Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:28
Static task
static1
Behavioral task
behavioral1
Sample
5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe
Resource
win10v2004-20230220-en
General
-
Target
5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe
-
Size
700KB
-
MD5
8fb1114c75fcc54c2caefc686f8bddb5
-
SHA1
ade3cd651f14f3ebf97a4132c769835bbe4b3ce1
-
SHA256
5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20
-
SHA512
b0ba98e28d811eef00db0eaa868bfd57a41d2b303ea0c01585b5044495f69a16453cfa5e9fdcf6e3bf60b30a0a573b6becbc817f06cd56b146b55e034e15b7ec
-
SSDEEP
12288:6Mr3y90242NmDrMCnp2lALq4j1Eu4oTLTDyzH8BRvfKXINg10:FyZ4YmHMCgl2t5TLT+D87KXeZ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8839.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8839.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3408-191-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-200-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-204-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-206-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-208-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-210-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-212-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-214-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-216-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-218-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-220-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-222-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-224-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3408-486-0x0000000004ED0000-0x0000000004EE0000-memory.dmp family_redline behavioral1/memory/3408-1106-0x0000000004ED0000-0x0000000004EE0000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4696 un307558.exe 552 pro8839.exe 3408 qu9847.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8839.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un307558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un307558.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3752 552 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 552 pro8839.exe 552 pro8839.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 552 pro8839.exe Token: SeDebugPrivilege 3408 qu9847.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4696 4988 5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe 83 PID 4988 wrote to memory of 4696 4988 5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe 83 PID 4988 wrote to memory of 4696 4988 5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe 83 PID 4696 wrote to memory of 552 4696 un307558.exe 84 PID 4696 wrote to memory of 552 4696 un307558.exe 84 PID 4696 wrote to memory of 552 4696 un307558.exe 84 PID 4696 wrote to memory of 3408 4696 un307558.exe 90 PID 4696 wrote to memory of 3408 4696 un307558.exe 90 PID 4696 wrote to memory of 3408 4696 un307558.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe"C:\Users\Admin\AppData\Local\Temp\5f8c6142f89739523563b7afae4ba7682ab5bdb49c3c52d2321c6f32196e3d20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un307558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un307558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8839.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 10844⤵
- Program crash
PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9847.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9847.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 552 -ip 5521⤵PID:3916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5305126edad24c60df4ef38f9f58d09a6
SHA178ead93d3f0aa05e36a1956dddbdcda46d08d1a4
SHA2564df1e6eb5f2fece39327a016cfd6e43d6c1710f8dff96549582d41bd3fa81748
SHA51210d657a4506c834915175010396318645052f33abfae03707ad1aa02f2c0ec58019a0ffbff55c91650ae4df4213b01d1457070a14c9500dd32b74cd43a61743a
-
Filesize
558KB
MD5305126edad24c60df4ef38f9f58d09a6
SHA178ead93d3f0aa05e36a1956dddbdcda46d08d1a4
SHA2564df1e6eb5f2fece39327a016cfd6e43d6c1710f8dff96549582d41bd3fa81748
SHA51210d657a4506c834915175010396318645052f33abfae03707ad1aa02f2c0ec58019a0ffbff55c91650ae4df4213b01d1457070a14c9500dd32b74cd43a61743a
-
Filesize
308KB
MD59d8693a7d892d2b99997745054ad3a27
SHA1e41eb1b0e96befd4105ee3601427f4b4014db8a7
SHA2569e6b329995af99159ef321600f2b6161599f434390ec2da805431f62ff98a233
SHA51298097c63be813d8f86248daab3748ae44f8f17ef987b91b5bebcdc534c12bbb3434ab01c11d42c6882882faf39a81ebba6fc649947a13ee0f787366adf3054ba
-
Filesize
308KB
MD59d8693a7d892d2b99997745054ad3a27
SHA1e41eb1b0e96befd4105ee3601427f4b4014db8a7
SHA2569e6b329995af99159ef321600f2b6161599f434390ec2da805431f62ff98a233
SHA51298097c63be813d8f86248daab3748ae44f8f17ef987b91b5bebcdc534c12bbb3434ab01c11d42c6882882faf39a81ebba6fc649947a13ee0f787366adf3054ba
-
Filesize
366KB
MD5e929aa75115743e4116828f79befd3b5
SHA196327fd4a39f9c180564276c193362008694fe9f
SHA25666dfe2cf5c569a329a9e431990d9fa54a962a6ea2cac1ebeda71fad1bcf744e8
SHA5127bedd53e1da37ddef84f15803c10d70552ebc870bf2454eb4eb5bde08ae64ebe5aad68fb2d9653c84d57c9bc072be490e89cf34fe48a0f9ef204b2bc2a506fe3
-
Filesize
366KB
MD5e929aa75115743e4116828f79befd3b5
SHA196327fd4a39f9c180564276c193362008694fe9f
SHA25666dfe2cf5c569a329a9e431990d9fa54a962a6ea2cac1ebeda71fad1bcf744e8
SHA5127bedd53e1da37ddef84f15803c10d70552ebc870bf2454eb4eb5bde08ae64ebe5aad68fb2d9653c84d57c9bc072be490e89cf34fe48a0f9ef204b2bc2a506fe3