Analysis
-
max time kernel
100s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe
Resource
win10v2004-20230221-en
General
-
Target
c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe
-
Size
534KB
-
MD5
e9542fbaa6a5788d41be783dc6f9e4e3
-
SHA1
68d0a121c9ba0dac30d21ee07d8f5f536f0e4c11
-
SHA256
c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b
-
SHA512
49ca0da61452e5a185c6b53841fb74eb9503712de36034894789c6e7d98bd059b6244cca7624f438f3b9927df3982f03513f67ba5e73b081046a9324670e03dc
-
SSDEEP
12288:6Mryy90cbaEmSQr8+nybyqvpOCmJU/O6EFDfKL73KFP:cyNlCr7nybpvpO8EJvl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr893457.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr893457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr893457.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr893457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr893457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr893457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr893457.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4032-157-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-158-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-160-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-162-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-166-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-164-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-168-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-170-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-172-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-174-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-176-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-178-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-180-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-182-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-184-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-186-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-188-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-190-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-192-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-194-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-196-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-200-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-216-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-218-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4032-220-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zitz2866.exejr893457.exeku251378.exelr829446.exepid process 4612 zitz2866.exe 3932 jr893457.exe 4032 ku251378.exe 1748 lr829446.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr893457.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr893457.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exezitz2866.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitz2866.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitz2866.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4300 4032 WerFault.exe ku251378.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr893457.exeku251378.exelr829446.exepid process 3932 jr893457.exe 3932 jr893457.exe 4032 ku251378.exe 4032 ku251378.exe 1748 lr829446.exe 1748 lr829446.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr893457.exeku251378.exelr829446.exedescription pid process Token: SeDebugPrivilege 3932 jr893457.exe Token: SeDebugPrivilege 4032 ku251378.exe Token: SeDebugPrivilege 1748 lr829446.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exezitz2866.exedescription pid process target process PID 4216 wrote to memory of 4612 4216 c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe zitz2866.exe PID 4216 wrote to memory of 4612 4216 c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe zitz2866.exe PID 4216 wrote to memory of 4612 4216 c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe zitz2866.exe PID 4612 wrote to memory of 3932 4612 zitz2866.exe jr893457.exe PID 4612 wrote to memory of 3932 4612 zitz2866.exe jr893457.exe PID 4612 wrote to memory of 4032 4612 zitz2866.exe ku251378.exe PID 4612 wrote to memory of 4032 4612 zitz2866.exe ku251378.exe PID 4612 wrote to memory of 4032 4612 zitz2866.exe ku251378.exe PID 4216 wrote to memory of 1748 4216 c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe lr829446.exe PID 4216 wrote to memory of 1748 4216 c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe lr829446.exe PID 4216 wrote to memory of 1748 4216 c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe lr829446.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe"C:\Users\Admin\AppData\Local\Temp\c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 15124⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4032 -ip 40321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exeFilesize
175KB
MD5f0c04caf11f79e1ba4e7f26e404dad3e
SHA1bb0d7ec1cad0bb78a16fda2630b81b6424efa737
SHA256c4ee6354d7ba06971fd546d0e8af49ed85d800ac65da3bc7e558dd5c3be0c7d2
SHA512cba90e59f607fe033f5796d9c2fd729aae65253e41d2aba064d70f5f04bc0dc08bf800ded3714910fedf411fc81661ce116e89adeec250236dbf3f0c070621ab
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exeFilesize
175KB
MD5f0c04caf11f79e1ba4e7f26e404dad3e
SHA1bb0d7ec1cad0bb78a16fda2630b81b6424efa737
SHA256c4ee6354d7ba06971fd546d0e8af49ed85d800ac65da3bc7e558dd5c3be0c7d2
SHA512cba90e59f607fe033f5796d9c2fd729aae65253e41d2aba064d70f5f04bc0dc08bf800ded3714910fedf411fc81661ce116e89adeec250236dbf3f0c070621ab
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exeFilesize
392KB
MD541257cb5756cc620da4f5e6cad27e910
SHA1c39afcb8441fd9746bf484ff2345cceb6a47ad9b
SHA256d7c51d42349b7eeb16c3555214099737b4f7ea85ca6da50865ccc57b691a8447
SHA512ac2eb42f51a07f582efada786f5cbc4570ae67aca42c350e5d0251143a67731fc790f98cf33cac328c48ba12a67caf83dd3ecac56086b5ee75f5ff12bc30f2c0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exeFilesize
392KB
MD541257cb5756cc620da4f5e6cad27e910
SHA1c39afcb8441fd9746bf484ff2345cceb6a47ad9b
SHA256d7c51d42349b7eeb16c3555214099737b4f7ea85ca6da50865ccc57b691a8447
SHA512ac2eb42f51a07f582efada786f5cbc4570ae67aca42c350e5d0251143a67731fc790f98cf33cac328c48ba12a67caf83dd3ecac56086b5ee75f5ff12bc30f2c0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exeFilesize
11KB
MD557fb8354fe120d3b6c3fa59462269eb6
SHA1d1bc2e41359a63822f3c67dfed41f0d6460f8f83
SHA25633d7e50758708b4698980ed69fe20f57b17ec3679111c46e8be6ee3e476a973f
SHA512f2b036d3c9a7ba46bc690569fe0095ca2d49ed37317051c60d32bb7e618469e0bf4c74cf5e7869142b33d897e692068610ec1ccb9ac80653d8ea5db7147554b6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exeFilesize
11KB
MD557fb8354fe120d3b6c3fa59462269eb6
SHA1d1bc2e41359a63822f3c67dfed41f0d6460f8f83
SHA25633d7e50758708b4698980ed69fe20f57b17ec3679111c46e8be6ee3e476a973f
SHA512f2b036d3c9a7ba46bc690569fe0095ca2d49ed37317051c60d32bb7e618469e0bf4c74cf5e7869142b33d897e692068610ec1ccb9ac80653d8ea5db7147554b6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exeFilesize
318KB
MD5614578df3f908f94970cac4cff491772
SHA1e9dcd48d731d103cf4d148ebc33facacf2767e39
SHA2568ee67431b7b0a1072c7865ac75aab349feb6bd7d4127cfa234255794738663bd
SHA512596c7d3b94dd7cd08764b654f518ef8056dc9bae6b2565c4e08f1758d5ab0904d57c3c9c95ac87dc64819512907a823a6b77375cb272e75b778ea079fad92d13
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exeFilesize
318KB
MD5614578df3f908f94970cac4cff491772
SHA1e9dcd48d731d103cf4d148ebc33facacf2767e39
SHA2568ee67431b7b0a1072c7865ac75aab349feb6bd7d4127cfa234255794738663bd
SHA512596c7d3b94dd7cd08764b654f518ef8056dc9bae6b2565c4e08f1758d5ab0904d57c3c9c95ac87dc64819512907a823a6b77375cb272e75b778ea079fad92d13
-
memory/1748-1084-0x0000000000680000-0x00000000006B2000-memory.dmpFilesize
200KB
-
memory/1748-1085-0x0000000004FE0000-0x0000000004FF0000-memory.dmpFilesize
64KB
-
memory/3932-147-0x00000000004D0000-0x00000000004DA000-memory.dmpFilesize
40KB
-
memory/4032-188-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-200-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-156-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/4032-157-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-158-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-160-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-162-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-166-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-164-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-168-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-170-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-172-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-174-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-176-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-178-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-180-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-182-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-184-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-186-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-154-0x0000000000610000-0x000000000065B000-memory.dmpFilesize
300KB
-
memory/4032-190-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-192-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-194-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-196-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-198-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-155-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/4032-202-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-204-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-206-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-208-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-210-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-212-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-214-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-216-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-218-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-220-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/4032-1063-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/4032-1064-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4032-1065-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4032-1066-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4032-1067-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/4032-1069-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/4032-1070-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/4032-1071-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4032-1072-0x00000000064A0000-0x0000000006532000-memory.dmpFilesize
584KB
-
memory/4032-1073-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/4032-1074-0x00000000066F0000-0x00000000068B2000-memory.dmpFilesize
1.8MB
-
memory/4032-153-0x0000000004B00000-0x00000000050A4000-memory.dmpFilesize
5.6MB
-
memory/4032-1075-0x00000000068D0000-0x0000000006DFC000-memory.dmpFilesize
5.2MB
-
memory/4032-1076-0x0000000006F50000-0x0000000006FC6000-memory.dmpFilesize
472KB
-
memory/4032-1077-0x0000000006FD0000-0x0000000007020000-memory.dmpFilesize
320KB