Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 16:48
Static task
static1
Behavioral task
behavioral1
Sample
2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe
Resource
win10v2004-20230220-en
General
-
Target
2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe
-
Size
699KB
-
MD5
aeac819d00e1da56cad01200e5d4df0a
-
SHA1
0c2b466a4bf1f6a94e327b365ddf3c8d3981a81a
-
SHA256
2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1
-
SHA512
f46a26921cd20d65e6cb1c469e64bfa42af0b0b5e3a74430ac435beb0c4d187a0004c4f00260596e16b8d719ee76e87ef959e6014ed1742d910924158e5179c1
-
SSDEEP
12288:EMrly904MSn6iXzBychHMmXZeUZjukHvYEmXfBRvKw8uY9jj6hX:Ry5nzcchs2ZjZZHvHmXf+9f6hX
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9974.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9974.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4432-194-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-192-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-197-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-199-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-201-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-203-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-205-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-207-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-209-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-211-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-213-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-215-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-217-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-219-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-221-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-223-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-225-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/4432-227-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 3208 un991555.exe 3236 pro9974.exe 4432 qu8823.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9974.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un991555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un991555.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2656 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3752 3236 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3236 pro9974.exe 3236 pro9974.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3236 pro9974.exe Token: SeDebugPrivilege 4432 qu8823.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3208 2764 2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe 85 PID 2764 wrote to memory of 3208 2764 2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe 85 PID 2764 wrote to memory of 3208 2764 2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe 85 PID 3208 wrote to memory of 3236 3208 un991555.exe 86 PID 3208 wrote to memory of 3236 3208 un991555.exe 86 PID 3208 wrote to memory of 3236 3208 un991555.exe 86 PID 3208 wrote to memory of 4432 3208 un991555.exe 92 PID 3208 wrote to memory of 4432 3208 un991555.exe 92 PID 3208 wrote to memory of 4432 3208 un991555.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe"C:\Users\Admin\AppData\Local\Temp\2d97ef5189f9c04df861b3746856e293f96b59f1b6f4b6901735140af66aeff1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991555.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9974.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 10844⤵
- Program crash
PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8823.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3236 -ip 32361⤵PID:1232
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD57f40f39f04905f2e8928490b7483c1a5
SHA1943cec68b052e875ddabd0fe766fe5b0d442cd9d
SHA2562ef130640859ca8888e5c4168de2f9ff89a1e430bda1fd6dcb1201f913172325
SHA51248de8dfc8643e0ed2339292c21959a8437682e9bdd354a66a1545a4ccac7327b068fb08cd6bfb11bdbd016717cf9d6566a95107752b6baa589f3f9b225c12693
-
Filesize
558KB
MD57f40f39f04905f2e8928490b7483c1a5
SHA1943cec68b052e875ddabd0fe766fe5b0d442cd9d
SHA2562ef130640859ca8888e5c4168de2f9ff89a1e430bda1fd6dcb1201f913172325
SHA51248de8dfc8643e0ed2339292c21959a8437682e9bdd354a66a1545a4ccac7327b068fb08cd6bfb11bdbd016717cf9d6566a95107752b6baa589f3f9b225c12693
-
Filesize
308KB
MD5c55b40435d9b1d53e9126767d9eef0e1
SHA1ebbc622bf1415079af511310f1a74d399192a885
SHA2569d091478bd41051bae766ba1655f13cd5485dc9dea308f4d06ee726800638586
SHA5129fdbc75a97a2af87d0583bd0df98fcec97d1494cd124eb8bcb96260913affcafc8d026cf780943147dc64c7209268e1f48cdba70209ab0c95e4b98ae71cce469
-
Filesize
308KB
MD5c55b40435d9b1d53e9126767d9eef0e1
SHA1ebbc622bf1415079af511310f1a74d399192a885
SHA2569d091478bd41051bae766ba1655f13cd5485dc9dea308f4d06ee726800638586
SHA5129fdbc75a97a2af87d0583bd0df98fcec97d1494cd124eb8bcb96260913affcafc8d026cf780943147dc64c7209268e1f48cdba70209ab0c95e4b98ae71cce469
-
Filesize
366KB
MD57b2e711566856fa975073a03cf120b05
SHA10d1337b163ba5776b8e03d6869357b39ee455ced
SHA2567fdcded3e68dcc8ed4f2da055b9843f1578dc497b8ca0723e5ebaa120da1a85b
SHA512c9dcb708e738d609228a10d2ed3c1c5d3c3e8fb71430764f17884987f2d3a1f996370eb26b89093be6cabfa327514a526ece686364f41ac40e919a7af55aed44
-
Filesize
366KB
MD57b2e711566856fa975073a03cf120b05
SHA10d1337b163ba5776b8e03d6869357b39ee455ced
SHA2567fdcded3e68dcc8ed4f2da055b9843f1578dc497b8ca0723e5ebaa120da1a85b
SHA512c9dcb708e738d609228a10d2ed3c1c5d3c3e8fb71430764f17884987f2d3a1f996370eb26b89093be6cabfa327514a526ece686364f41ac40e919a7af55aed44