Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:21
Static task
static1
Behavioral task
behavioral1
Sample
23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe
Resource
win10v2004-20230220-en
General
-
Target
23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe
-
Size
533KB
-
MD5
887712555f3f6fe7a2941c0a95486a38
-
SHA1
99a77c6e3602b4f2f005775ad935d7eca1b2eff8
-
SHA256
23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01
-
SHA512
99ae6beccf5103ec86f661289b152775546619c4ae9e7557b4dab553b38472a35143d4e6d3c43e7f56b2c7b91addedadd1c729a904311b42bf7efad820c62b73
-
SSDEEP
12288:hMrYy90jcIXwcP6Eld6Hxg3LqXUVq2aMW:xyccBw6Rg3G5MW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr433839.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr433839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr433839.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr433839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr433839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr433839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr433839.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-158-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-159-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-161-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-163-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-165-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-167-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-169-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-171-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-173-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-175-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-177-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-179-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-181-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-183-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-185-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-187-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-189-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-191-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-193-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-195-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-197-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-199-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-203-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-201-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-205-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-207-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-209-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-211-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-213-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-215-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-217-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-219-0x0000000006100000-0x000000000613F000-memory.dmp family_redline behavioral1/memory/4824-221-0x0000000006100000-0x000000000613F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zipn3860.exejr433839.exeku286319.exelr624613.exepid process 1692 zipn3860.exe 2728 jr433839.exe 4824 ku286319.exe 2932 lr624613.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr433839.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr433839.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exezipn3860.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipn3860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipn3860.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2748 4824 WerFault.exe ku286319.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr433839.exeku286319.exelr624613.exepid process 2728 jr433839.exe 2728 jr433839.exe 4824 ku286319.exe 4824 ku286319.exe 2932 lr624613.exe 2932 lr624613.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr433839.exeku286319.exelr624613.exedescription pid process Token: SeDebugPrivilege 2728 jr433839.exe Token: SeDebugPrivilege 4824 ku286319.exe Token: SeDebugPrivilege 2932 lr624613.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exezipn3860.exedescription pid process target process PID 3116 wrote to memory of 1692 3116 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe zipn3860.exe PID 3116 wrote to memory of 1692 3116 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe zipn3860.exe PID 3116 wrote to memory of 1692 3116 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe zipn3860.exe PID 1692 wrote to memory of 2728 1692 zipn3860.exe jr433839.exe PID 1692 wrote to memory of 2728 1692 zipn3860.exe jr433839.exe PID 1692 wrote to memory of 4824 1692 zipn3860.exe ku286319.exe PID 1692 wrote to memory of 4824 1692 zipn3860.exe ku286319.exe PID 1692 wrote to memory of 4824 1692 zipn3860.exe ku286319.exe PID 3116 wrote to memory of 2932 3116 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe lr624613.exe PID 3116 wrote to memory of 2932 3116 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe lr624613.exe PID 3116 wrote to memory of 2932 3116 23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe lr624613.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe"C:\Users\Admin\AppData\Local\Temp\23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 13364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4824 -ip 48241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exeFilesize
175KB
MD5ae9797c456535d7493ae3918603a2c19
SHA19db12e90bab014e02d1adb02cd27a346d4714e36
SHA256cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e
SHA512839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exeFilesize
175KB
MD5ae9797c456535d7493ae3918603a2c19
SHA19db12e90bab014e02d1adb02cd27a346d4714e36
SHA256cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e
SHA512839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exeFilesize
391KB
MD5f3131202683bff5e2f1bc8ad7e7f3db9
SHA1a26fc9603e7a9b2a41670806f9f3d7e1bb798139
SHA256152242f73c270c74be915e8e4b0dad34cc59c5605b446fdca26aabcdbbfaf545
SHA51282b35c8c93b5a590f5459fdeb54e758c459126d23bd06d6d5df042792e150acb1b3cc0a2080ff82d8524e0a041dffd1ec60a3489b0ce345a1777958996012107
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exeFilesize
391KB
MD5f3131202683bff5e2f1bc8ad7e7f3db9
SHA1a26fc9603e7a9b2a41670806f9f3d7e1bb798139
SHA256152242f73c270c74be915e8e4b0dad34cc59c5605b446fdca26aabcdbbfaf545
SHA51282b35c8c93b5a590f5459fdeb54e758c459126d23bd06d6d5df042792e150acb1b3cc0a2080ff82d8524e0a041dffd1ec60a3489b0ce345a1777958996012107
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exeFilesize
11KB
MD56f3d82ba66b148340aaed46b2583e1d9
SHA1531bca927a9375e1a0addcdb2fde53b52de5c24d
SHA256816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92
SHA512801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exeFilesize
11KB
MD56f3d82ba66b148340aaed46b2583e1d9
SHA1531bca927a9375e1a0addcdb2fde53b52de5c24d
SHA256816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92
SHA512801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exeFilesize
359KB
MD5ce3e552055f22b5076a8111fb588eb25
SHA16605753b6c300db2941f30c69088175abba907e4
SHA2560aba0a10e50db1362bfbb1a1d9c1997c0b0e8aa7530cbb6d95a6aab25efe20ca
SHA512047d1a6eda1416c45d2ef27a8f0f055609626227365145b41a5bbf2db6c775ea00816cfe9626ba8717f96ce9deec45902eea649b70b88893ae7fbb14708e68f7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exeFilesize
359KB
MD5ce3e552055f22b5076a8111fb588eb25
SHA16605753b6c300db2941f30c69088175abba907e4
SHA2560aba0a10e50db1362bfbb1a1d9c1997c0b0e8aa7530cbb6d95a6aab25efe20ca
SHA512047d1a6eda1416c45d2ef27a8f0f055609626227365145b41a5bbf2db6c775ea00816cfe9626ba8717f96ce9deec45902eea649b70b88893ae7fbb14708e68f7
-
memory/2728-147-0x0000000000D80000-0x0000000000D8A000-memory.dmpFilesize
40KB
-
memory/2932-1085-0x0000000000440000-0x0000000000472000-memory.dmpFilesize
200KB
-
memory/2932-1086-0x0000000004D40000-0x0000000004D50000-memory.dmpFilesize
64KB
-
memory/4824-189-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-203-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-155-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-156-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-157-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-158-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-159-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-161-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-163-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-165-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-167-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-169-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-171-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-173-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-175-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-177-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-179-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-181-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-183-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-185-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-187-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-153-0x00000000062C0000-0x0000000006864000-memory.dmpFilesize
5.6MB
-
memory/4824-191-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-193-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-195-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-197-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-199-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-154-0x0000000001C50000-0x0000000001C9B000-memory.dmpFilesize
300KB
-
memory/4824-201-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-205-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-207-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-209-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-211-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-213-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-215-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-217-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-219-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-221-0x0000000006100000-0x000000000613F000-memory.dmpFilesize
252KB
-
memory/4824-1064-0x0000000006870000-0x0000000006E88000-memory.dmpFilesize
6.1MB
-
memory/4824-1065-0x0000000006E90000-0x0000000006F9A000-memory.dmpFilesize
1.0MB
-
memory/4824-1067-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-1066-0x00000000061F0000-0x0000000006202000-memory.dmpFilesize
72KB
-
memory/4824-1068-0x0000000006210000-0x000000000624C000-memory.dmpFilesize
240KB
-
memory/4824-1070-0x00000000071F0000-0x0000000007256000-memory.dmpFilesize
408KB
-
memory/4824-1071-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-1072-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-1073-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/4824-1074-0x0000000007A00000-0x0000000007A92000-memory.dmpFilesize
584KB
-
memory/4824-1075-0x0000000007AD0000-0x0000000007B46000-memory.dmpFilesize
472KB
-
memory/4824-1076-0x0000000007B60000-0x0000000007BB0000-memory.dmpFilesize
320KB
-
memory/4824-1077-0x0000000007CD0000-0x0000000007E92000-memory.dmpFilesize
1.8MB
-
memory/4824-1078-0x0000000007EB0000-0x00000000083DC000-memory.dmpFilesize
5.2MB
-
memory/4824-1079-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB