Analysis
-
max time kernel
78s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:55
Static task
static1
Behavioral task
behavioral1
Sample
82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe
Resource
win10v2004-20230221-en
General
-
Target
82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe
-
Size
534KB
-
MD5
c6562263ee8cd816c9d615603f7c296a
-
SHA1
b160f0032b3bf49b49553ed86ca3471d74a5609f
-
SHA256
82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df
-
SHA512
5adb89e1eed106140f870a74528ac061d683f02688ec6df1da344483661f24a8f957dcc63452a2d97f68c22633ffbdd399aec34f5d9c6b62204df864c1837bde
-
SSDEEP
12288:rMrGy90iWpwOOpotRkz2pBlTuWObWrl5MocWSOLB9AgI:ByRWaGG6pBlTuby58OLjAgI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr487648.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr487648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr487648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr487648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr487648.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr487648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr487648.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4876-158-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-159-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-161-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-169-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-171-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-173-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-175-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-167-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-165-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-163-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-177-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-179-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-181-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-183-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-185-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-187-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-189-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-191-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-193-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-195-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-197-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-199-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-201-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-203-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-205-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-207-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-211-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-209-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-213-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-215-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-217-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-219-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/4876-221-0x0000000002560000-0x000000000259F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziXI2990.exejr487648.exeku408556.exelr820207.exepid process 3080 ziXI2990.exe 3240 jr487648.exe 4876 ku408556.exe 1240 lr820207.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr487648.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr487648.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exeziXI2990.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXI2990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXI2990.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1296 4876 WerFault.exe ku408556.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr487648.exeku408556.exelr820207.exepid process 3240 jr487648.exe 3240 jr487648.exe 4876 ku408556.exe 4876 ku408556.exe 1240 lr820207.exe 1240 lr820207.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr487648.exeku408556.exelr820207.exedescription pid process Token: SeDebugPrivilege 3240 jr487648.exe Token: SeDebugPrivilege 4876 ku408556.exe Token: SeDebugPrivilege 1240 lr820207.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exeziXI2990.exedescription pid process target process PID 2712 wrote to memory of 3080 2712 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe ziXI2990.exe PID 2712 wrote to memory of 3080 2712 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe ziXI2990.exe PID 2712 wrote to memory of 3080 2712 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe ziXI2990.exe PID 3080 wrote to memory of 3240 3080 ziXI2990.exe jr487648.exe PID 3080 wrote to memory of 3240 3080 ziXI2990.exe jr487648.exe PID 3080 wrote to memory of 4876 3080 ziXI2990.exe ku408556.exe PID 3080 wrote to memory of 4876 3080 ziXI2990.exe ku408556.exe PID 3080 wrote to memory of 4876 3080 ziXI2990.exe ku408556.exe PID 2712 wrote to memory of 1240 2712 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe lr820207.exe PID 2712 wrote to memory of 1240 2712 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe lr820207.exe PID 2712 wrote to memory of 1240 2712 82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe lr820207.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe"C:\Users\Admin\AppData\Local\Temp\82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 16004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4876 -ip 48761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exeFilesize
175KB
MD5d3dc051258a02af3d98829e9ff0c0143
SHA1b818461f30a50675c93da2691737d9141d72bb0b
SHA25685014a4ccafb6cbf76075495b9116b872a1fb1e268b02a1f2c7cf1d4d3e6635c
SHA512e3f326058d8aa6a0c5825e2257240cd8e784323fb9469c27f2ea2f15e47928a7b54e77a038ce9a16840d11e056843d1dc13969040eab50eaa774e83ab6638d86
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exeFilesize
175KB
MD5d3dc051258a02af3d98829e9ff0c0143
SHA1b818461f30a50675c93da2691737d9141d72bb0b
SHA25685014a4ccafb6cbf76075495b9116b872a1fb1e268b02a1f2c7cf1d4d3e6635c
SHA512e3f326058d8aa6a0c5825e2257240cd8e784323fb9469c27f2ea2f15e47928a7b54e77a038ce9a16840d11e056843d1dc13969040eab50eaa774e83ab6638d86
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exeFilesize
392KB
MD5c6f3fee299a76f9c6f386cbef280db45
SHA1f7cd8175495c955f2d0c45012de31dca0b9aa047
SHA2564c587b87363dcdbaaef47a056ea1aca266a1f67370b8c4686aa21f6b6551186f
SHA512827705cf70b3b3c2375ab63e30cb370c8c7d1bdad08bec38aa86409ca1df05048c99906d0f8d19fc91f8639324eaf57b3d66da4a93eb14cd2e2df638f86977d7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exeFilesize
392KB
MD5c6f3fee299a76f9c6f386cbef280db45
SHA1f7cd8175495c955f2d0c45012de31dca0b9aa047
SHA2564c587b87363dcdbaaef47a056ea1aca266a1f67370b8c4686aa21f6b6551186f
SHA512827705cf70b3b3c2375ab63e30cb370c8c7d1bdad08bec38aa86409ca1df05048c99906d0f8d19fc91f8639324eaf57b3d66da4a93eb14cd2e2df638f86977d7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exeFilesize
11KB
MD566a9fc93c883eb734bfc6c4ad0adbff5
SHA1be33ed53788a0edd411a06384c70e8a53227b38b
SHA2565bdac1e4f625e8dad1a619753ca82fe459572923a1c9eaedfcc6b17c5c95a242
SHA512727451d95da16289125d5b640ba1204be2d2ca5624d3abc0d975356c1b25a4cbc0e9b8d31d406f1bc1bf3b31eaf4f3581a831372cbc82cc79057a1a3f688f162
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exeFilesize
11KB
MD566a9fc93c883eb734bfc6c4ad0adbff5
SHA1be33ed53788a0edd411a06384c70e8a53227b38b
SHA2565bdac1e4f625e8dad1a619753ca82fe459572923a1c9eaedfcc6b17c5c95a242
SHA512727451d95da16289125d5b640ba1204be2d2ca5624d3abc0d975356c1b25a4cbc0e9b8d31d406f1bc1bf3b31eaf4f3581a831372cbc82cc79057a1a3f688f162
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exeFilesize
318KB
MD52b3703d89500761e1296aed1d8abd9b5
SHA1a1e9acfb38754d2d729a30edd2239378d570a8ab
SHA256c50c61070037114cf0186bce74c5f7839e8bc9c78aef3166980105e206c14e96
SHA51287ac0910e2db8d4a2877c0b259e631e78b7ef7bf302826f494d228af0dad0d93adbc34b635275cf9cf2276a34c5b3634311a36011af72bb9f141306743d46216
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exeFilesize
318KB
MD52b3703d89500761e1296aed1d8abd9b5
SHA1a1e9acfb38754d2d729a30edd2239378d570a8ab
SHA256c50c61070037114cf0186bce74c5f7839e8bc9c78aef3166980105e206c14e96
SHA51287ac0910e2db8d4a2877c0b259e631e78b7ef7bf302826f494d228af0dad0d93adbc34b635275cf9cf2276a34c5b3634311a36011af72bb9f141306743d46216
-
memory/1240-1086-0x0000000000BC0000-0x0000000000BF2000-memory.dmpFilesize
200KB
-
memory/1240-1087-0x0000000005790000-0x00000000057A0000-memory.dmpFilesize
64KB
-
memory/1240-1088-0x0000000005790000-0x00000000057A0000-memory.dmpFilesize
64KB
-
memory/3240-147-0x0000000000F30000-0x0000000000F3A000-memory.dmpFilesize
40KB
-
memory/4876-189-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-203-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-157-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-156-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-158-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-159-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-161-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-169-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-171-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-173-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-175-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-167-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-165-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-163-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-177-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-179-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-181-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-183-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-185-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-187-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-154-0x0000000000610000-0x000000000065B000-memory.dmpFilesize
300KB
-
memory/4876-191-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-193-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-195-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-197-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-199-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-201-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-155-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-205-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-207-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-211-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-209-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-213-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-215-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-217-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-219-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-221-0x0000000002560000-0x000000000259F000-memory.dmpFilesize
252KB
-
memory/4876-1064-0x00000000051D0000-0x00000000057E8000-memory.dmpFilesize
6.1MB
-
memory/4876-1065-0x00000000057F0000-0x00000000058FA000-memory.dmpFilesize
1.0MB
-
memory/4876-1066-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4876-1067-0x0000000004BD0000-0x0000000004C0C000-memory.dmpFilesize
240KB
-
memory/4876-1068-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-1070-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-1071-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-1072-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4876-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4876-1075-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/4876-153-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/4876-1076-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/4876-1077-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4876-1078-0x00000000066A0000-0x0000000006862000-memory.dmpFilesize
1.8MB
-
memory/4876-1079-0x0000000006870000-0x0000000006D9C000-memory.dmpFilesize
5.2MB