Analysis
-
max time kernel
129s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:38
Static task
static1
Behavioral task
behavioral1
Sample
ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe
Resource
win10v2004-20230220-en
General
-
Target
ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe
-
Size
533KB
-
MD5
492ff526d23ea01073881813c4b6373f
-
SHA1
bf5829abd278ac0a76ca006f10c7c627c3f4645e
-
SHA256
ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd
-
SHA512
b2489d8a59fa39a85258090944f679b91287a1eabcc8f396c75ba9a8ea4aa1b67cdd29492696b04a113013fe00c109d9f663f6922bdfdc92fb470145b0487a49
-
SSDEEP
12288:AMrny90tbOlXI/ZU6LOETBWe6eWlyObbrnWdwU3AyTqFo9PW:XyCdZUAu7bHWdwUQyTqFOW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr909441.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr909441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr909441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr909441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr909441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr909441.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr909441.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2044-158-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-159-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-161-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-167-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-165-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-163-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-169-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-171-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-173-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-175-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-177-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-183-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-181-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-179-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-185-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-187-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/2044-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zihN6799.exejr909441.exeku835499.exelr449051.exepid process 4624 zihN6799.exe 1196 jr909441.exe 2044 ku835499.exe 1812 lr449051.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr909441.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr909441.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exezihN6799.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihN6799.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihN6799.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2816 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4100 2044 WerFault.exe ku835499.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr909441.exeku835499.exelr449051.exepid process 1196 jr909441.exe 1196 jr909441.exe 2044 ku835499.exe 2044 ku835499.exe 1812 lr449051.exe 1812 lr449051.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr909441.exeku835499.exelr449051.exedescription pid process Token: SeDebugPrivilege 1196 jr909441.exe Token: SeDebugPrivilege 2044 ku835499.exe Token: SeDebugPrivilege 1812 lr449051.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exezihN6799.exedescription pid process target process PID 3032 wrote to memory of 4624 3032 ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe zihN6799.exe PID 3032 wrote to memory of 4624 3032 ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe zihN6799.exe PID 3032 wrote to memory of 4624 3032 ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe zihN6799.exe PID 4624 wrote to memory of 1196 4624 zihN6799.exe jr909441.exe PID 4624 wrote to memory of 1196 4624 zihN6799.exe jr909441.exe PID 4624 wrote to memory of 2044 4624 zihN6799.exe ku835499.exe PID 4624 wrote to memory of 2044 4624 zihN6799.exe ku835499.exe PID 4624 wrote to memory of 2044 4624 zihN6799.exe ku835499.exe PID 3032 wrote to memory of 1812 3032 ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe lr449051.exe PID 3032 wrote to memory of 1812 3032 ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe lr449051.exe PID 3032 wrote to memory of 1812 3032 ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe lr449051.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe"C:\Users\Admin\AppData\Local\Temp\ebea2105a3f8f7b0bd5f45ad516435d6b6362d0302a3b54b2aba687a944e3ffd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6799.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6799.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr909441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr909441.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku835499.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku835499.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 13444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr449051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr449051.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2044 -ip 20441⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr449051.exeFilesize
175KB
MD5898b9b5c39486d4a70530ee9083a3bda
SHA1a85eb4a3e36dad0849e532f58faee54bb26ebc51
SHA256084a43e2351956d8a31d4938ef4f98b8b9ff99e54c6683500563d8106e92d0bb
SHA51241a0380eec1553508c84b60055a1cac31048db5ddeee50d064334cf04fa922a9eab2d66f1279621e9fc9ce126ee51c8ba55573db597d7707c3e98a97e5432ec7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr449051.exeFilesize
175KB
MD5898b9b5c39486d4a70530ee9083a3bda
SHA1a85eb4a3e36dad0849e532f58faee54bb26ebc51
SHA256084a43e2351956d8a31d4938ef4f98b8b9ff99e54c6683500563d8106e92d0bb
SHA51241a0380eec1553508c84b60055a1cac31048db5ddeee50d064334cf04fa922a9eab2d66f1279621e9fc9ce126ee51c8ba55573db597d7707c3e98a97e5432ec7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6799.exeFilesize
391KB
MD59c01caafe6cc6b7a7b3cbf09631d0374
SHA11208ec7d13a6b25d00010e4a127d264f37a6dd33
SHA2565fcd05b9558ccc3f56ba19df28547b1790ac8bd9cfd279f2e2aac1a3cb51bd76
SHA51259135ee8275974419ea6462e822ae91ae9df5142124d4f76b73a0dce508a74a87a6b127e64e0b6feca8c8204a43af0dae09f237a6cc1c11287b02b04229300a2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihN6799.exeFilesize
391KB
MD59c01caafe6cc6b7a7b3cbf09631d0374
SHA11208ec7d13a6b25d00010e4a127d264f37a6dd33
SHA2565fcd05b9558ccc3f56ba19df28547b1790ac8bd9cfd279f2e2aac1a3cb51bd76
SHA51259135ee8275974419ea6462e822ae91ae9df5142124d4f76b73a0dce508a74a87a6b127e64e0b6feca8c8204a43af0dae09f237a6cc1c11287b02b04229300a2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr909441.exeFilesize
11KB
MD58dd706a687ea3cf2322f398c156d4351
SHA17778f6cb9f40430c837040d6534954c233834f19
SHA256d46797a4b65211e1cd92e515d33fa400d4555d6ecb5d223d76bb00446cdeb4d2
SHA512a4a5a18945d00b7ddf983d8db20253080a9c248c84c661f394774216dd3875c53949c1f3d346816f8dc144888d28e78c133f4f44ea0d54012dc9f346534ac54e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr909441.exeFilesize
11KB
MD58dd706a687ea3cf2322f398c156d4351
SHA17778f6cb9f40430c837040d6534954c233834f19
SHA256d46797a4b65211e1cd92e515d33fa400d4555d6ecb5d223d76bb00446cdeb4d2
SHA512a4a5a18945d00b7ddf983d8db20253080a9c248c84c661f394774216dd3875c53949c1f3d346816f8dc144888d28e78c133f4f44ea0d54012dc9f346534ac54e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku835499.exeFilesize
318KB
MD5fbab16e6e2e3967fb1cddaf7cfec3771
SHA10fc4572ef5c183bf42326fb00ac81bdbbfa18d22
SHA2564cddcdecbd1e2b4937f58754b9f638a62bc52edc82446f6bfdbd18290b0c53da
SHA5121f1386f43a247dd8cc7bb95584566caebe02d75b61025e0d033a9b953bbb1df489612a9ea29671d4001cf4af2710e351135ef85f5f17b924770b56f554e877e5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku835499.exeFilesize
318KB
MD5fbab16e6e2e3967fb1cddaf7cfec3771
SHA10fc4572ef5c183bf42326fb00ac81bdbbfa18d22
SHA2564cddcdecbd1e2b4937f58754b9f638a62bc52edc82446f6bfdbd18290b0c53da
SHA5121f1386f43a247dd8cc7bb95584566caebe02d75b61025e0d033a9b953bbb1df489612a9ea29671d4001cf4af2710e351135ef85f5f17b924770b56f554e877e5
-
memory/1196-147-0x0000000000960000-0x000000000096A000-memory.dmpFilesize
40KB
-
memory/1812-1085-0x0000000000F10000-0x0000000000F42000-memory.dmpFilesize
200KB
-
memory/1812-1086-0x00000000057E0000-0x00000000057F0000-memory.dmpFilesize
64KB
-
memory/2044-189-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-201-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-156-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-155-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-157-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-158-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-159-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-161-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-167-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-165-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-163-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-169-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-171-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-173-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-175-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-177-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-183-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-181-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-179-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-185-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-187-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-153-0x0000000000710000-0x000000000075B000-memory.dmpFilesize
300KB
-
memory/2044-191-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-193-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-199-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-197-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-195-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-154-0x0000000004BC0000-0x0000000005164000-memory.dmpFilesize
5.6MB
-
memory/2044-205-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-203-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-207-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-209-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-211-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-213-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-215-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-217-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-219-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-221-0x0000000004A60000-0x0000000004A9F000-memory.dmpFilesize
252KB
-
memory/2044-1064-0x0000000005270000-0x0000000005888000-memory.dmpFilesize
6.1MB
-
memory/2044-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2044-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2044-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/2044-1067-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/2044-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/2044-1072-0x0000000006480000-0x00000000064F6000-memory.dmpFilesize
472KB
-
memory/2044-1073-0x0000000006520000-0x0000000006570000-memory.dmpFilesize
320KB
-
memory/2044-1074-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-1075-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-1076-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/2044-1077-0x0000000006690000-0x0000000006852000-memory.dmpFilesize
1.8MB
-
memory/2044-1078-0x0000000006870000-0x0000000006D9C000-memory.dmpFilesize
5.2MB
-
memory/2044-1079-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB