Analysis
-
max time kernel
22s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 11:36
Static task
static1
Behavioral task
behavioral1
Sample
03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe
Resource
win10v2004-20230220-en
General
-
Target
03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe
-
Size
696KB
-
MD5
dd9b35d755f5802dc0478d284cd2a91b
-
SHA1
5fa02181e26973c91f853a5ef17d0d5c9b70e0c0
-
SHA256
03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a
-
SHA512
1aadb0e0e3d8ac0d9d3f62509792d9ab69cc5f4b2f53087a9449cd0a5512a8538767117de7d215328c5877e50de6d1e30238d5ddbb14edfcc6cc2be14b202b92
-
SSDEEP
12288:WMrVy90S7tU76YqZZhrp/Y/x8Pbq77JvwCJXL6kWGjJAxI9gcy5nci:ryFto6YqZHExMO3mCpYGjCI9Rti
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Processes:
pro9360.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9360.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9360.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/4152-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-202-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-206-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4152-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
un897306.exepro9360.exequ7772.exepid process 2920 un897306.exe 3536 pro9360.exe 4152 qu7772.exe -
Processes:
pro9360.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9360.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un897306.exe03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un897306.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un897306.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1572 3536 WerFault.exe pro9360.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9360.exepid process 3536 pro9360.exe 3536 pro9360.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9360.exequ7772.exedescription pid process Token: SeDebugPrivilege 3536 pro9360.exe Token: SeDebugPrivilege 4152 qu7772.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exeun897306.exedescription pid process target process PID 2544 wrote to memory of 2920 2544 03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe un897306.exe PID 2544 wrote to memory of 2920 2544 03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe un897306.exe PID 2544 wrote to memory of 2920 2544 03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe un897306.exe PID 2920 wrote to memory of 3536 2920 un897306.exe pro9360.exe PID 2920 wrote to memory of 3536 2920 un897306.exe pro9360.exe PID 2920 wrote to memory of 3536 2920 un897306.exe pro9360.exe PID 2920 wrote to memory of 4152 2920 un897306.exe qu7772.exe PID 2920 wrote to memory of 4152 2920 un897306.exe qu7772.exe PID 2920 wrote to memory of 4152 2920 un897306.exe qu7772.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe"C:\Users\Admin\AppData\Local\Temp\03eac5f268888368a3e20f41ce36f1eb17647646ea0c79080a0be9023911383a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un897306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un897306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9360.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 10804⤵
- Program crash
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7772.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7772.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3536 -ip 35361⤵PID:5072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
555KB
MD51dd1539ce1473ae83858e195da349d04
SHA1f56a13725e88a1d1ee886c6525dd2ea208fe2a87
SHA256e98ddd50f1ea3fd4ddcc6dee3c196dff5f0556797a0bffef46f30a3acb8e92ad
SHA512d3460f8b08637296a77c43d94a75381fed0c3ba4aa07ed829df9cfbac9936dd5ae5e48fc8e9dc72c8ee5581f50e894809b2d932e990acaf4c0d62f9b76d21342
-
Filesize
555KB
MD51dd1539ce1473ae83858e195da349d04
SHA1f56a13725e88a1d1ee886c6525dd2ea208fe2a87
SHA256e98ddd50f1ea3fd4ddcc6dee3c196dff5f0556797a0bffef46f30a3acb8e92ad
SHA512d3460f8b08637296a77c43d94a75381fed0c3ba4aa07ed829df9cfbac9936dd5ae5e48fc8e9dc72c8ee5581f50e894809b2d932e990acaf4c0d62f9b76d21342
-
Filesize
347KB
MD5c6ac14b25c17c4befb6cc61f240d022b
SHA1ad924ed17e121237550efc79b6731074b519b651
SHA2569922833ca2982f1ca392c4605280fbb5bc9f17f97548f06b5b8207713d44305c
SHA512af279e8ee42d2e7a5200d5f32740ecdf0807b87be300763f73a69780b0413666b4e077fa959566f29dd6ee272620168ca6b1d3e4e41eb8ff8a16a8e6b1d521e7
-
Filesize
347KB
MD5c6ac14b25c17c4befb6cc61f240d022b
SHA1ad924ed17e121237550efc79b6731074b519b651
SHA2569922833ca2982f1ca392c4605280fbb5bc9f17f97548f06b5b8207713d44305c
SHA512af279e8ee42d2e7a5200d5f32740ecdf0807b87be300763f73a69780b0413666b4e077fa959566f29dd6ee272620168ca6b1d3e4e41eb8ff8a16a8e6b1d521e7
-
Filesize
406KB
MD550eb0d09131f21c7fe28729de2c94b01
SHA15af5ed58cd3a70b10f062f808f0c08a1edfd01dd
SHA25609b2edf636d356b74dceadd5eaa50e31b508e70e0ccb7673dc336962af04a952
SHA512b525b38612aa4863305eac1dad7ef07d36fdbc36edc1447a1f3e34c2ddca6418683d7f42fd552f247e0babc235cf8a9f226853a0eb00d99276e2df534c727e6a
-
Filesize
406KB
MD550eb0d09131f21c7fe28729de2c94b01
SHA15af5ed58cd3a70b10f062f808f0c08a1edfd01dd
SHA25609b2edf636d356b74dceadd5eaa50e31b508e70e0ccb7673dc336962af04a952
SHA512b525b38612aa4863305eac1dad7ef07d36fdbc36edc1447a1f3e34c2ddca6418683d7f42fd552f247e0babc235cf8a9f226853a0eb00d99276e2df534c727e6a