Analysis
-
max time kernel
85s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 12:16
Static task
static1
Behavioral task
behavioral1
Sample
cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe
Resource
win10v2004-20230220-en
General
-
Target
cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe
-
Size
751KB
-
MD5
f721c15a98c02627aae70706e42882b6
-
SHA1
b1fa689a4f9e5e88b842ec5986e30782e4cddd4f
-
SHA256
cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d
-
SHA512
5e76150b151294bb2a6c769b4ac9952c14c3a8d7b9d4cb181f724851cfa303a5bab9f6c87062a772ca3642a8f2b7ab6e66ec8e98a6d66f1fa231df5818625259
-
SSDEEP
12288:F9+hlaQ6fT0YC+EwRi8Zc5yNlcDxc6hwYcUNLwEgbUt28ivEZgoxhvzzFM:yraQGIAEQi8ZcalwxZ+4gbUt28oEZ1vu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
Processes:
jr730788.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr730788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr730788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr730788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr730788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr730788.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr730788.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/1996-161-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-162-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-164-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-166-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-168-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-170-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-172-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-174-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-176-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-178-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-180-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-182-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-184-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-186-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-188-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-190-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-192-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-194-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-196-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-198-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-200-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-202-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-204-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-206-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-208-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-210-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-212-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-214-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-216-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-218-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-220-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/1996-222-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziHc7759.exejr730788.exeku364252.exelr921454.exepid process 1432 ziHc7759.exe 1900 jr730788.exe 1996 ku364252.exe 4100 lr921454.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr730788.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr730788.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exeziHc7759.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHc7759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHc7759.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 552 1996 WerFault.exe ku364252.exe 4144 2604 WerFault.exe cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr730788.exeku364252.exelr921454.exepid process 1900 jr730788.exe 1900 jr730788.exe 1996 ku364252.exe 1996 ku364252.exe 4100 lr921454.exe 4100 lr921454.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr730788.exeku364252.exelr921454.exedescription pid process Token: SeDebugPrivilege 1900 jr730788.exe Token: SeDebugPrivilege 1996 ku364252.exe Token: SeDebugPrivilege 4100 lr921454.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exeziHc7759.exedescription pid process target process PID 2604 wrote to memory of 1432 2604 cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe ziHc7759.exe PID 2604 wrote to memory of 1432 2604 cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe ziHc7759.exe PID 2604 wrote to memory of 1432 2604 cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe ziHc7759.exe PID 1432 wrote to memory of 1900 1432 ziHc7759.exe jr730788.exe PID 1432 wrote to memory of 1900 1432 ziHc7759.exe jr730788.exe PID 1432 wrote to memory of 1996 1432 ziHc7759.exe ku364252.exe PID 1432 wrote to memory of 1996 1432 ziHc7759.exe ku364252.exe PID 1432 wrote to memory of 1996 1432 ziHc7759.exe ku364252.exe PID 2604 wrote to memory of 4100 2604 cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe lr921454.exe PID 2604 wrote to memory of 4100 2604 cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe lr921454.exe PID 2604 wrote to memory of 4100 2604 cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe lr921454.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe"C:\Users\Admin\AppData\Local\Temp\cd80d176cccb5c89e3c2fd3e27f8e5d17b9215c1678641efee8a94882463f62d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHc7759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHc7759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730788.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364252.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364252.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 13284⤵
- Program crash
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr921454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr921454.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1322⤵
- Program crash
PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1996 -ip 19961⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2604 -ip 26041⤵PID:2448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr921454.exeFilesize
175KB
MD5591efc87ce3974863f97b3fb96d353c9
SHA1d71e0c0d137c7e7395b470c8110b389927d06537
SHA256e3223af8ae969b1135c01c0fe5860c2484054c755e91c04b1d6da4438e4ae5a5
SHA512eeee0be70e2eb30e8345e72ed0d352bcc218ebb709904056ada22e9595f74b6a154c9cc5fe6044e7ac46da7d18ea13b31ae036fa5fa962607fd972d7492b3b56
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr921454.exeFilesize
175KB
MD5591efc87ce3974863f97b3fb96d353c9
SHA1d71e0c0d137c7e7395b470c8110b389927d06537
SHA256e3223af8ae969b1135c01c0fe5860c2484054c755e91c04b1d6da4438e4ae5a5
SHA512eeee0be70e2eb30e8345e72ed0d352bcc218ebb709904056ada22e9595f74b6a154c9cc5fe6044e7ac46da7d18ea13b31ae036fa5fa962607fd972d7492b3b56
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHc7759.exeFilesize
420KB
MD56ca16a861ab5e7dac5b02e979ce6f81f
SHA192088493e05ed321cc9e800a72e33080aa85595f
SHA256cb363a673adb11c0bab2fc6df4b0beadfef43093c67d15573ba2baa4bc833d95
SHA512c4a5249b6044c51edcb9e87505defbe4fce7cca336a146a66e30c2c3f05a15108c4b808669666efebbd652b5e3366d7f86f490ef45ddbcc0a1fa162e7e237155
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHc7759.exeFilesize
420KB
MD56ca16a861ab5e7dac5b02e979ce6f81f
SHA192088493e05ed321cc9e800a72e33080aa85595f
SHA256cb363a673adb11c0bab2fc6df4b0beadfef43093c67d15573ba2baa4bc833d95
SHA512c4a5249b6044c51edcb9e87505defbe4fce7cca336a146a66e30c2c3f05a15108c4b808669666efebbd652b5e3366d7f86f490ef45ddbcc0a1fa162e7e237155
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730788.exeFilesize
11KB
MD5a5569b37458871722ce0ff1f5e954903
SHA1a5675df2a5c6056b17247679d2521f0a3304a46c
SHA256e0cbcc50748123d3a79365c770f4823dcc7586c0429ff0f3b06714c8cff3b20f
SHA512ab62d7b8b392a9cd88399f826ba6f4e6b6e591f902e13d718bc5a989f418770d7f7adb09f49d80ed2557221b70a879e0cd05a9715e2981bb23bd1cbbc8137431
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730788.exeFilesize
11KB
MD5a5569b37458871722ce0ff1f5e954903
SHA1a5675df2a5c6056b17247679d2521f0a3304a46c
SHA256e0cbcc50748123d3a79365c770f4823dcc7586c0429ff0f3b06714c8cff3b20f
SHA512ab62d7b8b392a9cd88399f826ba6f4e6b6e591f902e13d718bc5a989f418770d7f7adb09f49d80ed2557221b70a879e0cd05a9715e2981bb23bd1cbbc8137431
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364252.exeFilesize
406KB
MD5fd216b10901e4f0bfa6e51ca58e836f8
SHA10ca6da6af5eddfb944bcee13016e5f9d82254e5e
SHA25630694b600bc9b749d6200231c012ce8543402b907ec24871fc40ca094f0caad5
SHA512aea8beb778e5f11a5f69c3d8303bf76a7899e83c2acb7e8efa76324562363a3c423c74c274e3908023ccab3e7ddd20f4a2767617327f39321290a2113c1e1c83
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364252.exeFilesize
406KB
MD5fd216b10901e4f0bfa6e51ca58e836f8
SHA10ca6da6af5eddfb944bcee13016e5f9d82254e5e
SHA25630694b600bc9b749d6200231c012ce8543402b907ec24871fc40ca094f0caad5
SHA512aea8beb778e5f11a5f69c3d8303bf76a7899e83c2acb7e8efa76324562363a3c423c74c274e3908023ccab3e7ddd20f4a2767617327f39321290a2113c1e1c83
-
memory/1900-148-0x0000000000D20000-0x0000000000D2A000-memory.dmpFilesize
40KB
-
memory/1996-156-0x00000000071E0000-0x0000000007784000-memory.dmpFilesize
5.6MB
-
memory/1996-157-0x0000000002C70000-0x0000000002CBB000-memory.dmpFilesize
300KB
-
memory/1996-158-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-159-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-160-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-161-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-162-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-164-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-166-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-168-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-170-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-172-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-174-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-176-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-178-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-180-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-182-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-184-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-186-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-188-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-190-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-192-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-194-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-196-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-198-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-200-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-202-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-204-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-206-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-208-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-210-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-212-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-214-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-216-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-218-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-220-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-222-0x0000000007180000-0x00000000071BF000-memory.dmpFilesize
252KB
-
memory/1996-1067-0x00000000078E0000-0x0000000007EF8000-memory.dmpFilesize
6.1MB
-
memory/1996-1068-0x0000000007F80000-0x000000000808A000-memory.dmpFilesize
1.0MB
-
memory/1996-1069-0x00000000080C0000-0x00000000080D2000-memory.dmpFilesize
72KB
-
memory/1996-1070-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-1071-0x00000000080E0000-0x000000000811C000-memory.dmpFilesize
240KB
-
memory/1996-1074-0x00000000083D0000-0x0000000008436000-memory.dmpFilesize
408KB
-
memory/1996-1075-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/1996-1076-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-1077-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-1078-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-1079-0x0000000008DD0000-0x0000000008F92000-memory.dmpFilesize
1.8MB
-
memory/1996-1080-0x0000000008FB0000-0x00000000094DC000-memory.dmpFilesize
5.2MB
-
memory/1996-1081-0x00000000071D0000-0x00000000071E0000-memory.dmpFilesize
64KB
-
memory/1996-1082-0x0000000006C70000-0x0000000006CE6000-memory.dmpFilesize
472KB
-
memory/1996-1083-0x000000000A7A0000-0x000000000A7F0000-memory.dmpFilesize
320KB
-
memory/2604-149-0x00000000048E0000-0x000000000496E000-memory.dmpFilesize
568KB
-
memory/2604-150-0x0000000000400000-0x0000000002BE9000-memory.dmpFilesize
39.9MB
-
memory/4100-1090-0x0000000000900000-0x0000000000932000-memory.dmpFilesize
200KB
-
memory/4100-1091-0x0000000005550000-0x0000000005560000-memory.dmpFilesize
64KB