Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:34
Static task
static1
Behavioral task
behavioral1
Sample
64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe
Resource
win10v2004-20230220-en
General
-
Target
64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe
-
Size
533KB
-
MD5
df91abf78e8011c425ee87ffda099ecf
-
SHA1
6732a0b313d238251370f54ff9bb9fd8083132ed
-
SHA256
64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf
-
SHA512
6b1cad7bb8258e4d7e3107d39063c7e1a8028882f8c9d56b39fc2c61a68dd6c95376b19688589d5533c04dd6faf827c43cdb03175c606c3e38d1f5c16b58f177
-
SSDEEP
12288:yMrOy900dKsiedYXjnSusJl7HaRDzWzBYwK3Lqt2eQ6nzRCG:IyBsLGYznSuEludzNwK3Gt2eJzRCG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr710235.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr710235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr710235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr710235.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr710235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr710235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr710235.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/116-155-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-156-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-158-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-160-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-162-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-164-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-166-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-168-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-171-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-177-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-174-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-179-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-181-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-183-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-185-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-187-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-189-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-191-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-193-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-195-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-197-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-199-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-201-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-203-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-205-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-207-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-209-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-211-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-213-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-215-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-217-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-219-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-221-0x0000000003B90000-0x0000000003BCF000-memory.dmp family_redline behavioral1/memory/116-1074-0x00000000038D0000-0x00000000038E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zikV2487.exejr710235.exeku628396.exelr260058.exepid process 1448 zikV2487.exe 2128 jr710235.exe 116 ku628396.exe 2908 lr260058.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr710235.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr710235.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exezikV2487.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zikV2487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikV2487.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3820 116 WerFault.exe ku628396.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr710235.exeku628396.exelr260058.exepid process 2128 jr710235.exe 2128 jr710235.exe 116 ku628396.exe 116 ku628396.exe 2908 lr260058.exe 2908 lr260058.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr710235.exeku628396.exelr260058.exedescription pid process Token: SeDebugPrivilege 2128 jr710235.exe Token: SeDebugPrivilege 116 ku628396.exe Token: SeDebugPrivilege 2908 lr260058.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exezikV2487.exedescription pid process target process PID 4448 wrote to memory of 1448 4448 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe zikV2487.exe PID 4448 wrote to memory of 1448 4448 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe zikV2487.exe PID 4448 wrote to memory of 1448 4448 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe zikV2487.exe PID 1448 wrote to memory of 2128 1448 zikV2487.exe jr710235.exe PID 1448 wrote to memory of 2128 1448 zikV2487.exe jr710235.exe PID 1448 wrote to memory of 116 1448 zikV2487.exe ku628396.exe PID 1448 wrote to memory of 116 1448 zikV2487.exe ku628396.exe PID 1448 wrote to memory of 116 1448 zikV2487.exe ku628396.exe PID 4448 wrote to memory of 2908 4448 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe lr260058.exe PID 4448 wrote to memory of 2908 4448 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe lr260058.exe PID 4448 wrote to memory of 2908 4448 64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe lr260058.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe"C:\Users\Admin\AppData\Local\Temp\64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 19004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 116 -ip 1161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exeFilesize
175KB
MD517918356f985217bfc8c5f196f4bf201
SHA160d12066125f703670258e503e184b0df8bde229
SHA256fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5
SHA5128af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exeFilesize
175KB
MD517918356f985217bfc8c5f196f4bf201
SHA160d12066125f703670258e503e184b0df8bde229
SHA256fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5
SHA5128af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exeFilesize
391KB
MD51be90ce03b39fd86d57b8159bbb64786
SHA19796c0105e8c89817db6326fb031455d90067d0f
SHA256b78ea1c6f2fe7deca0009c5b8ad995fe417be75ac7e13b368f7a7061bf8800c1
SHA512ac7c1fb857d40a34be02ab9be54ad62189d67873483cb0527a3a21f111517ab1210789d9b0d00a3776cb6e371d43db43b1452ecd3d970059f839b4c8fbc6ccc8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exeFilesize
391KB
MD51be90ce03b39fd86d57b8159bbb64786
SHA19796c0105e8c89817db6326fb031455d90067d0f
SHA256b78ea1c6f2fe7deca0009c5b8ad995fe417be75ac7e13b368f7a7061bf8800c1
SHA512ac7c1fb857d40a34be02ab9be54ad62189d67873483cb0527a3a21f111517ab1210789d9b0d00a3776cb6e371d43db43b1452ecd3d970059f839b4c8fbc6ccc8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exeFilesize
11KB
MD552be802c6b06a586dc2e8a4fccc6d075
SHA176904ad8f17c83d0cc1233407540b6b331ba0284
SHA2560fcb74c81aba859b155329895f2e8485ead4404ac9ccc8e182da55d8702abe02
SHA512152413ee88e7f0cce9b7f1b163bfd9ceb78b3c14041a3cea1a5fac9e9408f17cc3b9f1e49b6b817b24b91faa3626ee4a03fd35ee8bbef55d79599fc191098959
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exeFilesize
11KB
MD552be802c6b06a586dc2e8a4fccc6d075
SHA176904ad8f17c83d0cc1233407540b6b331ba0284
SHA2560fcb74c81aba859b155329895f2e8485ead4404ac9ccc8e182da55d8702abe02
SHA512152413ee88e7f0cce9b7f1b163bfd9ceb78b3c14041a3cea1a5fac9e9408f17cc3b9f1e49b6b817b24b91faa3626ee4a03fd35ee8bbef55d79599fc191098959
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exeFilesize
359KB
MD554d5a5fe693a10f3b6a6a4f56175a760
SHA1f040718a0766a15f8f696253b6eeca3d0f11e236
SHA25681e8013c8c39182d29a6f623f630acbc7a770cd38c8451e3c35b7fe8aa11b84e
SHA5122c9c61a28002d1856de68aa99ed32b68cf5d1850d05ed2669952e932f892c140a9df6bc8caab9597bf2d1f2291e110f4a98b1b91a0cbb331552aeb0480cf00d7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exeFilesize
359KB
MD554d5a5fe693a10f3b6a6a4f56175a760
SHA1f040718a0766a15f8f696253b6eeca3d0f11e236
SHA25681e8013c8c39182d29a6f623f630acbc7a770cd38c8451e3c35b7fe8aa11b84e
SHA5122c9c61a28002d1856de68aa99ed32b68cf5d1850d05ed2669952e932f892c140a9df6bc8caab9597bf2d1f2291e110f4a98b1b91a0cbb331552aeb0480cf00d7
-
memory/116-153-0x0000000001C50000-0x0000000001C9B000-memory.dmpFilesize
300KB
-
memory/116-154-0x0000000006300000-0x00000000068A4000-memory.dmpFilesize
5.6MB
-
memory/116-155-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-156-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-158-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-160-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-162-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-164-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-166-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-168-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-171-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-172-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-170-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-175-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-177-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-174-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-179-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-181-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-183-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-185-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-187-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-189-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-191-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-193-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-195-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-197-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-199-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-201-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-203-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-205-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-207-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-209-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-211-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-213-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-215-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-217-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-219-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-221-0x0000000003B90000-0x0000000003BCF000-memory.dmpFilesize
252KB
-
memory/116-1064-0x00000000069B0000-0x0000000006FC8000-memory.dmpFilesize
6.1MB
-
memory/116-1065-0x0000000006FD0000-0x00000000070DA000-memory.dmpFilesize
1.0MB
-
memory/116-1066-0x0000000003CE0000-0x0000000003CF2000-memory.dmpFilesize
72KB
-
memory/116-1067-0x0000000003D00000-0x0000000003D3C000-memory.dmpFilesize
240KB
-
memory/116-1068-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-1070-0x0000000007330000-0x00000000073C2000-memory.dmpFilesize
584KB
-
memory/116-1071-0x00000000073D0000-0x0000000007436000-memory.dmpFilesize
408KB
-
memory/116-1073-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-1072-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-1074-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-1075-0x0000000007D30000-0x0000000007EF2000-memory.dmpFilesize
1.8MB
-
memory/116-1076-0x0000000007F10000-0x000000000843C000-memory.dmpFilesize
5.2MB
-
memory/116-1077-0x00000000038D0000-0x00000000038E0000-memory.dmpFilesize
64KB
-
memory/116-1078-0x00000000086D0000-0x0000000008746000-memory.dmpFilesize
472KB
-
memory/116-1079-0x0000000008750000-0x00000000087A0000-memory.dmpFilesize
320KB
-
memory/2128-147-0x0000000000720000-0x000000000072A000-memory.dmpFilesize
40KB
-
memory/2908-1085-0x0000000000A20000-0x0000000000A52000-memory.dmpFilesize
200KB
-
memory/2908-1086-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB