Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:21
Static task
static1
Behavioral task
behavioral1
Sample
cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe
Resource
win10v2004-20230220-en
General
-
Target
cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe
-
Size
1.0MB
-
MD5
ca17e863b36476b5457b4dd8fa2cf66a
-
SHA1
32881688cef9a29ac46eb6770440b03a12043b7c
-
SHA256
cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1
-
SHA512
0017256a3151ff8aff4658ca3429b7826047c4a6564fdc717589e54ff4b78ea7f6f251f21b467f16707ea76dfcb39a040af003c9466920f19b55207c643465ec
-
SSDEEP
24576:tyqQnAAjm6XPpvqM0DLbaLiQCnA6ZkytBFeXyfNUy6:IqQnpjHPpiM0DLmLTC1ZkytSXyuy
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor6520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor6520.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu812408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu812408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu812408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu812408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu812408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor6520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor6520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor6520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu812408.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor6520.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4048-211-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-213-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-216-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-218-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-220-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-222-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-224-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-226-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-228-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-230-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-232-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-234-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-236-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-238-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-240-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-242-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-244-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline behavioral1/memory/4048-246-0x0000000002870000-0x00000000028AE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2848 kina8509.exe 1344 kina9056.exe 2344 kina7122.exe 1512 bu812408.exe 4324 cor6520.exe 4048 dwR01s82.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor6520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor6520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu812408.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina9056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina9056.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina7122.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina7122.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina8509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina8509.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3280 4324 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1512 bu812408.exe 1512 bu812408.exe 4324 cor6520.exe 4324 cor6520.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1512 bu812408.exe Token: SeDebugPrivilege 4324 cor6520.exe Token: SeDebugPrivilege 4048 dwR01s82.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2848 2352 cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe 84 PID 2352 wrote to memory of 2848 2352 cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe 84 PID 2352 wrote to memory of 2848 2352 cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe 84 PID 2848 wrote to memory of 1344 2848 kina8509.exe 85 PID 2848 wrote to memory of 1344 2848 kina8509.exe 85 PID 2848 wrote to memory of 1344 2848 kina8509.exe 85 PID 1344 wrote to memory of 2344 1344 kina9056.exe 86 PID 1344 wrote to memory of 2344 1344 kina9056.exe 86 PID 1344 wrote to memory of 2344 1344 kina9056.exe 86 PID 2344 wrote to memory of 1512 2344 kina7122.exe 87 PID 2344 wrote to memory of 1512 2344 kina7122.exe 87 PID 2344 wrote to memory of 4324 2344 kina7122.exe 91 PID 2344 wrote to memory of 4324 2344 kina7122.exe 91 PID 2344 wrote to memory of 4324 2344 kina7122.exe 91 PID 1344 wrote to memory of 4048 1344 kina9056.exe 94 PID 1344 wrote to memory of 4048 1344 kina9056.exe 94 PID 1344 wrote to memory of 4048 1344 kina9056.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe"C:\Users\Admin\AppData\Local\Temp\cc657687e676032fd2a2d43b492bb5e6e22846264639162ff5d3f4004e456da1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8509.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8509.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9056.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina9056.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7122.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7122.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu812408.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu812408.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6520.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor6520.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10846⤵
- Program crash
PID:3280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dwR01s82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dwR01s82.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4324 -ip 43241⤵PID:5092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD5aa191f1b4fa05e2b6c8bd8ed8fefa970
SHA1d45cb31252ffcf1cc03e79ea9770436622220c42
SHA2564704bb49b790bd079564d7177d62ca256cdd44b106e0b9aee739090b6e0fc9aa
SHA5125117cd1d1c719ede607293b7c78c15a2e1713ad0e6d5e3be24ff145634a4cc99ab80da8cc30d344c5a3a3cf19c868609465320cc9a7aa11eb70223c31f162e7b
-
Filesize
857KB
MD5aa191f1b4fa05e2b6c8bd8ed8fefa970
SHA1d45cb31252ffcf1cc03e79ea9770436622220c42
SHA2564704bb49b790bd079564d7177d62ca256cdd44b106e0b9aee739090b6e0fc9aa
SHA5125117cd1d1c719ede607293b7c78c15a2e1713ad0e6d5e3be24ff145634a4cc99ab80da8cc30d344c5a3a3cf19c868609465320cc9a7aa11eb70223c31f162e7b
-
Filesize
715KB
MD54385abf9641435e419dadc221be2b730
SHA10eee2cf8393f9180ea51610ae4cf74b9e6ae7409
SHA256a87b331ae48673aa97717e5087c7aa997ece818f726d163d98f1b47c1751d251
SHA512cfd09fc9adde408373b81ea8b41067bd1c24bd181512c902d0e094d1b7ffc044a49710cb46a01d22e8530f9ced6e6c4d2fc8ce831821023f611cea09839a8b49
-
Filesize
715KB
MD54385abf9641435e419dadc221be2b730
SHA10eee2cf8393f9180ea51610ae4cf74b9e6ae7409
SHA256a87b331ae48673aa97717e5087c7aa997ece818f726d163d98f1b47c1751d251
SHA512cfd09fc9adde408373b81ea8b41067bd1c24bd181512c902d0e094d1b7ffc044a49710cb46a01d22e8530f9ced6e6c4d2fc8ce831821023f611cea09839a8b49
-
Filesize
366KB
MD55b7911a0021435e850111582acd48c62
SHA12a9bbddc39befa3943de6a5da41f4c63b0675fe4
SHA25689f28327f089adc73acedf993ae4e567662b806b2e98c725ce71f81e55c74067
SHA5123a84b1c2567431a84cb6aa538aa754cbaa3bdb6fe2df4dd8e225fdc1a8801f3dd820bdf23cab7a2588b99c83bae4e6582ddb6f4d71a3865f1325016363a83ec3
-
Filesize
366KB
MD55b7911a0021435e850111582acd48c62
SHA12a9bbddc39befa3943de6a5da41f4c63b0675fe4
SHA25689f28327f089adc73acedf993ae4e567662b806b2e98c725ce71f81e55c74067
SHA5123a84b1c2567431a84cb6aa538aa754cbaa3bdb6fe2df4dd8e225fdc1a8801f3dd820bdf23cab7a2588b99c83bae4e6582ddb6f4d71a3865f1325016363a83ec3
-
Filesize
354KB
MD55eb6b3de1bfd2f3bc9f5218bc0ee626f
SHA1c5f96045ee919860fc9417038e73f26b5a43d37d
SHA25617a9af45419c79672bf22b0b3a469ad01e83edb77f06c4fd1a6556c75d171a9a
SHA512859ba9a4a5e70cf29e329a13e784dd1d23fd915deb7205c41ed0454542a0d17ec2c6fa3c1bea281829e4643f276c6bb078df2004d2b41be0fe6005dd2516c78c
-
Filesize
354KB
MD55eb6b3de1bfd2f3bc9f5218bc0ee626f
SHA1c5f96045ee919860fc9417038e73f26b5a43d37d
SHA25617a9af45419c79672bf22b0b3a469ad01e83edb77f06c4fd1a6556c75d171a9a
SHA512859ba9a4a5e70cf29e329a13e784dd1d23fd915deb7205c41ed0454542a0d17ec2c6fa3c1bea281829e4643f276c6bb078df2004d2b41be0fe6005dd2516c78c
-
Filesize
12KB
MD5ad75ca6ec8b6a9087ed85a88c0e04fea
SHA18e2a78c537bf1d8fd0d487837bd0baf9bbefe1d8
SHA2565b101583de60ad2876b768b8254ee40a792b649487fba6fcc2f3bbeb96d520eb
SHA51253b984c7605f4baf323849a50b7c7fe312161eb88eb10f0bb92a3e817b839c03bbb32e723daa8cfefdb6ff94ce9753b79eff67aeb77cc325a6cbb86204908823
-
Filesize
12KB
MD5ad75ca6ec8b6a9087ed85a88c0e04fea
SHA18e2a78c537bf1d8fd0d487837bd0baf9bbefe1d8
SHA2565b101583de60ad2876b768b8254ee40a792b649487fba6fcc2f3bbeb96d520eb
SHA51253b984c7605f4baf323849a50b7c7fe312161eb88eb10f0bb92a3e817b839c03bbb32e723daa8cfefdb6ff94ce9753b79eff67aeb77cc325a6cbb86204908823
-
Filesize
308KB
MD521ea3bf265e8fe22329426fb942bf698
SHA11a54fca23c6ed87cfe5918677080cde6756b5889
SHA256ef00afd047d92d701e6c75f7e35329980685079340518221bbd48fce11455875
SHA51246354ac497ca32d0da189aa965dd00d0102d563cb215ee8083a9fbd6ad55c8fc9145d812d30739e503e353c4b5e4a4d66b6063f7e99625cf4b542b941d46bce4
-
Filesize
308KB
MD521ea3bf265e8fe22329426fb942bf698
SHA11a54fca23c6ed87cfe5918677080cde6756b5889
SHA256ef00afd047d92d701e6c75f7e35329980685079340518221bbd48fce11455875
SHA51246354ac497ca32d0da189aa965dd00d0102d563cb215ee8083a9fbd6ad55c8fc9145d812d30739e503e353c4b5e4a4d66b6063f7e99625cf4b542b941d46bce4