Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 16:17
Static task
static1
Behavioral task
behavioral1
Sample
45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe
Resource
win10-20230220-en
General
-
Target
45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe
-
Size
1.0MB
-
MD5
4542adfd01621aa38c28e1ade5524fd3
-
SHA1
5ace280e419588fd94c66a7a1e8967379f14a576
-
SHA256
45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f
-
SHA512
981820ab772137ef3347626ade6c03ca349d0ee6573452ded0dc9f3897c950c6c7db122463b51b452c75e48be525662d4bbb4ca6e48971bb68a2c5d5dc510eae
-
SSDEEP
24576:aybX82FLEKvKY1e2i8vIuyd1k2CzlR/7Za1Pg:hz8mLEmKY1e2iGIFd1k2CpR/7Z
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu838939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu838939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu838939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor3213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor3213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu838939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu838939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor3213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor3213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor3213.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3944-199-0x0000000002380000-0x00000000023C6000-memory.dmp family_redline behavioral1/memory/3944-200-0x0000000002740000-0x0000000002784000-memory.dmp family_redline behavioral1/memory/3944-201-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-202-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-204-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-206-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-208-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-210-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-212-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-214-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-216-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-218-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-220-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-222-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-224-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-226-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-228-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-230-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-232-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3944-234-0x0000000002740000-0x000000000277E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3488 kina7859.exe 2692 kina5675.exe 3976 kina1989.exe 3948 bu838939.exe 1524 cor3213.exe 3944 dBq89s76.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu838939.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor3213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor3213.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina7859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina7859.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina5675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina5675.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina1989.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina1989.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 bu838939.exe 3948 bu838939.exe 1524 cor3213.exe 1524 cor3213.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3948 bu838939.exe Token: SeDebugPrivilege 1524 cor3213.exe Token: SeDebugPrivilege 3944 dBq89s76.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3488 4024 45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe 66 PID 4024 wrote to memory of 3488 4024 45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe 66 PID 4024 wrote to memory of 3488 4024 45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe 66 PID 3488 wrote to memory of 2692 3488 kina7859.exe 67 PID 3488 wrote to memory of 2692 3488 kina7859.exe 67 PID 3488 wrote to memory of 2692 3488 kina7859.exe 67 PID 2692 wrote to memory of 3976 2692 kina5675.exe 68 PID 2692 wrote to memory of 3976 2692 kina5675.exe 68 PID 2692 wrote to memory of 3976 2692 kina5675.exe 68 PID 3976 wrote to memory of 3948 3976 kina1989.exe 69 PID 3976 wrote to memory of 3948 3976 kina1989.exe 69 PID 3976 wrote to memory of 1524 3976 kina1989.exe 70 PID 3976 wrote to memory of 1524 3976 kina1989.exe 70 PID 3976 wrote to memory of 1524 3976 kina1989.exe 70 PID 2692 wrote to memory of 3944 2692 kina5675.exe 71 PID 2692 wrote to memory of 3944 2692 kina5675.exe 71 PID 2692 wrote to memory of 3944 2692 kina5675.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe"C:\Users\Admin\AppData\Local\Temp\45b26e56b5da762c4ccdf36524d93f02d07b95192439a739e5e21509eede124f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7859.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina5675.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1989.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina1989.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu838939.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu838939.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3213.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3213.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBq89s76.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBq89s76.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
858KB
MD5ea70129b59a67140b7e4264e123fe7bb
SHA182f81c97545c93e9bbebd107fda771e734a3875f
SHA2568c1108997068379bb28c3987a1ddc1998615a87479e4f67a9160b2c7861a6dc9
SHA512b1fbfcf378aac37f12aa94e68ab1382628e7ac6dc6c35fc86b7811509d8ec02c48e2ef745e1eeef8af35a6e5233c6c5eedce21eac5f04edcde272df257d98b90
-
Filesize
858KB
MD5ea70129b59a67140b7e4264e123fe7bb
SHA182f81c97545c93e9bbebd107fda771e734a3875f
SHA2568c1108997068379bb28c3987a1ddc1998615a87479e4f67a9160b2c7861a6dc9
SHA512b1fbfcf378aac37f12aa94e68ab1382628e7ac6dc6c35fc86b7811509d8ec02c48e2ef745e1eeef8af35a6e5233c6c5eedce21eac5f04edcde272df257d98b90
-
Filesize
716KB
MD5199bfc695069c3accb55abdd91e16e98
SHA11574811806fe6d1965585779c8a776de5eb9c9a8
SHA256cb652c72d2479997b152208138fd6c1aae4a52fc4d5b0668fb4aed42fccfbe2e
SHA5125151bbe2a176bf788ffff42cef73d1b60bb30c2d4fa03886bebe5c53932c791a20b66fcce1e40ebc5ea27d2694baded6048602ce51aac6c6ec71c95567082f5a
-
Filesize
716KB
MD5199bfc695069c3accb55abdd91e16e98
SHA11574811806fe6d1965585779c8a776de5eb9c9a8
SHA256cb652c72d2479997b152208138fd6c1aae4a52fc4d5b0668fb4aed42fccfbe2e
SHA5125151bbe2a176bf788ffff42cef73d1b60bb30c2d4fa03886bebe5c53932c791a20b66fcce1e40ebc5ea27d2694baded6048602ce51aac6c6ec71c95567082f5a
-
Filesize
366KB
MD50e0b08561479b151b229b351548d94fd
SHA1ae8acb5119fa234446dd99905e0eac5cb72ef736
SHA2564a357d821ae7fdd58792a38b411e6411096fec3c795126c9990a5c9d00192cff
SHA512fdccf84365c22cc3b030bb388fffe6a9a7731d3fa6a3205fbd02307389ceeeaaf173a4f782676f6e5f58556936bcf1485b386239c98c286059005bec5916f7b0
-
Filesize
366KB
MD50e0b08561479b151b229b351548d94fd
SHA1ae8acb5119fa234446dd99905e0eac5cb72ef736
SHA2564a357d821ae7fdd58792a38b411e6411096fec3c795126c9990a5c9d00192cff
SHA512fdccf84365c22cc3b030bb388fffe6a9a7731d3fa6a3205fbd02307389ceeeaaf173a4f782676f6e5f58556936bcf1485b386239c98c286059005bec5916f7b0
-
Filesize
354KB
MD550a848b5d40937879503f9c257d0822f
SHA13595f8eb14bc2027ec5efd580cb4c9cdad5c2e9d
SHA256edce565de43b1481c1158ad1fc3c1d9c91ac588e1c57189012ad6b4420ec32a1
SHA5121241998a34c8f29e253d7e0d5aaa2c7d889600877b4027064cca77b598f587ad248056bfb89216fc8ccc2ac03dfb4a54b6a873e735c4c2906d46384fca66bc13
-
Filesize
354KB
MD550a848b5d40937879503f9c257d0822f
SHA13595f8eb14bc2027ec5efd580cb4c9cdad5c2e9d
SHA256edce565de43b1481c1158ad1fc3c1d9c91ac588e1c57189012ad6b4420ec32a1
SHA5121241998a34c8f29e253d7e0d5aaa2c7d889600877b4027064cca77b598f587ad248056bfb89216fc8ccc2ac03dfb4a54b6a873e735c4c2906d46384fca66bc13
-
Filesize
12KB
MD5f3b5c4aaad175eb3bc23b85b834d45d6
SHA137d8863dcaa3e6b5cb318fa913579fa1fffc50bf
SHA25689085a9fec220f01f3f5343abab709833737c99158abb6d33061c22bb55063d4
SHA5124dbda3d782ff1ca3c57fb348e09502c948f5a07e27f535ad2ed7e1636cefbc8d56e862b1530f1ef4eaaa2a6770d054e1a7c8934498c940a8d0d32b2dbf3f382f
-
Filesize
12KB
MD5f3b5c4aaad175eb3bc23b85b834d45d6
SHA137d8863dcaa3e6b5cb318fa913579fa1fffc50bf
SHA25689085a9fec220f01f3f5343abab709833737c99158abb6d33061c22bb55063d4
SHA5124dbda3d782ff1ca3c57fb348e09502c948f5a07e27f535ad2ed7e1636cefbc8d56e862b1530f1ef4eaaa2a6770d054e1a7c8934498c940a8d0d32b2dbf3f382f
-
Filesize
308KB
MD5b7a92c448e9644115b5a6f073ff3f1dd
SHA13400a5bcc55e0436ee9169df5df0c07730db0534
SHA256c83bf4b3ae28bd96d9a00a20600cdbcf3489afd59826088e1a02466faa1861a3
SHA5120d723ee034ebaf88acad7e9e76f2cead61a8c7dfb5d1ab7812c8119f00c46617d89712e40f8a5e414cf3af2b29668f01a4c09422d80a45e9384d92ece88e0649
-
Filesize
308KB
MD5b7a92c448e9644115b5a6f073ff3f1dd
SHA13400a5bcc55e0436ee9169df5df0c07730db0534
SHA256c83bf4b3ae28bd96d9a00a20600cdbcf3489afd59826088e1a02466faa1861a3
SHA5120d723ee034ebaf88acad7e9e76f2cead61a8c7dfb5d1ab7812c8119f00c46617d89712e40f8a5e414cf3af2b29668f01a4c09422d80a45e9384d92ece88e0649