Analysis
-
max time kernel
84s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:33
Static task
static1
Behavioral task
behavioral1
Sample
840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe
Resource
win10v2004-20230220-en
General
-
Target
840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe
-
Size
534KB
-
MD5
0e40e163ec409c652b4191b35ca0c3aa
-
SHA1
eaec658dcbd20d2d87a7d9e070872fe8abbc3d98
-
SHA256
840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b
-
SHA512
3033298d0328deaf1ad448489d4b505faa1f9af425ee9ab2e4db6f24a168a3dfcdf108c38c2d45c1b3b9b3d268ad16f40dce951037a28e9f17f7ba63190e4a40
-
SSDEEP
12288:wMr9y90/JQ01AeeReWMhObPrw8MuzIAiu+td7U:dy6KLbs8MA7JeU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr201994.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr201994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr201994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr201994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr201994.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr201994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr201994.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/4116-155-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-156-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-158-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-160-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-162-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-164-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-170-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-168-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-172-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-166-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-174-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-176-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-178-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-180-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-186-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-184-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-188-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-182-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-190-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-197-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-201-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-205-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-215-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-217-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-213-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-219-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-221-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-211-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-209-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-207-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-203-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-199-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-194-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/4116-1073-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zicS9362.exejr201994.exeku364680.exelr753654.exepid process 4012 zicS9362.exe 2752 jr201994.exe 4116 ku364680.exe 3408 lr753654.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr201994.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr201994.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zicS9362.exe840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zicS9362.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zicS9362.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3596 4116 WerFault.exe ku364680.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr201994.exeku364680.exelr753654.exepid process 2752 jr201994.exe 2752 jr201994.exe 4116 ku364680.exe 4116 ku364680.exe 3408 lr753654.exe 3408 lr753654.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr201994.exeku364680.exelr753654.exedescription pid process Token: SeDebugPrivilege 2752 jr201994.exe Token: SeDebugPrivilege 4116 ku364680.exe Token: SeDebugPrivilege 3408 lr753654.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exezicS9362.exedescription pid process target process PID 2820 wrote to memory of 4012 2820 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe zicS9362.exe PID 2820 wrote to memory of 4012 2820 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe zicS9362.exe PID 2820 wrote to memory of 4012 2820 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe zicS9362.exe PID 4012 wrote to memory of 2752 4012 zicS9362.exe jr201994.exe PID 4012 wrote to memory of 2752 4012 zicS9362.exe jr201994.exe PID 4012 wrote to memory of 4116 4012 zicS9362.exe ku364680.exe PID 4012 wrote to memory of 4116 4012 zicS9362.exe ku364680.exe PID 4012 wrote to memory of 4116 4012 zicS9362.exe ku364680.exe PID 2820 wrote to memory of 3408 2820 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe lr753654.exe PID 2820 wrote to memory of 3408 2820 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe lr753654.exe PID 2820 wrote to memory of 3408 2820 840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe lr753654.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe"C:\Users\Admin\AppData\Local\Temp\840c3822009ad567c84c1058840f8c7e41e664df6f770ad9690833b77e09e74b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicS9362.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicS9362.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr201994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr201994.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364680.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 19884⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753654.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4116 -ip 41161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753654.exeFilesize
175KB
MD5303d68c1d44f14038951a79500c5bfb2
SHA132825b80f9f86736b0f314e7e7b06632060f63ef
SHA256ddbf804bff47b9f762dd8036fc2900ad35592bb5fc159e00937281d0d0b57a0a
SHA51213575b2f26ee555f909f3aaade0ec317888c23fc126e73af5b367076082ebfbf88c849d1829bf57498e274fd76102ede47bc9f52adfde698740dbf3530a813ba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753654.exeFilesize
175KB
MD5303d68c1d44f14038951a79500c5bfb2
SHA132825b80f9f86736b0f314e7e7b06632060f63ef
SHA256ddbf804bff47b9f762dd8036fc2900ad35592bb5fc159e00937281d0d0b57a0a
SHA51213575b2f26ee555f909f3aaade0ec317888c23fc126e73af5b367076082ebfbf88c849d1829bf57498e274fd76102ede47bc9f52adfde698740dbf3530a813ba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicS9362.exeFilesize
392KB
MD500e7e8c92616d1fffd16336689f29e72
SHA17ad8a314198a498e256173ebb696c2cc787dad5c
SHA256f22f9d9b3e613bc7289715c98bbd0ab0ea6964249338664cf2475d93259ff200
SHA5120be0bd070a4cd3467de0c37cc817a51ef43cbafea2f782d5b46b0e1c64b62dcd4ecc0b808d742bc26207daab9523f6863361a8e63de02162dafb428c74e9b581
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicS9362.exeFilesize
392KB
MD500e7e8c92616d1fffd16336689f29e72
SHA17ad8a314198a498e256173ebb696c2cc787dad5c
SHA256f22f9d9b3e613bc7289715c98bbd0ab0ea6964249338664cf2475d93259ff200
SHA5120be0bd070a4cd3467de0c37cc817a51ef43cbafea2f782d5b46b0e1c64b62dcd4ecc0b808d742bc26207daab9523f6863361a8e63de02162dafb428c74e9b581
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr201994.exeFilesize
11KB
MD5f7a9fbe402ef105d78751c7df8568d84
SHA1ecbf0902e3b9e10a407dd272095fdcca56c02364
SHA256ad05559e4faeaae51462a1ac9e5204a99e3c6b4e64ae7ca48e46f471ac923a6b
SHA512b302e8c44c4dcc9b7faa1b17288fd5d8f36302fd04959e81ac7a75f58f0064798f2ec1056b0a34f262b744f815edd2757b0fc433d8b402ff055dbeec0e6e3cd8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr201994.exeFilesize
11KB
MD5f7a9fbe402ef105d78751c7df8568d84
SHA1ecbf0902e3b9e10a407dd272095fdcca56c02364
SHA256ad05559e4faeaae51462a1ac9e5204a99e3c6b4e64ae7ca48e46f471ac923a6b
SHA512b302e8c44c4dcc9b7faa1b17288fd5d8f36302fd04959e81ac7a75f58f0064798f2ec1056b0a34f262b744f815edd2757b0fc433d8b402ff055dbeec0e6e3cd8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364680.exeFilesize
318KB
MD51be95b0ec4ae7406a6c1d40952ab00d9
SHA1ddf90e2baaf845b4c5edf3797b56ccba6325aa66
SHA256d08b26c43b8d6a8d0aac012326d9ab65a8440e9ca87d83505c48958f9104c576
SHA5128c7e1e92056b1994b64bd5a288ea1f5b091ead93866807fe1a199abaff167cb46a248aa7757185073db97a9601f1319467145903acb57d3077a937874a3a20e6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364680.exeFilesize
318KB
MD51be95b0ec4ae7406a6c1d40952ab00d9
SHA1ddf90e2baaf845b4c5edf3797b56ccba6325aa66
SHA256d08b26c43b8d6a8d0aac012326d9ab65a8440e9ca87d83505c48958f9104c576
SHA5128c7e1e92056b1994b64bd5a288ea1f5b091ead93866807fe1a199abaff167cb46a248aa7757185073db97a9601f1319467145903acb57d3077a937874a3a20e6
-
memory/2752-147-0x0000000000D10000-0x0000000000D1A000-memory.dmpFilesize
40KB
-
memory/3408-1085-0x00000000006D0000-0x0000000000702000-memory.dmpFilesize
200KB
-
memory/3408-1086-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/4116-192-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-217-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-155-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-156-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-158-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-160-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-162-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-164-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-170-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-168-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-172-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-166-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-174-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-176-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-178-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-180-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-186-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-184-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-188-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-182-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-190-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-153-0x0000000000620000-0x000000000066B000-memory.dmpFilesize
300KB
-
memory/4116-195-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-197-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-201-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-205-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-215-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-154-0x0000000004DA0000-0x0000000005344000-memory.dmpFilesize
5.6MB
-
memory/4116-213-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-219-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-221-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-211-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-209-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-207-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-203-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-199-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-194-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/4116-193-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-1064-0x0000000005350000-0x0000000005968000-memory.dmpFilesize
6.1MB
-
memory/4116-1065-0x0000000004BA0000-0x0000000004CAA000-memory.dmpFilesize
1.0MB
-
memory/4116-1066-0x0000000004CC0000-0x0000000004CD2000-memory.dmpFilesize
72KB
-
memory/4116-1067-0x0000000004D20000-0x0000000004D5C000-memory.dmpFilesize
240KB
-
memory/4116-1068-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-1070-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4116-1071-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4116-1072-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-1074-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-1073-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-1075-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4116-1076-0x00000000065B0000-0x0000000006626000-memory.dmpFilesize
472KB
-
memory/4116-1077-0x0000000006650000-0x00000000066A0000-memory.dmpFilesize
320KB
-
memory/4116-1078-0x0000000006A10000-0x0000000006BD2000-memory.dmpFilesize
1.8MB
-
memory/4116-1079-0x0000000006BE0000-0x000000000710C000-memory.dmpFilesize
5.2MB