Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:23
Static task
static1
Behavioral task
behavioral1
Sample
46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe
Resource
win10v2004-20230220-en
General
-
Target
46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe
-
Size
700KB
-
MD5
1c2e7516a79ea80e0e7e77f5ffb15ad6
-
SHA1
e45a94393f37b157cc74e84984c82211622e9b94
-
SHA256
46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28
-
SHA512
ed1c85f945877109179a201fcc747b6a801ebf146b30f03cb329b14c3a4d22470e33e6d6a80a597ef768c8d03b0c2622dd93177f524ac91384c786dbca386aa6
-
SSDEEP
12288:RMrty90uzLEsc72gm7Exy+6Pdzkcg2ukHpMapunjewJdBRvb0KGSBoC4eS:kymsqRmA0+6Fzk9UHpXqjfJd8KvF4eS
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4052.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4572-191-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-192-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-194-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-196-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-198-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-200-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-202-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-204-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-206-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-208-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-210-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-212-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-214-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-216-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-218-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-220-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-222-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-224-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4572-461-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline behavioral1/memory/4572-1106-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1648 un482341.exe 1908 pro4052.exe 4572 qu9261.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4052.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un482341.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un482341.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4100 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1440 1908 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 pro4052.exe 1908 pro4052.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 pro4052.exe Token: SeDebugPrivilege 4572 qu9261.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1648 1264 46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe 84 PID 1264 wrote to memory of 1648 1264 46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe 84 PID 1264 wrote to memory of 1648 1264 46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe 84 PID 1648 wrote to memory of 1908 1648 un482341.exe 85 PID 1648 wrote to memory of 1908 1648 un482341.exe 85 PID 1648 wrote to memory of 1908 1648 un482341.exe 85 PID 1648 wrote to memory of 4572 1648 un482341.exe 93 PID 1648 wrote to memory of 4572 1648 un482341.exe 93 PID 1648 wrote to memory of 4572 1648 un482341.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe"C:\Users\Admin\AppData\Local\Temp\46b0c9da84473b44b9e1d036efc8b1e6ad903498c67f0bd83c36fc09b3f15d28.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un482341.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un482341.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4052.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 10284⤵
- Program crash
PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9261.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1908 -ip 19081⤵PID:1436
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5d2b35e6dbe38c6bce9a8db46a499b3aa
SHA1984f892b089beb9c12bbf4d007b4c32a9543c35a
SHA256a1fdc71aec39539ec3de6aba01078df4fd0707c3b2437fd17b2106ddc812fd17
SHA51280ff7a4aa5e7762e4f878d55c5ebf64ce04008baa33dc634d1eaffc622e6f24e152c128101d1ff61616a74a1b01756d1a1f65af360ae538ef6eefa99e0d853d9
-
Filesize
558KB
MD5d2b35e6dbe38c6bce9a8db46a499b3aa
SHA1984f892b089beb9c12bbf4d007b4c32a9543c35a
SHA256a1fdc71aec39539ec3de6aba01078df4fd0707c3b2437fd17b2106ddc812fd17
SHA51280ff7a4aa5e7762e4f878d55c5ebf64ce04008baa33dc634d1eaffc622e6f24e152c128101d1ff61616a74a1b01756d1a1f65af360ae538ef6eefa99e0d853d9
-
Filesize
308KB
MD59c244a4f69b07f075fc9e8ea88bd0fce
SHA134164ddd95941b4481d7bea71a00a62d3906a044
SHA256290a34b716dd99ff8834d3e31abf77fa7c71ed131baf8454ba5a2f8acdc56f14
SHA512a0574b485ca22c661c5d1c97353479efa6afad0e5ec90fa99a4989220a982ee585d195386f811110f1b4dd5986e01903d87f65491638c0bc3526c3a06b800b26
-
Filesize
308KB
MD59c244a4f69b07f075fc9e8ea88bd0fce
SHA134164ddd95941b4481d7bea71a00a62d3906a044
SHA256290a34b716dd99ff8834d3e31abf77fa7c71ed131baf8454ba5a2f8acdc56f14
SHA512a0574b485ca22c661c5d1c97353479efa6afad0e5ec90fa99a4989220a982ee585d195386f811110f1b4dd5986e01903d87f65491638c0bc3526c3a06b800b26
-
Filesize
366KB
MD58c228c1dd98a6c66659e2548d06d6e76
SHA1a95b5c6c9e717327ef5067b7ad8797207b3df728
SHA256bf125f925e46eaf65c27eca17c70cd8bd84e63d44aae4cd61b8e9677a34a0872
SHA51218f4f2f6ae5ff2db9618924e4d353e37221409c339677e47677129bf543508d65189433c63a9ecbf22f98297b92ee88b397a39ce72b5dc8dc9052ae21d4f553f
-
Filesize
366KB
MD58c228c1dd98a6c66659e2548d06d6e76
SHA1a95b5c6c9e717327ef5067b7ad8797207b3df728
SHA256bf125f925e46eaf65c27eca17c70cd8bd84e63d44aae4cd61b8e9677a34a0872
SHA51218f4f2f6ae5ff2db9618924e4d353e37221409c339677e47677129bf543508d65189433c63a9ecbf22f98297b92ee88b397a39ce72b5dc8dc9052ae21d4f553f