Analysis
-
max time kernel
66s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 03:35
Static task
static1
Behavioral task
behavioral1
Sample
5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe
Resource
win10v2004-20230221-en
General
-
Target
5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe
-
Size
534KB
-
MD5
a92ee1566ef81aaab23f2737b0983c98
-
SHA1
c1a16fd2d1a717020ba7c3d12cb70a4e66a23b92
-
SHA256
5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193
-
SHA512
d8cb5d466369f13058f41f4f0dce82e4b8fdc6408d494f9c62591285e3051e81f7a2dc330dc4d10db5c3cbc8640929f0c4c2e6deff0fe0f27e31c1ef656f91d9
-
SSDEEP
12288:0Mruy90rdQExDkYnTqI1+uzEbMW9HMIZ/Cu:SyGdQGDkYnTqI1+uzsMMHMu/z
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr846664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr846664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr846664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr846664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr846664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr846664.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2812-156-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-159-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-157-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-162-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-167-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-169-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-171-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-173-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-175-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-177-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-179-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-181-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-187-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/2812-1072-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5116 ziln9994.exe 1172 jr846664.exe 2812 ku368528.exe 4500 lr433327.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr846664.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziln9994.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziln9994.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1884 2812 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1172 jr846664.exe 1172 jr846664.exe 2812 ku368528.exe 2812 ku368528.exe 4500 lr433327.exe 4500 lr433327.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1172 jr846664.exe Token: SeDebugPrivilege 2812 ku368528.exe Token: SeDebugPrivilege 4500 lr433327.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4936 wrote to memory of 5116 4936 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe 82 PID 4936 wrote to memory of 5116 4936 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe 82 PID 4936 wrote to memory of 5116 4936 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe 82 PID 5116 wrote to memory of 1172 5116 ziln9994.exe 83 PID 5116 wrote to memory of 1172 5116 ziln9994.exe 83 PID 5116 wrote to memory of 2812 5116 ziln9994.exe 84 PID 5116 wrote to memory of 2812 5116 ziln9994.exe 84 PID 5116 wrote to memory of 2812 5116 ziln9994.exe 84 PID 4936 wrote to memory of 4500 4936 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe 88 PID 4936 wrote to memory of 4500 4936 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe 88 PID 4936 wrote to memory of 4500 4936 5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe"C:\Users\Admin\AppData\Local\Temp\5e441e69dbcb3b259068717af77e6352847d4d1c1cf366fe34b09b4f79ffc193.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziln9994.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziln9994.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr846664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr846664.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368528.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 15124⤵
- Program crash
PID:1884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr433327.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr433327.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2812 -ip 28121⤵PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5309154770b279b516c7a2290c824c313
SHA17456fb3e2a10382fcdd1a95ab69b080c7d0458b3
SHA256f41c9328955c6cce7bb6ad30a33fb9a0e34918189252453105565b68689b93d7
SHA51262408da88662a8d3a3de5b7f8c44e3746eade894229de8b34b1572133602303758fb6982814006b241ca08034f4d8509997d09638dc0bef0af2abbf8f2f094a1
-
Filesize
176KB
MD5309154770b279b516c7a2290c824c313
SHA17456fb3e2a10382fcdd1a95ab69b080c7d0458b3
SHA256f41c9328955c6cce7bb6ad30a33fb9a0e34918189252453105565b68689b93d7
SHA51262408da88662a8d3a3de5b7f8c44e3746eade894229de8b34b1572133602303758fb6982814006b241ca08034f4d8509997d09638dc0bef0af2abbf8f2f094a1
-
Filesize
392KB
MD5a1ceb90f2591999584a5b2cf47591991
SHA19006d2e6a1e259b7b9a344d11b6913dcb4aac7ff
SHA256231b7950bb1dbe4560f93393dfa7a1f04576cb4d4725aef05c8e6f164ec32cca
SHA512127de5ac3c02c5f439bd0b48f52139f9e7349fafa5ddedb962f77d963fd59749515b03ad0ab96be672ba63dab8450eef87c4b35ec8434805b859c62fbb982a2e
-
Filesize
392KB
MD5a1ceb90f2591999584a5b2cf47591991
SHA19006d2e6a1e259b7b9a344d11b6913dcb4aac7ff
SHA256231b7950bb1dbe4560f93393dfa7a1f04576cb4d4725aef05c8e6f164ec32cca
SHA512127de5ac3c02c5f439bd0b48f52139f9e7349fafa5ddedb962f77d963fd59749515b03ad0ab96be672ba63dab8450eef87c4b35ec8434805b859c62fbb982a2e
-
Filesize
12KB
MD5a297999e97030cc3c6440ed7bc992443
SHA1b93a205a359cc9997da4ce41104808046703674f
SHA256f36f58c28882205e8875bd027cf8422656ee22275ac2bd5d3abe64e99e015aaf
SHA5122ae24eb70cddf84bc604514278dbde2ea968b51ccd046afec2664fe9107e7eaf7b7c99944277247d44705cede6a1ccccb3d2d0d6fc15445879165942828a5a7a
-
Filesize
12KB
MD5a297999e97030cc3c6440ed7bc992443
SHA1b93a205a359cc9997da4ce41104808046703674f
SHA256f36f58c28882205e8875bd027cf8422656ee22275ac2bd5d3abe64e99e015aaf
SHA5122ae24eb70cddf84bc604514278dbde2ea968b51ccd046afec2664fe9107e7eaf7b7c99944277247d44705cede6a1ccccb3d2d0d6fc15445879165942828a5a7a
-
Filesize
319KB
MD55df111d9f2f7b53d81da8e0781a1b8dc
SHA12ab213d9240ed9d5f82b38dcae66bd8e9d5c3f4c
SHA256c8874ff69abce99d7c007806a97b566091e627601b49b2aa23f6c09bf44678d0
SHA5120dcdc4906ef2e68b65d6c0e53becca485dc2ac3087c2cd0be8918e328d7dc61c1ad7719e74b7836a772e16fea55c4f5e16537c2f4da40e71dba7e035408500de
-
Filesize
319KB
MD55df111d9f2f7b53d81da8e0781a1b8dc
SHA12ab213d9240ed9d5f82b38dcae66bd8e9d5c3f4c
SHA256c8874ff69abce99d7c007806a97b566091e627601b49b2aa23f6c09bf44678d0
SHA5120dcdc4906ef2e68b65d6c0e53becca485dc2ac3087c2cd0be8918e328d7dc61c1ad7719e74b7836a772e16fea55c4f5e16537c2f4da40e71dba7e035408500de