-
SHA512
a470386bff66cacc6acf9f543c273fcfc29ff7a4a43924257ed785406bc68eaf362703aa3455a179304b48413855b3803dcd6cee37998ded43f64bdd2c77968e
-
SSDEEP
12288:mMrLy90hJfkB34RqhO16MiFD0Ljst09PbkxSDqBRvouEEVgh:NyMJf2Nhw6rwLjfjqbEEVgh
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2290.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3520-177-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/3520-178-0x0000000002730000-0x0000000002774000-memory.dmp family_redline behavioral1/memory/3520-179-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-180-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-182-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-184-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-186-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-188-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-190-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-192-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-194-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-196-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-198-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-200-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-202-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-204-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-206-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-208-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-210-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3520-212-0x0000000002730000-0x000000000276E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4172 un943658.exe 4196 pro2290.exe 3520 qu5225.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2290.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2290.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un943658.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un943658.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4196 pro2290.exe 4196 pro2290.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4196 pro2290.exe Token: SeDebugPrivilege 3520 qu5225.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3664 wrote to memory of 4172 3664 e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe 66 PID 3664 wrote to memory of 4172 3664 e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe 66 PID 3664 wrote to memory of 4172 3664 e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe 66 PID 4172 wrote to memory of 4196 4172 un943658.exe 67 PID 4172 wrote to memory of 4196 4172 un943658.exe 67 PID 4172 wrote to memory of 4196 4172 un943658.exe 67 PID 4172 wrote to memory of 3520 4172 un943658.exe 68 PID 4172 wrote to memory of 3520 4172 un943658.exe 68 PID 4172 wrote to memory of 3520 4172 un943658.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe"C:\Users\Admin\AppData\Local\Temp\e48e2b63852f1c9912c9020430b69a8af4e972a36772a75f4b4072882a45009d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943658.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2290.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5225.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5904c1cb3fbfc724563c544a1dd74048c
SHA130286ab2d8ec688c9c6906437b763cc67b709a2b
SHA25689828997286bb0cdf8fc4824ad0f14f5fe23ad1357d9428b7e28bd5538ce2997
SHA512251b29333d7d81f401e3456681b5c1d28a9d74ad8fc4bf3dbe0726998c1afa4df30e6798360955fbd8c2ff83c6babfb393ef35036c8fdbc7cca909606d39bb20
-
Filesize
558KB
MD5904c1cb3fbfc724563c544a1dd74048c
SHA130286ab2d8ec688c9c6906437b763cc67b709a2b
SHA25689828997286bb0cdf8fc4824ad0f14f5fe23ad1357d9428b7e28bd5538ce2997
SHA512251b29333d7d81f401e3456681b5c1d28a9d74ad8fc4bf3dbe0726998c1afa4df30e6798360955fbd8c2ff83c6babfb393ef35036c8fdbc7cca909606d39bb20
-
Filesize
308KB
MD5a12ad0875b8d329b86e912257676fcdf
SHA19733b25d047417a953ee807b6c5740613431c0d5
SHA2565fc3c707bf068b20c093ab4ee4579b259bbb0abc6c960118bf03f8b035b45ff3
SHA512d4b35119f6936dcd8c488b2a6dc62fedb87856301cc5ce2006fa4631cd41f1ea4b67e8bdbeb171fbfdbf4621d3b7722e80ce238bfc310f8cb65b38e5ef283a00
-
Filesize
308KB
MD5a12ad0875b8d329b86e912257676fcdf
SHA19733b25d047417a953ee807b6c5740613431c0d5
SHA2565fc3c707bf068b20c093ab4ee4579b259bbb0abc6c960118bf03f8b035b45ff3
SHA512d4b35119f6936dcd8c488b2a6dc62fedb87856301cc5ce2006fa4631cd41f1ea4b67e8bdbeb171fbfdbf4621d3b7722e80ce238bfc310f8cb65b38e5ef283a00
-
Filesize
366KB
MD5678a0100ab532a400a8566dedea59381
SHA19c7d1f1992a03a72fa422097a80a97b5b7b29f57
SHA2569922fae4d9bd07200a70dd22f5e5620e2fd36debcb01fab23dc00a038aa43b78
SHA512d8eba318aa8d85398e9671ea6ec0e7aaa71cd033c0a3e0bf5154e6867c9d7202a00efbbb166c84e5ade0286474d78d34c2270f87e4e1e9a914dca67e035e1d25
-
Filesize
366KB
MD5678a0100ab532a400a8566dedea59381
SHA19c7d1f1992a03a72fa422097a80a97b5b7b29f57
SHA2569922fae4d9bd07200a70dd22f5e5620e2fd36debcb01fab23dc00a038aa43b78
SHA512d8eba318aa8d85398e9671ea6ec0e7aaa71cd033c0a3e0bf5154e6867c9d7202a00efbbb166c84e5ade0286474d78d34c2270f87e4e1e9a914dca67e035e1d25