Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:16
Static task
static1
Behavioral task
behavioral1
Sample
6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe
Resource
win10v2004-20230221-en
General
-
Target
6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe
-
Size
533KB
-
MD5
b7038c32c9433168c0d4cfb3c710677a
-
SHA1
b80411e515c8b716186f95db2f58290f91857603
-
SHA256
6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378
-
SHA512
a5c2f25a2e2c1bf3da75e2294f047505deeab5e3e6da373970af5e7b74502943922133aa9075fa900743d062d9968bad881d5dd294536794b4d9f0255c0f0234
-
SSDEEP
12288:/Mrmy9054tFP1wAnYRtCdam1b5DA3ObErxQ72Vl126h0SW:Vyv9zYRSVDBbp72VlU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr404712.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr404712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr404712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr404712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr404712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr404712.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr404712.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/244-158-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-161-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-163-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-159-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-165-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-167-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-169-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-173-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-171-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-175-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-179-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-177-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-181-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-183-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-185-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-187-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-189-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-191-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-193-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-195-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-197-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-199-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-201-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-203-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-205-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-207-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-209-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-211-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-213-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-215-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-217-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-219-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/244-221-0x0000000005040000-0x000000000507F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zier0496.exejr404712.exeku595833.exelr448244.exepid process 3980 zier0496.exe 4872 jr404712.exe 244 ku595833.exe 3512 lr448244.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr404712.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr404712.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exezier0496.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zier0496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zier0496.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2348 244 WerFault.exe ku595833.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr404712.exeku595833.exelr448244.exepid process 4872 jr404712.exe 4872 jr404712.exe 244 ku595833.exe 244 ku595833.exe 3512 lr448244.exe 3512 lr448244.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr404712.exeku595833.exelr448244.exedescription pid process Token: SeDebugPrivilege 4872 jr404712.exe Token: SeDebugPrivilege 244 ku595833.exe Token: SeDebugPrivilege 3512 lr448244.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exezier0496.exedescription pid process target process PID 1628 wrote to memory of 3980 1628 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe zier0496.exe PID 1628 wrote to memory of 3980 1628 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe zier0496.exe PID 1628 wrote to memory of 3980 1628 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe zier0496.exe PID 3980 wrote to memory of 4872 3980 zier0496.exe jr404712.exe PID 3980 wrote to memory of 4872 3980 zier0496.exe jr404712.exe PID 3980 wrote to memory of 244 3980 zier0496.exe ku595833.exe PID 3980 wrote to memory of 244 3980 zier0496.exe ku595833.exe PID 3980 wrote to memory of 244 3980 zier0496.exe ku595833.exe PID 1628 wrote to memory of 3512 1628 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe lr448244.exe PID 1628 wrote to memory of 3512 1628 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe lr448244.exe PID 1628 wrote to memory of 3512 1628 6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe lr448244.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe"C:\Users\Admin\AppData\Local\Temp\6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 13524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 244 -ip 2441⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exeFilesize
175KB
MD555cdea1e46ff445f1eba8971f44ebf36
SHA1442a975b2d5775ee28c2504c753b8456cbdf5373
SHA2564134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e
SHA512dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exeFilesize
175KB
MD555cdea1e46ff445f1eba8971f44ebf36
SHA1442a975b2d5775ee28c2504c753b8456cbdf5373
SHA2564134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e
SHA512dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exeFilesize
392KB
MD51b07504a15a9e14af29606bd6f9cb967
SHA19e97015c694151e8cbb91ad43e12ab3c4957f9e4
SHA2564b1073153c73ab049fb85e052ad86cc396b57831d2c2335872f01dedc5c55a49
SHA5128764a8d533bd002e05a91589af264b81a2a37c335c5f5a6cb3de96f48ada6f60213e1bacd6959794c469aa1ae2841224a355819d05f252ebfe68973f8bb2abd7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exeFilesize
392KB
MD51b07504a15a9e14af29606bd6f9cb967
SHA19e97015c694151e8cbb91ad43e12ab3c4957f9e4
SHA2564b1073153c73ab049fb85e052ad86cc396b57831d2c2335872f01dedc5c55a49
SHA5128764a8d533bd002e05a91589af264b81a2a37c335c5f5a6cb3de96f48ada6f60213e1bacd6959794c469aa1ae2841224a355819d05f252ebfe68973f8bb2abd7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exeFilesize
11KB
MD58b46ba626d8a3e20e9c53b413961e103
SHA1158f0d5485b7f3d7e12e833adafe2a64cf4a90c1
SHA25696e4aec5d0a3e557025afbb33aa66263502d1a0f7b8b497f99d9686831612a32
SHA51268af38ca01c310190789869645a79f22fd5931a707b54a2e33c697f5590da6714e2b1158ca37751432f8fc7d6d85a30e363199c3e8cd3c011e39c985f1e90314
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exeFilesize
11KB
MD58b46ba626d8a3e20e9c53b413961e103
SHA1158f0d5485b7f3d7e12e833adafe2a64cf4a90c1
SHA25696e4aec5d0a3e557025afbb33aa66263502d1a0f7b8b497f99d9686831612a32
SHA51268af38ca01c310190789869645a79f22fd5931a707b54a2e33c697f5590da6714e2b1158ca37751432f8fc7d6d85a30e363199c3e8cd3c011e39c985f1e90314
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exeFilesize
318KB
MD5fc43636494f408a9f2fa9cb365cc4c6e
SHA18c87394edaf3ba192b0fa586c5b150a754c8bf93
SHA256bc4948dfa63ced2a8309d6ace204546da8c05a84ea3f06ef7b611cd447f386d0
SHA512a5d882cb3723411508a4be6f86c727532f23e5ce9cf171fbc87d1fdc6a9c3d9adf35b673c3a01188e232d76a2e52e9b90e1009ac9bb6402e1fb42f09d9c831f9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exeFilesize
318KB
MD5fc43636494f408a9f2fa9cb365cc4c6e
SHA18c87394edaf3ba192b0fa586c5b150a754c8bf93
SHA256bc4948dfa63ced2a8309d6ace204546da8c05a84ea3f06ef7b611cd447f386d0
SHA512a5d882cb3723411508a4be6f86c727532f23e5ce9cf171fbc87d1fdc6a9c3d9adf35b673c3a01188e232d76a2e52e9b90e1009ac9bb6402e1fb42f09d9c831f9
-
memory/244-153-0x0000000004A90000-0x0000000005034000-memory.dmpFilesize
5.6MB
-
memory/244-154-0x00000000006A0000-0x00000000006EB000-memory.dmpFilesize
300KB
-
memory/244-156-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/244-155-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/244-157-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/244-158-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-161-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-163-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-159-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-165-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-167-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-169-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-173-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-171-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-175-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-179-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-177-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-181-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-183-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-185-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-187-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-189-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-191-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-193-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-195-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-197-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-199-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-201-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-203-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-205-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-207-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-209-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-211-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-213-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-215-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-217-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-219-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-221-0x0000000005040000-0x000000000507F000-memory.dmpFilesize
252KB
-
memory/244-1064-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/244-1065-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/244-1066-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/244-1067-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/244-1068-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/244-1070-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/244-1071-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/244-1072-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/244-1073-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/244-1074-0x0000000006370000-0x0000000006532000-memory.dmpFilesize
1.8MB
-
memory/244-1075-0x0000000006550000-0x0000000006A7C000-memory.dmpFilesize
5.2MB
-
memory/244-1076-0x0000000006BA0000-0x0000000006C16000-memory.dmpFilesize
472KB
-
memory/244-1077-0x0000000006C40000-0x0000000006C90000-memory.dmpFilesize
320KB
-
memory/244-1078-0x0000000002470000-0x0000000002480000-memory.dmpFilesize
64KB
-
memory/3512-1084-0x0000000000610000-0x0000000000642000-memory.dmpFilesize
200KB
-
memory/3512-1085-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/4872-147-0x0000000000CF0000-0x0000000000CFA000-memory.dmpFilesize
40KB