Analysis
-
max time kernel
104s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:18
Static task
static1
Behavioral task
behavioral1
Sample
3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe
Resource
win10v2004-20230220-en
General
-
Target
3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe
-
Size
533KB
-
MD5
abb145e121dbed6448f0c63c7356a4c3
-
SHA1
04c61050738d4ce7d5f911c36f7e3fe152b46ae9
-
SHA256
3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9
-
SHA512
4b7f66cde398f7b69f983e9454067c35c9fe754ffb8580ad9e9f42f5cb597eef6bb5a7d02c4e71d60f23428f46d8473ed476a34d95fec68d81428e59e2a59a47
-
SSDEEP
12288:sMr5y90SskHgRq2pY3g6jli3LqxU9ACB88i:FyFsqdg6Bi3Gx2Hti
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr483059.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr483059.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr483059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr483059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr483059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr483059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr483059.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2568-158-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-159-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-161-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-163-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-165-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-167-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-169-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-171-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-173-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-175-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-177-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-181-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-179-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-183-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-185-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-187-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-189-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-191-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-193-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-195-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-197-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-199-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-201-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-203-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-205-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-207-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-209-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-211-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-213-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-215-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-217-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-219-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline behavioral1/memory/2568-221-0x00000000066C0000-0x00000000066FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziuB8654.exejr483059.exeku389790.exelr098512.exepid process 4184 ziuB8654.exe 2892 jr483059.exe 2568 ku389790.exe 3432 lr098512.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr483059.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr483059.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exeziuB8654.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziuB8654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuB8654.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1776 2568 WerFault.exe ku389790.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr483059.exeku389790.exelr098512.exepid process 2892 jr483059.exe 2892 jr483059.exe 2568 ku389790.exe 2568 ku389790.exe 3432 lr098512.exe 3432 lr098512.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr483059.exeku389790.exelr098512.exedescription pid process Token: SeDebugPrivilege 2892 jr483059.exe Token: SeDebugPrivilege 2568 ku389790.exe Token: SeDebugPrivilege 3432 lr098512.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exeziuB8654.exedescription pid process target process PID 1860 wrote to memory of 4184 1860 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe ziuB8654.exe PID 1860 wrote to memory of 4184 1860 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe ziuB8654.exe PID 1860 wrote to memory of 4184 1860 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe ziuB8654.exe PID 4184 wrote to memory of 2892 4184 ziuB8654.exe jr483059.exe PID 4184 wrote to memory of 2892 4184 ziuB8654.exe jr483059.exe PID 4184 wrote to memory of 2568 4184 ziuB8654.exe ku389790.exe PID 4184 wrote to memory of 2568 4184 ziuB8654.exe ku389790.exe PID 4184 wrote to memory of 2568 4184 ziuB8654.exe ku389790.exe PID 1860 wrote to memory of 3432 1860 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe lr098512.exe PID 1860 wrote to memory of 3432 1860 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe lr098512.exe PID 1860 wrote to memory of 3432 1860 3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe lr098512.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe"C:\Users\Admin\AppData\Local\Temp\3915c9698da5ee8bd1d30c411719b8f112682a5a32923fae5180dd87292320a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuB8654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuB8654.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr483059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr483059.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku389790.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku389790.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 17244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098512.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098512.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2568 -ip 25681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098512.exeFilesize
175KB
MD5521a4228cc837d55b6f81e76034e8fef
SHA1a6e64b69fa404b524dd3772e229969fa11925e20
SHA25655bfc510af676683336e13430f28680f52ffc592da90746db97c7aa8ce56a02b
SHA512f9731b885d6a2a60a75cc618b8d52f5b6ebe78982194beb878b1b8833a93ab95a6d02a8120b94823db5a4232505da90fb30fe6c81316239a8a72e7b982eb62e9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098512.exeFilesize
175KB
MD5521a4228cc837d55b6f81e76034e8fef
SHA1a6e64b69fa404b524dd3772e229969fa11925e20
SHA25655bfc510af676683336e13430f28680f52ffc592da90746db97c7aa8ce56a02b
SHA512f9731b885d6a2a60a75cc618b8d52f5b6ebe78982194beb878b1b8833a93ab95a6d02a8120b94823db5a4232505da90fb30fe6c81316239a8a72e7b982eb62e9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuB8654.exeFilesize
391KB
MD548095c774db6ad1e0c7a8a13fd983934
SHA1339aa1c019cd92526b40d3576697984c82640062
SHA256bfa7f2464716b7e7508f8b674a8422e3f4bd66289950d8b6d592cc19223549a6
SHA5121fe88b65d5d716dd915a4a349f4ac78da987aa857dc047267727dc6effcbf7b6fc8875a4df433c272ccb527cac1723294cecabbda3dc9ea17320697ff21d7f7a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuB8654.exeFilesize
391KB
MD548095c774db6ad1e0c7a8a13fd983934
SHA1339aa1c019cd92526b40d3576697984c82640062
SHA256bfa7f2464716b7e7508f8b674a8422e3f4bd66289950d8b6d592cc19223549a6
SHA5121fe88b65d5d716dd915a4a349f4ac78da987aa857dc047267727dc6effcbf7b6fc8875a4df433c272ccb527cac1723294cecabbda3dc9ea17320697ff21d7f7a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr483059.exeFilesize
11KB
MD5ec9f07be7a1db0741851676f8d0a2c5b
SHA1b522b40593bd872b08902b879e2f877e48641a17
SHA256540e5890c9b23b9554a2f751cc7d924f190f611f7db8179319683b5a17dd8b3b
SHA512d72a72a6aa35ad9412b5dfae34413f354bfba87ce4f199c9e07604b18cd04c7fde6418147776fb5bdf90d24e23386f8bfc51e70eeaec712435df917d6fec77fe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr483059.exeFilesize
11KB
MD5ec9f07be7a1db0741851676f8d0a2c5b
SHA1b522b40593bd872b08902b879e2f877e48641a17
SHA256540e5890c9b23b9554a2f751cc7d924f190f611f7db8179319683b5a17dd8b3b
SHA512d72a72a6aa35ad9412b5dfae34413f354bfba87ce4f199c9e07604b18cd04c7fde6418147776fb5bdf90d24e23386f8bfc51e70eeaec712435df917d6fec77fe
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku389790.exeFilesize
359KB
MD5dd6619195e8897f731ef7c7113bc78ab
SHA12c9a06b3d9f3394b3cab586c975a3af4f86ce735
SHA256c77289bf978e19f9af500e42dfd000d11b24c0ad2a7de71e755e305fab20b025
SHA51295d09956806782019c7daca333c3e78745d5429317d5d1f03251d839116b001971b927c5162c942d9d46798786d522c1a981eba8137bd23aafdc0d1a1e24b053
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku389790.exeFilesize
359KB
MD5dd6619195e8897f731ef7c7113bc78ab
SHA12c9a06b3d9f3394b3cab586c975a3af4f86ce735
SHA256c77289bf978e19f9af500e42dfd000d11b24c0ad2a7de71e755e305fab20b025
SHA51295d09956806782019c7daca333c3e78745d5429317d5d1f03251d839116b001971b927c5162c942d9d46798786d522c1a981eba8137bd23aafdc0d1a1e24b053
-
memory/2568-153-0x00000000060D0000-0x0000000006674000-memory.dmpFilesize
5.6MB
-
memory/2568-154-0x0000000001BC0000-0x0000000001C0B000-memory.dmpFilesize
300KB
-
memory/2568-155-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-157-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-156-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-158-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-159-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-161-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-163-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-165-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-167-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-169-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-171-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-173-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-175-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-177-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-181-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-179-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-183-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-185-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-187-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-189-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-191-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-193-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-195-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-197-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-199-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-201-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-203-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-205-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-207-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-209-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-211-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-213-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-215-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-217-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-219-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-221-0x00000000066C0000-0x00000000066FF000-memory.dmpFilesize
252KB
-
memory/2568-1064-0x0000000006840000-0x0000000006E58000-memory.dmpFilesize
6.1MB
-
memory/2568-1065-0x0000000006EE0000-0x0000000006FEA000-memory.dmpFilesize
1.0MB
-
memory/2568-1066-0x0000000007020000-0x0000000007032000-memory.dmpFilesize
72KB
-
memory/2568-1067-0x0000000007040000-0x000000000707C000-memory.dmpFilesize
240KB
-
memory/2568-1068-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-1070-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-1071-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-1072-0x0000000007330000-0x00000000073C2000-memory.dmpFilesize
584KB
-
memory/2568-1073-0x00000000073D0000-0x0000000007436000-memory.dmpFilesize
408KB
-
memory/2568-1074-0x0000000003A00000-0x0000000003A10000-memory.dmpFilesize
64KB
-
memory/2568-1075-0x0000000007AF0000-0x0000000007B66000-memory.dmpFilesize
472KB
-
memory/2568-1076-0x0000000007B80000-0x0000000007BD0000-memory.dmpFilesize
320KB
-
memory/2568-1077-0x0000000007CF0000-0x0000000007EB2000-memory.dmpFilesize
1.8MB
-
memory/2568-1078-0x0000000007EC0000-0x00000000083EC000-memory.dmpFilesize
5.2MB
-
memory/2892-147-0x00000000006E0000-0x00000000006EA000-memory.dmpFilesize
40KB
-
memory/3432-1085-0x0000000000F30000-0x0000000000F62000-memory.dmpFilesize
200KB
-
memory/3432-1086-0x00000000057E0000-0x00000000057F0000-memory.dmpFilesize
64KB