Analysis
-
max time kernel
60s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe
Resource
win10v2004-20230220-en
General
-
Target
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe
-
Size
530KB
-
MD5
31d9b4f28f11337f9a582e317ec07ac4
-
SHA1
bbf881e49d61adc607d6c1279d3dfb378581c1e9
-
SHA256
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa
-
SHA512
3b215f61824230e14bd8716b95b7b5c1b326e377e66c75488052253e208199ba17eb3cf8eb584b7fd7061f22ad890d1fdcb30452cb9e302c8e5f1f4e107fef88
-
SSDEEP
12288:nMrOy90/9cbdXV5m16m8asK8G0i/wf5KXa/3mOj00zNkS:py62b0n8BWkA0mDgSS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr593563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr593563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr593563.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr593563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr593563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr593563.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4348-158-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-159-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-161-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-163-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-165-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-167-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-169-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-171-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-173-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-175-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-177-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-179-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-181-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-183-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-185-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-187-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-189-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-191-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-193-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-195-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-197-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-199-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-201-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-203-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-205-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-207-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-209-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-211-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-213-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-215-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-221-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-219-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/4348-217-0x0000000002540000-0x000000000257F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3588 ziQm6127.exe 2200 jr593563.exe 4348 ku106675.exe 1964 lr409156.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr593563.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQm6127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQm6127.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3356 4348 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2200 jr593563.exe 2200 jr593563.exe 4348 ku106675.exe 4348 ku106675.exe 1964 lr409156.exe 1964 lr409156.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2200 jr593563.exe Token: SeDebugPrivilege 4348 ku106675.exe Token: SeDebugPrivilege 1964 lr409156.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3588 3480 fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe 84 PID 3480 wrote to memory of 3588 3480 fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe 84 PID 3480 wrote to memory of 3588 3480 fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe 84 PID 3588 wrote to memory of 2200 3588 ziQm6127.exe 85 PID 3588 wrote to memory of 2200 3588 ziQm6127.exe 85 PID 3588 wrote to memory of 4348 3588 ziQm6127.exe 90 PID 3588 wrote to memory of 4348 3588 ziQm6127.exe 90 PID 3588 wrote to memory of 4348 3588 ziQm6127.exe 90 PID 3480 wrote to memory of 1964 3480 fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe 97 PID 3480 wrote to memory of 1964 3480 fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe 97 PID 3480 wrote to memory of 1964 3480 fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe"C:\Users\Admin\AppData\Local\Temp\fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQm6127.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQm6127.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593563.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593563.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106675.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 13484⤵
- Program crash
PID:3356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr409156.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr409156.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 43481⤵PID:2068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5e6b3c5d2fbe1164faa24f5cf38e9a600
SHA1c3c20a7352b563a78bfe21741a7dae4f8c0e0421
SHA2568a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b
SHA512da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3
-
Filesize
176KB
MD5e6b3c5d2fbe1164faa24f5cf38e9a600
SHA1c3c20a7352b563a78bfe21741a7dae4f8c0e0421
SHA2568a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b
SHA512da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3
-
Filesize
388KB
MD571f010634628d11fe0791bfd7709af3b
SHA12768e91519f1cd02cbed0f935d3d42a9c643af35
SHA2569cf1891bad0e3f290c31e6e9120532a23454a0f1b54d5b302a0e4498fd58132b
SHA51281ffb0e3f6c7f6fdab835105f078d928d6a2bc624884bd4ab42dc4abd81ba50b4368f92ae017cc4d3f55b2747dd26b7d5b4ca788feff95823b568c00355e6ab0
-
Filesize
388KB
MD571f010634628d11fe0791bfd7709af3b
SHA12768e91519f1cd02cbed0f935d3d42a9c643af35
SHA2569cf1891bad0e3f290c31e6e9120532a23454a0f1b54d5b302a0e4498fd58132b
SHA51281ffb0e3f6c7f6fdab835105f078d928d6a2bc624884bd4ab42dc4abd81ba50b4368f92ae017cc4d3f55b2747dd26b7d5b4ca788feff95823b568c00355e6ab0
-
Filesize
11KB
MD5c03596ec3b9b4fed22cb5ef9c2503328
SHA1039c09401e37443b110ef54bb60c6a6179e515ae
SHA2563c58815269669ab9f7f7045a8da546a0af5320124a811d5a5b5cf064fa2df902
SHA5125783cc3b61cad0a40182eff16c08d0f0fed9f8563c6bd83f1a2a025a49911daca9b2835cc2afab60d64544f5cd07b8c362564155a458645e4ed183c1b686abad
-
Filesize
11KB
MD5c03596ec3b9b4fed22cb5ef9c2503328
SHA1039c09401e37443b110ef54bb60c6a6179e515ae
SHA2563c58815269669ab9f7f7045a8da546a0af5320124a811d5a5b5cf064fa2df902
SHA5125783cc3b61cad0a40182eff16c08d0f0fed9f8563c6bd83f1a2a025a49911daca9b2835cc2afab60d64544f5cd07b8c362564155a458645e4ed183c1b686abad
-
Filesize
434KB
MD52a0be5d63db9e4853bab7ac74e810aa2
SHA168990a7b8747f3cc2461cadf795dbb922c30fb83
SHA256dadac54c761fa20c1bcd5ec250cdbc3fb4ba4ee321e1c4cb91ffefe212c41280
SHA512746f524bf428ea733960d8cac9a061ce8c24d9bf26b3f967118700271759f21c4b951f973f42e5f3db7c37c9e8a181eb4b93805a37c86c03cc4bada22a9e007f
-
Filesize
434KB
MD52a0be5d63db9e4853bab7ac74e810aa2
SHA168990a7b8747f3cc2461cadf795dbb922c30fb83
SHA256dadac54c761fa20c1bcd5ec250cdbc3fb4ba4ee321e1c4cb91ffefe212c41280
SHA512746f524bf428ea733960d8cac9a061ce8c24d9bf26b3f967118700271759f21c4b951f973f42e5f3db7c37c9e8a181eb4b93805a37c86c03cc4bada22a9e007f