Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 16:25
Static task
static1
Behavioral task
behavioral1
Sample
58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe
Resource
win10-20230220-en
General
-
Target
58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe
-
Size
700KB
-
MD5
b4a936a1e098a33fbcc89886d422a61d
-
SHA1
4eded5403ab3964d47557df4523a44dd88687099
-
SHA256
58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa
-
SHA512
a00a940311b092f92874e73378229657b14260782eaa8d357090bd6c34ff7cfb7a3eba17e0df1c26fc954bd71a8b1bcb3c29e8ce4eb215cb3427d46d723cd09a
-
SSDEEP
12288:AMrly90PhMhDMkaBta7uO2j9I6EJrwOZ2OjqulaRumDWBRvIYbgf4XJjr5:1yvMkQouOoKwOZ2OjqoaPDWPbgf4XJj1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3141.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1348-181-0x0000000002700000-0x0000000002746000-memory.dmp family_redline behavioral1/memory/1348-182-0x0000000005200000-0x0000000005244000-memory.dmp family_redline behavioral1/memory/1348-183-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-184-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-186-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-188-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-190-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-192-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-194-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-196-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-198-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-200-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-202-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-204-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-208-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-211-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-214-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-216-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-218-0x0000000005200000-0x000000000523E000-memory.dmp family_redline behavioral1/memory/1348-220-0x0000000005200000-0x000000000523E000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1984 un842605.exe 4284 pro3141.exe 1348 qu6338.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3141.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3141.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un842605.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un842605.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4284 pro3141.exe 4284 pro3141.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4284 pro3141.exe Token: SeDebugPrivilege 1348 qu6338.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1984 1736 58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe 66 PID 1736 wrote to memory of 1984 1736 58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe 66 PID 1736 wrote to memory of 1984 1736 58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe 66 PID 1984 wrote to memory of 4284 1984 un842605.exe 67 PID 1984 wrote to memory of 4284 1984 un842605.exe 67 PID 1984 wrote to memory of 4284 1984 un842605.exe 67 PID 1984 wrote to memory of 1348 1984 un842605.exe 68 PID 1984 wrote to memory of 1348 1984 un842605.exe 68 PID 1984 wrote to memory of 1348 1984 un842605.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe"C:\Users\Admin\AppData\Local\Temp\58c8dd496d5908760c60af99aa20eaa43caee876561ef799cea440dbd720d2fa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842605.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3141.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3141.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6338.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6338.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD55cf898d327739536380f9ea8da171ada
SHA18375f5f349f4cd50bf506b29342cc946b7a717bc
SHA2560ffe264240faa3de22c2ba38e93851ccbaeeb936e432f1fcc2c59ee3d2a63692
SHA51244937208ab625fa0e0f3b3e26e3d1343c81990d3ec9dba76ba62b7111672dbb46ee71565cb3254820d02d7ee9bf4e36515c9239b3354a2f72d59f8e26d04ba11
-
Filesize
558KB
MD55cf898d327739536380f9ea8da171ada
SHA18375f5f349f4cd50bf506b29342cc946b7a717bc
SHA2560ffe264240faa3de22c2ba38e93851ccbaeeb936e432f1fcc2c59ee3d2a63692
SHA51244937208ab625fa0e0f3b3e26e3d1343c81990d3ec9dba76ba62b7111672dbb46ee71565cb3254820d02d7ee9bf4e36515c9239b3354a2f72d59f8e26d04ba11
-
Filesize
308KB
MD567074d829eb479bdfaa041d4f4d837c8
SHA107701b3a6b29520349bdbf3a7029ccbefcd86fdf
SHA256b8d435844479c7c04ee5151a2854212e09f3c32a04c4c7fd77d9d4caea545264
SHA5124ed6d8519d57af23e3bcbcb89940f9029d564128e8696ac691b0fdb6f19753f9cf1bc0abc7bf3266cd131e0d9c00b84922f26dd0dcc78acd8a2fa53918a6022d
-
Filesize
308KB
MD567074d829eb479bdfaa041d4f4d837c8
SHA107701b3a6b29520349bdbf3a7029ccbefcd86fdf
SHA256b8d435844479c7c04ee5151a2854212e09f3c32a04c4c7fd77d9d4caea545264
SHA5124ed6d8519d57af23e3bcbcb89940f9029d564128e8696ac691b0fdb6f19753f9cf1bc0abc7bf3266cd131e0d9c00b84922f26dd0dcc78acd8a2fa53918a6022d
-
Filesize
366KB
MD5479e875050cab2e1aa1904cdbce7ea57
SHA10f5bb567896c63db7e74559e913abad4a43f5dcb
SHA256fb7be0d50fa6b9b4736da5954d9cbd29292ba756022364fe004d8b6b6424fe2d
SHA512a1388d14698eac10ec5b5ad5b0f06fed00afb3dd2ce8efc294e4444c6c0536c5db3278cf63bcc311eb23a834cd23b6bbaadd7a0125e605a7966ca76824eda947
-
Filesize
366KB
MD5479e875050cab2e1aa1904cdbce7ea57
SHA10f5bb567896c63db7e74559e913abad4a43f5dcb
SHA256fb7be0d50fa6b9b4736da5954d9cbd29292ba756022364fe004d8b6b6424fe2d
SHA512a1388d14698eac10ec5b5ad5b0f06fed00afb3dd2ce8efc294e4444c6c0536c5db3278cf63bcc311eb23a834cd23b6bbaadd7a0125e605a7966ca76824eda947