Analysis
-
max time kernel
75s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 19:59
Static task
static1
Behavioral task
behavioral1
Sample
099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe
Resource
win10v2004-20230220-en
General
-
Target
099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe
-
Size
534KB
-
MD5
3b9b03307fabde5c308e0f6c95558887
-
SHA1
524e2493253deed98b075adc6f3551f496d64f92
-
SHA256
099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc
-
SHA512
02948b08ab972954b8c25d51dc95916e8ecfb860906a17aba67a92ca74c44167580e7ec8006d7c0f965037927522d02c2875f600d3b4b79e9b67c9d16e221182
-
SSDEEP
12288:kMr1y90E2qvLfz/QxGJBj4IvWObtrlBd0gDzr92I/09Bi:By7LL/QEJfbDr04Z2I/Ik
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr548050.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr548050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr548050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr548050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr548050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr548050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr548050.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2800-158-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-159-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-161-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-163-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-165-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-167-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-169-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-171-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-173-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-175-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-177-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-179-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-181-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-183-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-185-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-187-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-189-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-191-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-193-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-195-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-197-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-199-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-201-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-203-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-205-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-207-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-209-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-211-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-213-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-215-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-217-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-219-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/2800-221-0x0000000002630000-0x000000000266F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziuC0090.exejr548050.exeku918166.exelr239996.exepid process 1908 ziuC0090.exe 1788 jr548050.exe 2800 ku918166.exe 1672 lr239996.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr548050.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr548050.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exeziuC0090.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziuC0090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuC0090.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 180 2800 WerFault.exe ku918166.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr548050.exeku918166.exelr239996.exepid process 1788 jr548050.exe 1788 jr548050.exe 2800 ku918166.exe 2800 ku918166.exe 1672 lr239996.exe 1672 lr239996.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr548050.exeku918166.exelr239996.exedescription pid process Token: SeDebugPrivilege 1788 jr548050.exe Token: SeDebugPrivilege 2800 ku918166.exe Token: SeDebugPrivilege 1672 lr239996.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exeziuC0090.exedescription pid process target process PID 4600 wrote to memory of 1908 4600 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe ziuC0090.exe PID 4600 wrote to memory of 1908 4600 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe ziuC0090.exe PID 4600 wrote to memory of 1908 4600 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe ziuC0090.exe PID 1908 wrote to memory of 1788 1908 ziuC0090.exe jr548050.exe PID 1908 wrote to memory of 1788 1908 ziuC0090.exe jr548050.exe PID 1908 wrote to memory of 2800 1908 ziuC0090.exe ku918166.exe PID 1908 wrote to memory of 2800 1908 ziuC0090.exe ku918166.exe PID 1908 wrote to memory of 2800 1908 ziuC0090.exe ku918166.exe PID 4600 wrote to memory of 1672 4600 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe lr239996.exe PID 4600 wrote to memory of 1672 4600 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe lr239996.exe PID 4600 wrote to memory of 1672 4600 099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe lr239996.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe"C:\Users\Admin\AppData\Local\Temp\099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 15404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2800 -ip 28001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exeFilesize
175KB
MD5320ed9a07da95271730c1208187f92b7
SHA1540d7cf11521bf862f6efe15edf266b953c72645
SHA256491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af
SHA5122190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exeFilesize
175KB
MD5320ed9a07da95271730c1208187f92b7
SHA1540d7cf11521bf862f6efe15edf266b953c72645
SHA256491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af
SHA5122190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exeFilesize
392KB
MD52fdf60765d431370c0e221b47945dfd0
SHA13df1b9f83552e998503a5daee537bef00bc1c909
SHA256946ebc977e561e52944fde9deb498efaa13be335545140308d74319921f517bc
SHA512a7d683ab05e25d21845fef48e3fa69b28efaea5bc71edcc49070279620e2e718bb706dc5a04668ff55e5219254a00ab62f28209f7805f90fa576f5f6ebea026f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exeFilesize
392KB
MD52fdf60765d431370c0e221b47945dfd0
SHA13df1b9f83552e998503a5daee537bef00bc1c909
SHA256946ebc977e561e52944fde9deb498efaa13be335545140308d74319921f517bc
SHA512a7d683ab05e25d21845fef48e3fa69b28efaea5bc71edcc49070279620e2e718bb706dc5a04668ff55e5219254a00ab62f28209f7805f90fa576f5f6ebea026f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exeFilesize
11KB
MD5e8ce8f79cd6b77821269a3be231d2fc3
SHA193bd2f9caadf6032a08507cb762eacb1b2418a65
SHA256bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639
SHA51258bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exeFilesize
11KB
MD5e8ce8f79cd6b77821269a3be231d2fc3
SHA193bd2f9caadf6032a08507cb762eacb1b2418a65
SHA256bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639
SHA51258bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exeFilesize
318KB
MD57b842750a5f430b4ce80f595776ee02b
SHA1daad51ebb91bf0984b4091ac8dc18d30bcd0cae8
SHA256fde30d2b2834df5643b16871ccb96aaa7a7d47e1452192c1a0bc2b5c7fb8767c
SHA5125f86dff188a2e309e59e1da41035e0e2d4eb80e373916da6e44ac9d4f0803968e8c4e7943cbf8534ad453fdadabd60ab7b2df93106ed164de2e1e53a134c61f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exeFilesize
318KB
MD57b842750a5f430b4ce80f595776ee02b
SHA1daad51ebb91bf0984b4091ac8dc18d30bcd0cae8
SHA256fde30d2b2834df5643b16871ccb96aaa7a7d47e1452192c1a0bc2b5c7fb8767c
SHA5125f86dff188a2e309e59e1da41035e0e2d4eb80e373916da6e44ac9d4f0803968e8c4e7943cbf8534ad453fdadabd60ab7b2df93106ed164de2e1e53a134c61f1
-
memory/1672-1085-0x0000000000570000-0x00000000005A2000-memory.dmpFilesize
200KB
-
memory/1672-1086-0x00000000050F0000-0x0000000005100000-memory.dmpFilesize
64KB
-
memory/1788-147-0x0000000000AF0000-0x0000000000AFA000-memory.dmpFilesize
40KB
-
memory/2800-189-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-201-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-155-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-156-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-157-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-158-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-159-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-161-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-163-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-165-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-167-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-169-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-171-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-173-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-175-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-177-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-179-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-181-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-183-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-185-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-187-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-153-0x0000000002140000-0x000000000218B000-memory.dmpFilesize
300KB
-
memory/2800-191-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-193-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-195-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-197-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-199-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-154-0x0000000004C50000-0x00000000051F4000-memory.dmpFilesize
5.6MB
-
memory/2800-203-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-205-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-207-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-209-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-211-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-213-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-215-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-217-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-219-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-221-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/2800-1064-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/2800-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2800-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2800-1067-0x0000000005A40000-0x0000000005A7C000-memory.dmpFilesize
240KB
-
memory/2800-1068-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/2800-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/2800-1072-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-1073-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-1074-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-1075-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/2800-1076-0x0000000006690000-0x0000000006BBC000-memory.dmpFilesize
5.2MB
-
memory/2800-1077-0x0000000004C40000-0x0000000004C50000-memory.dmpFilesize
64KB
-
memory/2800-1078-0x0000000007090000-0x0000000007106000-memory.dmpFilesize
472KB
-
memory/2800-1079-0x0000000007110000-0x0000000007160000-memory.dmpFilesize
320KB