Analysis
-
max time kernel
60s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:58
Static task
static1
Behavioral task
behavioral1
Sample
e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe
Resource
win10v2004-20230220-en
General
-
Target
e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe
-
Size
533KB
-
MD5
33f914b2b49999a89cb86105bf41bd04
-
SHA1
efb24410ff695bfe3eaa5be6115e024365911011
-
SHA256
e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765
-
SHA512
dee3d5996458a03caf03fae0bf9dad23131d6a133f545223b5bd91e2a52f3614a797cb9d4140162ae0e36a35c3b80031dbe7b6f4d7a2581b907fffe09c6c23d1
-
SSDEEP
12288:TMrry90vI1c9++W2us7dW83b8mNyMjNTOp3Lq+hFJloy3L6SuO:gyvc8N2ubG8pM5Op3G+hloy3uSuO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr387431.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr387431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr387431.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr387431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr387431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr387431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr387431.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/1084-154-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-155-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-165-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-163-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-159-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-167-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-169-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-171-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-173-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-175-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-177-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-179-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-181-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-183-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-185-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-187-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-189-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-193-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-191-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-195-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-197-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-199-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-201-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-203-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-205-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-207-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-209-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-211-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-213-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-215-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-217-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-219-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-221-0x00000000060C0000-0x00000000060FF000-memory.dmp family_redline behavioral1/memory/1084-1073-0x00000000062B0000-0x00000000062C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zizc1180.exejr387431.exeku732245.exelr397974.exepid process 2100 zizc1180.exe 1292 jr387431.exe 1084 ku732245.exe 3820 lr397974.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr387431.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr387431.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exezizc1180.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizc1180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizc1180.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5044 1084 WerFault.exe ku732245.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr387431.exeku732245.exelr397974.exepid process 1292 jr387431.exe 1292 jr387431.exe 1084 ku732245.exe 1084 ku732245.exe 3820 lr397974.exe 3820 lr397974.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr387431.exeku732245.exelr397974.exedescription pid process Token: SeDebugPrivilege 1292 jr387431.exe Token: SeDebugPrivilege 1084 ku732245.exe Token: SeDebugPrivilege 3820 lr397974.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exezizc1180.exedescription pid process target process PID 4224 wrote to memory of 2100 4224 e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe zizc1180.exe PID 4224 wrote to memory of 2100 4224 e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe zizc1180.exe PID 4224 wrote to memory of 2100 4224 e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe zizc1180.exe PID 2100 wrote to memory of 1292 2100 zizc1180.exe jr387431.exe PID 2100 wrote to memory of 1292 2100 zizc1180.exe jr387431.exe PID 2100 wrote to memory of 1084 2100 zizc1180.exe ku732245.exe PID 2100 wrote to memory of 1084 2100 zizc1180.exe ku732245.exe PID 2100 wrote to memory of 1084 2100 zizc1180.exe ku732245.exe PID 4224 wrote to memory of 3820 4224 e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe lr397974.exe PID 4224 wrote to memory of 3820 4224 e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe lr397974.exe PID 4224 wrote to memory of 3820 4224 e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe lr397974.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe"C:\Users\Admin\AppData\Local\Temp\e80c565f9fe45a571700bd75a2a89df91b7b6f76f06f93924e0eaa747f340765.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizc1180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizc1180.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr387431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr387431.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku732245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku732245.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 13644⤵
- Program crash
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr397974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr397974.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1084 -ip 10841⤵PID:4680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr397974.exeFilesize
175KB
MD5e6433dce4b18da2cc90faada22cb1d50
SHA1cca62e812ca5b8e650b3a88a1b3ecc9007400d7c
SHA25624637c4d1bde940d0b28a70d738172bae9e37c51dd8608bc13f9413c12242de3
SHA51213cdd2a00b4e895d99e9f10c8095cab2682096915af528804dc0cccb36c40b5973899bdde6e8a3c22ef2e25d7f4d898fa93a329d1c08c36db2a7f94425505ea1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr397974.exeFilesize
175KB
MD5e6433dce4b18da2cc90faada22cb1d50
SHA1cca62e812ca5b8e650b3a88a1b3ecc9007400d7c
SHA25624637c4d1bde940d0b28a70d738172bae9e37c51dd8608bc13f9413c12242de3
SHA51213cdd2a00b4e895d99e9f10c8095cab2682096915af528804dc0cccb36c40b5973899bdde6e8a3c22ef2e25d7f4d898fa93a329d1c08c36db2a7f94425505ea1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizc1180.exeFilesize
391KB
MD5cd87069ebe6fb83d21bfad710af489cd
SHA1f065e8ac6763331c4032ddf5e9acc4e9224d31d7
SHA256fbfe5d9d63fa7f0098f2bfe8bb7af8fc2f5620d14a9071368a9b5aae6b01c0f2
SHA51226d7c2074049fa9e5b59bf1423892ee320b2af7cb5ace3304abd2122333b2091e5fdbda41eca5abbb0b0a1a29ef794f55ec8ea3c924bf3741eb6f4ca9bc3331a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizc1180.exeFilesize
391KB
MD5cd87069ebe6fb83d21bfad710af489cd
SHA1f065e8ac6763331c4032ddf5e9acc4e9224d31d7
SHA256fbfe5d9d63fa7f0098f2bfe8bb7af8fc2f5620d14a9071368a9b5aae6b01c0f2
SHA51226d7c2074049fa9e5b59bf1423892ee320b2af7cb5ace3304abd2122333b2091e5fdbda41eca5abbb0b0a1a29ef794f55ec8ea3c924bf3741eb6f4ca9bc3331a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr387431.exeFilesize
11KB
MD5a8bf80c4df8bde84af9bf4a52acba510
SHA16e6597cc70b5c55a01b401a869a6e5f2f0274515
SHA25640b8368bb7faa32c001d2602568520fc8ac8d13e69d264dfa70d51562bcaae5d
SHA5127d5c93fb8648c0bf2fbda1267e81e59c1c66c675e41a224294f348a697e4300efbfc29974fa27e674c2bac2e1d7014b32b5503cf1edd754cb4578cb0d1d3259c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr387431.exeFilesize
11KB
MD5a8bf80c4df8bde84af9bf4a52acba510
SHA16e6597cc70b5c55a01b401a869a6e5f2f0274515
SHA25640b8368bb7faa32c001d2602568520fc8ac8d13e69d264dfa70d51562bcaae5d
SHA5127d5c93fb8648c0bf2fbda1267e81e59c1c66c675e41a224294f348a697e4300efbfc29974fa27e674c2bac2e1d7014b32b5503cf1edd754cb4578cb0d1d3259c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku732245.exeFilesize
359KB
MD50daa488beeeb7b66a1927fe0c51f5b18
SHA139159d332843934ca8710debe0b84ab863f2392e
SHA2564608a1b1fabc0327dc3f87a63871dce38eff013e2f727e9689f9ed33b41a42a6
SHA512625632834af6c73a879cfc8eb3f124e44adc2a09d672c579271e019789ca24f243bf4b6df016410234e8c619bd3908b80f4a87a9738e4e80970e54b857c03d9d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku732245.exeFilesize
359KB
MD50daa488beeeb7b66a1927fe0c51f5b18
SHA139159d332843934ca8710debe0b84ab863f2392e
SHA2564608a1b1fabc0327dc3f87a63871dce38eff013e2f727e9689f9ed33b41a42a6
SHA512625632834af6c73a879cfc8eb3f124e44adc2a09d672c579271e019789ca24f243bf4b6df016410234e8c619bd3908b80f4a87a9738e4e80970e54b857c03d9d
-
memory/1084-153-0x00000000062C0000-0x0000000006864000-memory.dmpFilesize
5.6MB
-
memory/1084-154-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-155-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-157-0x0000000001C80000-0x0000000001CCB000-memory.dmpFilesize
300KB
-
memory/1084-158-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-160-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-162-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-165-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-163-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-159-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-167-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-169-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-171-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-173-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-175-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-177-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-179-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-181-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-183-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-185-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-187-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-189-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-193-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-191-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-195-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-197-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-199-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-201-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-203-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-205-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-207-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-209-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-211-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-213-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-215-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-217-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-219-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-221-0x00000000060C0000-0x00000000060FF000-memory.dmpFilesize
252KB
-
memory/1084-1064-0x0000000006870000-0x0000000006E88000-memory.dmpFilesize
6.1MB
-
memory/1084-1065-0x0000000006EE0000-0x0000000006FEA000-memory.dmpFilesize
1.0MB
-
memory/1084-1066-0x0000000007020000-0x0000000007032000-memory.dmpFilesize
72KB
-
memory/1084-1067-0x0000000007040000-0x000000000707C000-memory.dmpFilesize
240KB
-
memory/1084-1068-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-1070-0x0000000007330000-0x00000000073C2000-memory.dmpFilesize
584KB
-
memory/1084-1071-0x00000000073D0000-0x0000000007436000-memory.dmpFilesize
408KB
-
memory/1084-1074-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-1073-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-1072-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1084-1075-0x0000000007F30000-0x0000000007FA6000-memory.dmpFilesize
472KB
-
memory/1084-1076-0x0000000007FB0000-0x0000000008000000-memory.dmpFilesize
320KB
-
memory/1084-1077-0x0000000008020000-0x00000000081E2000-memory.dmpFilesize
1.8MB
-
memory/1084-1078-0x0000000008200000-0x000000000872C000-memory.dmpFilesize
5.2MB
-
memory/1084-1079-0x00000000062B0000-0x00000000062C0000-memory.dmpFilesize
64KB
-
memory/1292-147-0x0000000000CD0000-0x0000000000CDA000-memory.dmpFilesize
40KB
-
memory/3820-1085-0x0000000000850000-0x0000000000882000-memory.dmpFilesize
200KB
-
memory/3820-1086-0x0000000005270000-0x0000000005280000-memory.dmpFilesize
64KB