Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:49
Static task
static1
Behavioral task
behavioral1
Sample
3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe
Resource
win10v2004-20230220-en
General
-
Target
3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe
-
Size
700KB
-
MD5
0357bd3a5161c1a7a9687d2ba13c5acd
-
SHA1
0989240e30aed118b0ae6cd8645d9d599e845622
-
SHA256
3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5
-
SHA512
de788e722b89f7e66da7a35b40c9ffd035cd9250216d29c75376b1b2b22e1e0d52b9adbbff2ce702a56a53a490d29e078a8fbc06302c676f3a2165b2e3b3e3b9
-
SSDEEP
12288:zMrcy90L2zfEYewYAI78Alq4IRG8ByvzJGOLkVf6FBRvnXbuUjgnHvLf/:/y4pYxYAs8E+GrtGOoZ6FdeHD3
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9133.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4044-192-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-193-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-195-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-197-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-199-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-201-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-203-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-205-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-207-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-209-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-211-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-213-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-215-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-217-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-219-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-221-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-223-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline behavioral1/memory/4044-225-0x0000000002690000-0x00000000026CE000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4624 un935666.exe 4996 pro9133.exe 4044 qu7867.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9133.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un935666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un935666.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4552 4996 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4996 pro9133.exe 4996 pro9133.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4996 pro9133.exe Token: SeDebugPrivilege 4044 qu7867.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3216 wrote to memory of 4624 3216 3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe 84 PID 3216 wrote to memory of 4624 3216 3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe 84 PID 3216 wrote to memory of 4624 3216 3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe 84 PID 4624 wrote to memory of 4996 4624 un935666.exe 85 PID 4624 wrote to memory of 4996 4624 un935666.exe 85 PID 4624 wrote to memory of 4996 4624 un935666.exe 85 PID 4624 wrote to memory of 4044 4624 un935666.exe 88 PID 4624 wrote to memory of 4044 4624 un935666.exe 88 PID 4624 wrote to memory of 4044 4624 un935666.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe"C:\Users\Admin\AppData\Local\Temp\3096a4e4556fbb5a916d81fcffc69a9d43cf4cf695ddf42b691493997c00f6e5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un935666.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un935666.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9133.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 10924⤵
- Program crash
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7867.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4996 -ip 49961⤵PID:2328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5569b1280c4d8bb9284320b50448caa97
SHA11e50549ec29be34911bb1a6b34689b1231a1c54d
SHA25621a0138fdf62a096f1e728d628a8ec5db70dc0a35e0388863bc20c3db57fd998
SHA51208de6314cedbecbb7f62b859bfbdfc29104fc3c9e49ee70b5ab3aabc313d04493054ea92a83157f0294e5beae2b3d0533f55a1833c45c30d66865452c4c5a78e
-
Filesize
557KB
MD5569b1280c4d8bb9284320b50448caa97
SHA11e50549ec29be34911bb1a6b34689b1231a1c54d
SHA25621a0138fdf62a096f1e728d628a8ec5db70dc0a35e0388863bc20c3db57fd998
SHA51208de6314cedbecbb7f62b859bfbdfc29104fc3c9e49ee70b5ab3aabc313d04493054ea92a83157f0294e5beae2b3d0533f55a1833c45c30d66865452c4c5a78e
-
Filesize
308KB
MD5d8946fd1b20738afc0d92ebb6c3139e6
SHA1723f00dac5eb8c0ace19bbe0ed7c9b1fac176f3a
SHA25689c933dccde049421b1d1aec4b5930b309babd06256bf881c80becef323239f8
SHA5120cfa5af7d2d3dcc264399d6e29d33644d19543e537d2bb5b624cfde44324ed68c8f6238e71f0d74eb43a2496857dfc655f2370cb2f125fedd5781258ef5929d8
-
Filesize
308KB
MD5d8946fd1b20738afc0d92ebb6c3139e6
SHA1723f00dac5eb8c0ace19bbe0ed7c9b1fac176f3a
SHA25689c933dccde049421b1d1aec4b5930b309babd06256bf881c80becef323239f8
SHA5120cfa5af7d2d3dcc264399d6e29d33644d19543e537d2bb5b624cfde44324ed68c8f6238e71f0d74eb43a2496857dfc655f2370cb2f125fedd5781258ef5929d8
-
Filesize
366KB
MD5f1a40834ff374289e8542875a357030c
SHA1c1f212e6cb9de155c35ff677b4323aaac2d11ae4
SHA256e2c132a855b9cea40b1684c72071da5477a85000e448cc88d7f98cbb2e203c02
SHA512e89d9b4d4f34624181391726998124cd01eab528a619e73b9f4af55d2c6699018c03fed9852df973d17bebd01dd7f4b816d6ba35d10d49b4b4033e316335c37f
-
Filesize
366KB
MD5f1a40834ff374289e8542875a357030c
SHA1c1f212e6cb9de155c35ff677b4323aaac2d11ae4
SHA256e2c132a855b9cea40b1684c72071da5477a85000e448cc88d7f98cbb2e203c02
SHA512e89d9b4d4f34624181391726998124cd01eab528a619e73b9f4af55d2c6699018c03fed9852df973d17bebd01dd7f4b816d6ba35d10d49b4b4033e316335c37f