Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:30
Static task
static1
Behavioral task
behavioral1
Sample
dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe
Resource
win10v2004-20230220-en
General
-
Target
dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe
-
Size
700KB
-
MD5
8543c0aac5a524ea3bf50e9c79f139e6
-
SHA1
e6f0401d292fa024230932005ca81ed671e2312d
-
SHA256
dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01
-
SHA512
8cbf903872817763397789f0360a35b4cdbe00b3f7c751d357380cebb0676a85e256bcdea374436ca5d0f6d7a3bec93dc250903a911bbca6945598759149e411
-
SSDEEP
12288:+Mr7y90VUqRCdtyzwft90RJWAA9qWjSF7FhKx5iQ3QyFcewYBRvLQ6GS6x:tyAUqRDzwVaXkXSBiLi6QHYXRux
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1767.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1767.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5052-189-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-190-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-192-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-194-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-196-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-198-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-200-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-202-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-204-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-206-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-208-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-210-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-212-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-214-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-216-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-218-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-220-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-222-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/5052-508-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 3712 un699498.exe 1044 pro1767.exe 5052 qu2257.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1767.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un699498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un699498.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4312 1044 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1044 pro1767.exe 1044 pro1767.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1044 pro1767.exe Token: SeDebugPrivilege 5052 qu2257.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3712 1512 dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe 84 PID 1512 wrote to memory of 3712 1512 dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe 84 PID 1512 wrote to memory of 3712 1512 dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe 84 PID 3712 wrote to memory of 1044 3712 un699498.exe 85 PID 3712 wrote to memory of 1044 3712 un699498.exe 85 PID 3712 wrote to memory of 1044 3712 un699498.exe 85 PID 3712 wrote to memory of 5052 3712 un699498.exe 91 PID 3712 wrote to memory of 5052 3712 un699498.exe 91 PID 3712 wrote to memory of 5052 3712 un699498.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe"C:\Users\Admin\AppData\Local\Temp\dfb36492cbed8accfd567723420fee4e8c9cdf55de5fa5c32dafb32612cadd01.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un699498.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un699498.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1767.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 10844⤵
- Program crash
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2257.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1044 -ip 10441⤵PID:2828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD50412b619575d45a7e0e2d81fd29b30eb
SHA1b9dbbc9853bc8c49dfc88508cd53a58a19d3fed3
SHA2560de915e54f3c2ba74fce69df08748f7b5672a6ddac44634905ca533d683c1743
SHA512e6fd385ace0737b130f728d44aa5ac6164cf500edb6088af43892ed0dae0ea8d00514de9f51574d6a79e0b40e8b9c50a884cea42f531344dc182ebc4568030e9
-
Filesize
558KB
MD50412b619575d45a7e0e2d81fd29b30eb
SHA1b9dbbc9853bc8c49dfc88508cd53a58a19d3fed3
SHA2560de915e54f3c2ba74fce69df08748f7b5672a6ddac44634905ca533d683c1743
SHA512e6fd385ace0737b130f728d44aa5ac6164cf500edb6088af43892ed0dae0ea8d00514de9f51574d6a79e0b40e8b9c50a884cea42f531344dc182ebc4568030e9
-
Filesize
308KB
MD5af9c809a6b551560848688e1cae35d61
SHA1b3f80cf07eab93a13a83559343b9b9fc79e595a8
SHA256751886292823442b6f326fb74f129613f8b5e91e6aaa2a990fde4332c758e225
SHA5121c99c990bfbd7818ed728d2cb2346037a72713e745172582d7006a9047768e85eff9a2750a50febd1f16c73fde21b0e272aead63bdd1fb731bc2de862ca9e18f
-
Filesize
308KB
MD5af9c809a6b551560848688e1cae35d61
SHA1b3f80cf07eab93a13a83559343b9b9fc79e595a8
SHA256751886292823442b6f326fb74f129613f8b5e91e6aaa2a990fde4332c758e225
SHA5121c99c990bfbd7818ed728d2cb2346037a72713e745172582d7006a9047768e85eff9a2750a50febd1f16c73fde21b0e272aead63bdd1fb731bc2de862ca9e18f
-
Filesize
366KB
MD5d5239d7dc6e90961cabaf46fe967d368
SHA18e91da7d706158424d8a6c057bd7fdd10301dce5
SHA25643541fe3fcd0e34c2ea14274b39add09404b5121c4e878685c74eaf029b0ce93
SHA5126588c2370c92c18004ee766e380ec3f8457abf15bc85231bbb33f18b7f968f577a76b7976ac10942ed2ad3e11d29d3953f1d4248e1100cf363b738b3de0f3487
-
Filesize
366KB
MD5d5239d7dc6e90961cabaf46fe967d368
SHA18e91da7d706158424d8a6c057bd7fdd10301dce5
SHA25643541fe3fcd0e34c2ea14274b39add09404b5121c4e878685c74eaf029b0ce93
SHA5126588c2370c92c18004ee766e380ec3f8457abf15bc85231bbb33f18b7f968f577a76b7976ac10942ed2ad3e11d29d3953f1d4248e1100cf363b738b3de0f3487