Analysis
-
max time kernel
22s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 10:44
Static task
static1
Behavioral task
behavioral1
Sample
86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe
Resource
win10v2004-20230220-en
General
-
Target
86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe
-
Size
697KB
-
MD5
7aa2b85a1c85f1d54c81fc54c2703bae
-
SHA1
153c0fbf16cc1afc794c98bb97a306208189d62a
-
SHA256
86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb
-
SHA512
70330026e3e152438753a47c07c45c3f76530b35b9855f101ff68e4d32c14ac95f46f00f80ade6fabe5c36ca1849b07203e4735ae5ac1caf865246269c331eeb
-
SSDEEP
12288:kMrky90CcA3VYH2KhR0jdZViGPHv88M3FgPL64jGjUAxI9gymv3Xg:QyTYHrqBZVNvv88QKrGjtI9hy3Q
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Processes:
pro7955.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7955.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2400-191-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-193-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-198-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-200-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-202-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-204-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-206-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-208-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-210-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-214-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-212-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-216-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-218-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-220-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-222-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-224-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-226-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2400-228-0x0000000007160000-0x000000000719F000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
un503702.exepro7955.exequ6712.exepid process 3184 un503702.exe 532 pro7955.exe 2400 qu6712.exe -
Processes:
pro7955.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7955.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7955.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exeun503702.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un503702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un503702.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3304 532 WerFault.exe pro7955.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7955.exepid process 532 pro7955.exe 532 pro7955.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7955.exequ6712.exedescription pid process Token: SeDebugPrivilege 532 pro7955.exe Token: SeDebugPrivilege 2400 qu6712.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exeun503702.exedescription pid process target process PID 4752 wrote to memory of 3184 4752 86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe un503702.exe PID 4752 wrote to memory of 3184 4752 86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe un503702.exe PID 4752 wrote to memory of 3184 4752 86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe un503702.exe PID 3184 wrote to memory of 532 3184 un503702.exe pro7955.exe PID 3184 wrote to memory of 532 3184 un503702.exe pro7955.exe PID 3184 wrote to memory of 532 3184 un503702.exe pro7955.exe PID 3184 wrote to memory of 2400 3184 un503702.exe qu6712.exe PID 3184 wrote to memory of 2400 3184 un503702.exe qu6712.exe PID 3184 wrote to memory of 2400 3184 un503702.exe qu6712.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe"C:\Users\Admin\AppData\Local\Temp\86f6fe092085165c3bcf8514074d22ded445641ea33cc3a22a018819719eecbb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un503702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un503702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 10644⤵
- Program crash
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6712.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 532 -ip 5321⤵PID:4652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un503702.exeFilesize
555KB
MD593a4ffd7e724f7ca2cff6dbfa31b25dd
SHA10bcd0babd6a9cccb78840a2255004938c1fc3097
SHA256d03f93e2ade1da3d1f20e2a971a0a2f6befd433f55309913a1c6996e53447271
SHA51265ec550d9c797fb41b34da4a68a72ad24da853c562401b3d63a87e3529414de7f722b874c8292d82a1bbec3cea0d0b003bbd64a48e9faf9a243c1bd2347fe1c8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un503702.exeFilesize
555KB
MD593a4ffd7e724f7ca2cff6dbfa31b25dd
SHA10bcd0babd6a9cccb78840a2255004938c1fc3097
SHA256d03f93e2ade1da3d1f20e2a971a0a2f6befd433f55309913a1c6996e53447271
SHA51265ec550d9c797fb41b34da4a68a72ad24da853c562401b3d63a87e3529414de7f722b874c8292d82a1bbec3cea0d0b003bbd64a48e9faf9a243c1bd2347fe1c8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7955.exeFilesize
347KB
MD5e38e423fffd41bd430b8a2ba8d4158a4
SHA11f2d051fab148869b5ce0e9c4c41560c9252ae19
SHA2568ee0bee14c02e605b74b2643d1bbbe78ddedd3cb81d618fefa3179c2a45e95ff
SHA5125bd668aabc2de8367d88f05c16d0ac0a89f6bf056f8910f91d432051bbff388a870baf8bab1e5f1573d2992928a6c69273c5a20c257412edb47d905468b7ddfd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7955.exeFilesize
347KB
MD5e38e423fffd41bd430b8a2ba8d4158a4
SHA11f2d051fab148869b5ce0e9c4c41560c9252ae19
SHA2568ee0bee14c02e605b74b2643d1bbbe78ddedd3cb81d618fefa3179c2a45e95ff
SHA5125bd668aabc2de8367d88f05c16d0ac0a89f6bf056f8910f91d432051bbff388a870baf8bab1e5f1573d2992928a6c69273c5a20c257412edb47d905468b7ddfd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6712.exeFilesize
406KB
MD55ee9be8c8b1c0bbb39f7d6f254d6114c
SHA182078998a4e3b89581b60e71709af5b6fb917902
SHA256c8e604a425673619528dd073808c3327cb536389468cb98feb3fbf70996dd75d
SHA512d63052a403d98689adcb24a31180fcafd6fa507812685247b25f7ae643ae849be7fad8546a2ca2599b931766c551e738dc7c1396328b10c856d0379b08871770
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6712.exeFilesize
406KB
MD55ee9be8c8b1c0bbb39f7d6f254d6114c
SHA182078998a4e3b89581b60e71709af5b6fb917902
SHA256c8e604a425673619528dd073808c3327cb536389468cb98feb3fbf70996dd75d
SHA512d63052a403d98689adcb24a31180fcafd6fa507812685247b25f7ae643ae849be7fad8546a2ca2599b931766c551e738dc7c1396328b10c856d0379b08871770
-
memory/532-149-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/532-148-0x0000000002D90000-0x0000000002DBD000-memory.dmpFilesize
180KB
-
memory/532-150-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/532-151-0x00000000073A0000-0x0000000007944000-memory.dmpFilesize
5.6MB
-
memory/532-152-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-153-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-155-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-157-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-159-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-161-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-163-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-165-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-167-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-169-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-171-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-173-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-175-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-177-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-179-0x0000000007230000-0x0000000007242000-memory.dmpFilesize
72KB
-
memory/532-180-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/532-181-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/532-182-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/532-183-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/532-185-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/532-186-0x0000000000400000-0x0000000002B84000-memory.dmpFilesize
39.5MB
-
memory/2400-191-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-192-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/2400-195-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2400-194-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2400-193-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-198-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-197-0x00000000072C0000-0x00000000072D0000-memory.dmpFilesize
64KB
-
memory/2400-200-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-202-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-204-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-206-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-208-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-210-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-214-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-212-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-216-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-218-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-220-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-222-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-224-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-226-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB
-
memory/2400-228-0x0000000007160000-0x000000000719F000-memory.dmpFilesize
252KB