Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 16:27
Static task
static1
Behavioral task
behavioral1
Sample
e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe
Resource
win10-20230220-en
General
-
Target
e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe
-
Size
699KB
-
MD5
3a10f8a14cb2ca13728c41f76a0d904e
-
SHA1
a1c5435195ef01e827808cd9ce0d30578335e79b
-
SHA256
e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2
-
SHA512
f5aa3fe1ce450d8dc42e533e0bb483da528a39a4c641c18ca786bbfa231e82512d95fab9a503b37e0ea329e8721db5caf83d7e4ab5446482b933a6f3793db597
-
SSDEEP
12288:9Mrpy90Be76/sQgZTBOjVQcuD1EkaxYjS6aKG+skxm2fAIBRvRP6Xo6QuAAYp:kyKgpQgpBO5aDGYjRC32pAI9B6QuHYp
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8339.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/5000-180-0x0000000002510000-0x0000000002556000-memory.dmp family_redline behavioral1/memory/5000-181-0x0000000005220000-0x0000000005264000-memory.dmp family_redline behavioral1/memory/5000-182-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-183-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-185-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-187-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-189-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-191-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-193-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-195-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-197-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-199-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-201-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-203-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-205-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-207-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-209-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-211-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-213-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-215-0x0000000005220000-0x000000000525E000-memory.dmp family_redline behavioral1/memory/5000-1099-0x0000000002270000-0x0000000002280000-memory.dmp family_redline behavioral1/memory/5000-1101-0x0000000002270000-0x0000000002280000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 2144 un636356.exe 2512 pro8339.exe 5000 qu6816.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8339.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8339.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un636356.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un636356.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 pro8339.exe 2512 pro8339.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2512 pro8339.exe Token: SeDebugPrivilege 5000 qu6816.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2144 1804 e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe 66 PID 1804 wrote to memory of 2144 1804 e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe 66 PID 1804 wrote to memory of 2144 1804 e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe 66 PID 2144 wrote to memory of 2512 2144 un636356.exe 67 PID 2144 wrote to memory of 2512 2144 un636356.exe 67 PID 2144 wrote to memory of 2512 2144 un636356.exe 67 PID 2144 wrote to memory of 5000 2144 un636356.exe 68 PID 2144 wrote to memory of 5000 2144 un636356.exe 68 PID 2144 wrote to memory of 5000 2144 un636356.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe"C:\Users\Admin\AppData\Local\Temp\e52afaaf30638b4b6b4bb991c7ee467efddad07ca0cc438abeaa7360596632d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636356.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8339.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8339.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6816.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6816.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD51336a201af8b78b76dfdbb3e8f67f20e
SHA1f4de104335512ce351b788afc314d936c2fa27c1
SHA256ed9b83dac08cea125a382bc20338eb758e08cc522a609f2df0484cfa413bdc33
SHA5123dd0c93fc833afb344aa0ba42165beaefee0973fc4eb4b1bd76abf47e3ab7d6a80d4896257ad6239b7e659d2d76cb0af7d00f48cd809b565eb97123729169f7d
-
Filesize
558KB
MD51336a201af8b78b76dfdbb3e8f67f20e
SHA1f4de104335512ce351b788afc314d936c2fa27c1
SHA256ed9b83dac08cea125a382bc20338eb758e08cc522a609f2df0484cfa413bdc33
SHA5123dd0c93fc833afb344aa0ba42165beaefee0973fc4eb4b1bd76abf47e3ab7d6a80d4896257ad6239b7e659d2d76cb0af7d00f48cd809b565eb97123729169f7d
-
Filesize
308KB
MD5d72e24e6f0b0dabbdab655ed2baff39b
SHA1c03fee7d17219766aef151a55dd9198c8eaecb9d
SHA25637086613c3aba95550f233abada989819862129239095437376691903fa9f0f8
SHA512e81b056dd95136b59db18d4be4155e017b0b3bbcfca2dd7d78eb782011bc6362daf66250e0becc2882cad959869cca8f0af96633d922eca884a80655b3e624a8
-
Filesize
308KB
MD5d72e24e6f0b0dabbdab655ed2baff39b
SHA1c03fee7d17219766aef151a55dd9198c8eaecb9d
SHA25637086613c3aba95550f233abada989819862129239095437376691903fa9f0f8
SHA512e81b056dd95136b59db18d4be4155e017b0b3bbcfca2dd7d78eb782011bc6362daf66250e0becc2882cad959869cca8f0af96633d922eca884a80655b3e624a8
-
Filesize
366KB
MD5c80f4502ba228e23c67d3d706d58294d
SHA1cad3e62a83c105a7f8ff27ce1199879182dc25f6
SHA2569548af6a854c912566556d3b48ccd2ea41ac3af752f157a2ba0562fe564866a3
SHA512febbc2049cc7d1822a5243363f7855142bc0071723ec04130f7fb7f2f82fea135c8e6676a9926734b2b7fb0d88c2ae690ff30ffdfcf63f5e16f20531fb4a9336
-
Filesize
366KB
MD5c80f4502ba228e23c67d3d706d58294d
SHA1cad3e62a83c105a7f8ff27ce1199879182dc25f6
SHA2569548af6a854c912566556d3b48ccd2ea41ac3af752f157a2ba0562fe564866a3
SHA512febbc2049cc7d1822a5243363f7855142bc0071723ec04130f7fb7f2f82fea135c8e6676a9926734b2b7fb0d88c2ae690ff30ffdfcf63f5e16f20531fb4a9336