Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:46
Static task
static1
Behavioral task
behavioral1
Sample
7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe
Resource
win10v2004-20230220-en
General
-
Target
7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe
-
Size
700KB
-
MD5
3cee1f649d7bd84aebd89d6f92447439
-
SHA1
9327f6d47e060c6d0bb29e062d50db9f2afd595e
-
SHA256
7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6
-
SHA512
91c6d4ca96c543b53280c4da7ee7a737c7c7078d8a2c1f59ef2a7ad19a6f5880adb26b0ee92d4308b53d432403cf7f72d69267918de131e28822ed8e36b324f2
-
SSDEEP
12288:jMr5y90aFq7kuuwvXqroMxIAtqmnqKu6BqxY2jO+cJBRvLYbguNLEUoEd:iyPF7uQI0DqGBqO+cJIbguNQw
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3204.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1900-190-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-191-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-193-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-195-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-197-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-199-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-201-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-205-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-209-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-211-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-213-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-215-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-217-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-219-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-221-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-223-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-225-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline behavioral1/memory/1900-227-0x00000000052B0000-0x00000000052EE000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 2572 un241413.exe 3712 pro3204.exe 1900 qu5920.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3204.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un241413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un241413.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3476 3712 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3712 pro3204.exe 3712 pro3204.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3712 pro3204.exe Token: SeDebugPrivilege 1900 qu5920.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2572 2056 7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe 85 PID 2056 wrote to memory of 2572 2056 7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe 85 PID 2056 wrote to memory of 2572 2056 7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe 85 PID 2572 wrote to memory of 3712 2572 un241413.exe 86 PID 2572 wrote to memory of 3712 2572 un241413.exe 86 PID 2572 wrote to memory of 3712 2572 un241413.exe 86 PID 2572 wrote to memory of 1900 2572 un241413.exe 94 PID 2572 wrote to memory of 1900 2572 un241413.exe 94 PID 2572 wrote to memory of 1900 2572 un241413.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe"C:\Users\Admin\AppData\Local\Temp\7aeba6bb3ecf7dc23027590b7298072336b72728e3c24c587ae516b272c186b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241413.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 10844⤵
- Program crash
PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5920.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3712 -ip 37121⤵PID:3952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD55d50e7e5c8bb7cb25c02767f5ee8ef15
SHA18c27f511865acf52c306d7d9cc5fc6b568ff9a13
SHA256285e1378e35eeaac7833951277fb97101e50504aa7559a4669edf654ab70d2b7
SHA512b654527e3ea268ccf54186b94cdfc0165dba16230ee658303ca6eaf1c889a18dc3a6b384a25270486599f5602cb0e6d71140af75a65e999084253a0cadb8d56d
-
Filesize
558KB
MD55d50e7e5c8bb7cb25c02767f5ee8ef15
SHA18c27f511865acf52c306d7d9cc5fc6b568ff9a13
SHA256285e1378e35eeaac7833951277fb97101e50504aa7559a4669edf654ab70d2b7
SHA512b654527e3ea268ccf54186b94cdfc0165dba16230ee658303ca6eaf1c889a18dc3a6b384a25270486599f5602cb0e6d71140af75a65e999084253a0cadb8d56d
-
Filesize
308KB
MD562b57b6f461db5c4dfd7365d774d4b93
SHA11704d0cf64718eba08377c1f0ad4727005c679e4
SHA256de2a926f35a5300cf402f1773b5237c3a8535dd480b5f9d2146a722494c279b0
SHA51289388e3a3640b896fde17e5ca2f1fb7b2e20c642877f286468014bc9b72754b9378e150cd521b1e800634aa35966f499efc207e65cdaf03ea479e2b9051ae47a
-
Filesize
308KB
MD562b57b6f461db5c4dfd7365d774d4b93
SHA11704d0cf64718eba08377c1f0ad4727005c679e4
SHA256de2a926f35a5300cf402f1773b5237c3a8535dd480b5f9d2146a722494c279b0
SHA51289388e3a3640b896fde17e5ca2f1fb7b2e20c642877f286468014bc9b72754b9378e150cd521b1e800634aa35966f499efc207e65cdaf03ea479e2b9051ae47a
-
Filesize
366KB
MD50ab45943da29733d011c620700d2fa6b
SHA187d4bdd1141bb0997a8ce2822e8d4900033724c6
SHA256d4fa9617624126ac3a0081e118822e250f7146636b541b7f0d553141cc4de9ed
SHA51290621881e0f3c71f1534b73fbc5ce5e190dc80b26f5adbbf090af2549838a7bafb4e1f38d920a268133691b9ad18fcec26ef7b01567974bb084cbf4742e7a117
-
Filesize
366KB
MD50ab45943da29733d011c620700d2fa6b
SHA187d4bdd1141bb0997a8ce2822e8d4900033724c6
SHA256d4fa9617624126ac3a0081e118822e250f7146636b541b7f0d553141cc4de9ed
SHA51290621881e0f3c71f1534b73fbc5ce5e190dc80b26f5adbbf090af2549838a7bafb4e1f38d920a268133691b9ad18fcec26ef7b01567974bb084cbf4742e7a117