Analysis
-
max time kernel
125s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
0a8b8d973e5bc3013679d46fb4aea58f_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a8b8d973e5bc3013679d46fb4aea58f_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
0a8b8d973e5bc3013679d46fb4aea58f_JC.exe
-
Size
673KB
-
MD5
0a8b8d973e5bc3013679d46fb4aea58f
-
SHA1
35225e42638b7ef9a47ae8dec21760c8af02cf83
-
SHA256
4c8cc476763730d7e0df2e04e2d2aafa7aeacf0f74caa8f1cb9021f6981719fa
-
SHA512
2997926633129db5bd4f40b7d514f9210d731ce83941437f376965845ca13b5057f58af7591c6dd56307c21b4fa2a92da9483b364592a43e916b17fc0a00d4c4
-
SSDEEP
12288:gMrLy90XrSfd4Vb9E+GloEGnV1ewp23rCmIdsDSgzSZgvD2U:byrW4yEGfa7CmIK2hgvD2U
Malware Config
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9941930.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9941930.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9941930.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9941930.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9941930.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9941930.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1036 v3355938.exe 2500 v8076540.exe 3156 a9941930.exe 2580 b4550649.exe 4796 c9897633.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9941930.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9941930.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3355938.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8076540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a8b8d973e5bc3013679d46fb4aea58f_JC.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3096 3156 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3156 a9941930.exe 3156 a9941930.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3156 a9941930.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3356 wrote to memory of 1036 3356 0a8b8d973e5bc3013679d46fb4aea58f_JC.exe 85 PID 3356 wrote to memory of 1036 3356 0a8b8d973e5bc3013679d46fb4aea58f_JC.exe 85 PID 3356 wrote to memory of 1036 3356 0a8b8d973e5bc3013679d46fb4aea58f_JC.exe 85 PID 1036 wrote to memory of 2500 1036 v3355938.exe 87 PID 1036 wrote to memory of 2500 1036 v3355938.exe 87 PID 1036 wrote to memory of 2500 1036 v3355938.exe 87 PID 2500 wrote to memory of 3156 2500 v8076540.exe 88 PID 2500 wrote to memory of 3156 2500 v8076540.exe 88 PID 2500 wrote to memory of 3156 2500 v8076540.exe 88 PID 2500 wrote to memory of 2580 2500 v8076540.exe 93 PID 2500 wrote to memory of 2580 2500 v8076540.exe 93 PID 2500 wrote to memory of 2580 2500 v8076540.exe 93 PID 1036 wrote to memory of 4796 1036 v3355938.exe 94 PID 1036 wrote to memory of 4796 1036 v3355938.exe 94 PID 1036 wrote to memory of 4796 1036 v3355938.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a8b8d973e5bc3013679d46fb4aea58f_JC.exe"C:\Users\Admin\AppData\Local\Temp\0a8b8d973e5bc3013679d46fb4aea58f_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3355938.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3355938.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8076540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8076540.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9941930.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9941930.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 10805⤵
- Program crash
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4550649.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4550649.exe4⤵
- Executes dropped EXE
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9897633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9897633.exe3⤵
- Executes dropped EXE
PID:4796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3156 -ip 31561⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5d94ed5db2d743724efe3028dc601bee6
SHA1234bec2c4e5ec6e67bb2db061a4c03a3ab68b0d7
SHA256bad657e36efe871f47fc33de3c38316dfc34b1b1837f4d751123cb00308391aa
SHA512cc426edec0d5e0893a71573b8dff7966d27352ce0126c3a565e8d9e6ce7e6754e9a35095c587ee87727cdc28c4f4443933db885383c4346e15067db829d2ebe8
-
Filesize
548KB
MD5d94ed5db2d743724efe3028dc601bee6
SHA1234bec2c4e5ec6e67bb2db061a4c03a3ab68b0d7
SHA256bad657e36efe871f47fc33de3c38316dfc34b1b1837f4d751123cb00308391aa
SHA512cc426edec0d5e0893a71573b8dff7966d27352ce0126c3a565e8d9e6ce7e6754e9a35095c587ee87727cdc28c4f4443933db885383c4346e15067db829d2ebe8
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
392KB
MD5d25a1ea6ae1f7dad28b4ff5993da27cf
SHA18366f054194dda1a8e45cdf260371c646ad722d8
SHA256685966020bd79ca657726dea6cff8051529c2b2d042d70c22538b3fe887383f4
SHA51297943019967e12408a61665297dd8efe33a154b977b57d336873e0c7af5814654c21a600f3126213c203a030b3a9a600c493d4c12695c0e614e2f009f46119ed
-
Filesize
392KB
MD5d25a1ea6ae1f7dad28b4ff5993da27cf
SHA18366f054194dda1a8e45cdf260371c646ad722d8
SHA256685966020bd79ca657726dea6cff8051529c2b2d042d70c22538b3fe887383f4
SHA51297943019967e12408a61665297dd8efe33a154b977b57d336873e0c7af5814654c21a600f3126213c203a030b3a9a600c493d4c12695c0e614e2f009f46119ed
-
Filesize
273KB
MD505e7e2d0f0e63469b8e5c58bc11d25a8
SHA143f7ac49259d9551298d806d6e33bff18744a970
SHA2561487cdcb04df170a3a5b50d864bda4248892a299b02e72a6c8762f5fac2549de
SHA51266106b54757b39ef90198fe27987acfbd1f7e383fca7a05f228afb0bfb9c1d60d53c0bd1804bdec494c6f88804dbb415ef0f2ce8ea45f0128fe03f2a86414586
-
Filesize
273KB
MD505e7e2d0f0e63469b8e5c58bc11d25a8
SHA143f7ac49259d9551298d806d6e33bff18744a970
SHA2561487cdcb04df170a3a5b50d864bda4248892a299b02e72a6c8762f5fac2549de
SHA51266106b54757b39ef90198fe27987acfbd1f7e383fca7a05f228afb0bfb9c1d60d53c0bd1804bdec494c6f88804dbb415ef0f2ce8ea45f0128fe03f2a86414586
-
Filesize
140KB
MD504cba969879eb44387e53ed42f474ffc
SHA15232c20370e125f0bb1f5bdd858253f492125483
SHA256119c842d3037762fc6de08df5927d13b70055dcbaa9b08813b8b699cca05ae4a
SHA512946da0fc06917a482c0fa41af6706dcf1a87ff926c3a765e4bb9bc90479bc682ea16d325cf66877505514b5a5e2f08e700bfa5a050fc986b76e4163370672dc8
-
Filesize
140KB
MD504cba969879eb44387e53ed42f474ffc
SHA15232c20370e125f0bb1f5bdd858253f492125483
SHA256119c842d3037762fc6de08df5927d13b70055dcbaa9b08813b8b699cca05ae4a
SHA512946da0fc06917a482c0fa41af6706dcf1a87ff926c3a765e4bb9bc90479bc682ea16d325cf66877505514b5a5e2f08e700bfa5a050fc986b76e4163370672dc8