Analysis
-
max time kernel
94s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe
Resource
win10v2004-20230220-en
General
-
Target
e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe
-
Size
534KB
-
MD5
8d24c3f4be067a0c7c7e16aaacb2a7b5
-
SHA1
c325048298226823b57376b17394d79d01d26b4a
-
SHA256
e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3
-
SHA512
6ff0c61b25badd1ee7c406aa562e35eba93d3fbd7cecb8ea41cf6a9b6382a2491cd60e919c5091b1b958ee7ca54b35c5faf0d9056b56e6521a2cdd05df1c1bfd
-
SSDEEP
12288:YMrCy90zPzsktY3pnGG84H1zObPWKYsJEcB9JWZ:qy6r23pXH1z2P1JjY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr589328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr589328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr589328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr589328.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr589328.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr589328.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
resource yara_rule behavioral1/memory/3576-158-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-161-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-159-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-163-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-165-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-167-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-169-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-171-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-173-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-175-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-177-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-213-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-215-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-217-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3576-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1612 zite7645.exe 4464 jr589328.exe 3576 ku721128.exe 1972 lr532810.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr589328.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zite7645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zite7645.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4976 3576 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4464 jr589328.exe 4464 jr589328.exe 3576 ku721128.exe 3576 ku721128.exe 1972 lr532810.exe 1972 lr532810.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4464 jr589328.exe Token: SeDebugPrivilege 3576 ku721128.exe Token: SeDebugPrivilege 1972 lr532810.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4100 wrote to memory of 1612 4100 e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe 84 PID 4100 wrote to memory of 1612 4100 e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe 84 PID 4100 wrote to memory of 1612 4100 e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe 84 PID 1612 wrote to memory of 4464 1612 zite7645.exe 85 PID 1612 wrote to memory of 4464 1612 zite7645.exe 85 PID 1612 wrote to memory of 3576 1612 zite7645.exe 86 PID 1612 wrote to memory of 3576 1612 zite7645.exe 86 PID 1612 wrote to memory of 3576 1612 zite7645.exe 86 PID 4100 wrote to memory of 1972 4100 e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe 90 PID 4100 wrote to memory of 1972 4100 e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe 90 PID 4100 wrote to memory of 1972 4100 e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe"C:\Users\Admin\AppData\Local\Temp\e2330112bd1228b43fdedbf73da923e538b586998c6738defcbade561ca6c3e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zite7645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zite7645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr589328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr589328.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku721128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku721128.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 14964⤵
- Program crash
PID:4976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr532810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr532810.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3576 -ip 35761⤵PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5a8aef421aad95ba54eed120e76a112ef
SHA1a2aa84393b609dbd5e57e1427dadcfc6640ab1b0
SHA256a44e289036bf3bd94066595a865dec53e3313410eb59879b953ed1d984a29f22
SHA5129a29043f6d463f7d70b8711e1dfa976b3b155d825f1d52198e6c99b49217ece435278183f6b03ae5fabb349c669c610fb8bff3f50449bf65c1b99119d3950cfa
-
Filesize
176KB
MD5a8aef421aad95ba54eed120e76a112ef
SHA1a2aa84393b609dbd5e57e1427dadcfc6640ab1b0
SHA256a44e289036bf3bd94066595a865dec53e3313410eb59879b953ed1d984a29f22
SHA5129a29043f6d463f7d70b8711e1dfa976b3b155d825f1d52198e6c99b49217ece435278183f6b03ae5fabb349c669c610fb8bff3f50449bf65c1b99119d3950cfa
-
Filesize
392KB
MD5a10d7fa2bdafb462c1fe65d96a6ea35a
SHA1381e769d38630db2de186b6ad13dc67eea463e55
SHA2569428e1f1eea92c48e11a246313e577a516c384d3edf7463cdad196c795b5e9d6
SHA5129033133cd337bd91191d990f265779287f56af107f023a5403dfc1cf8c7f0a7c3a02dfc5472957f31deaceb02172e0aa915c9640e0d42c91548a61a188375da9
-
Filesize
392KB
MD5a10d7fa2bdafb462c1fe65d96a6ea35a
SHA1381e769d38630db2de186b6ad13dc67eea463e55
SHA2569428e1f1eea92c48e11a246313e577a516c384d3edf7463cdad196c795b5e9d6
SHA5129033133cd337bd91191d990f265779287f56af107f023a5403dfc1cf8c7f0a7c3a02dfc5472957f31deaceb02172e0aa915c9640e0d42c91548a61a188375da9
-
Filesize
12KB
MD5fdc3f33ade48c83d37dff3b125a6951b
SHA1930178dd3b75a1aa911b0fd6b6445c3c612c9c20
SHA2566ed55681f1131bae63d1ab5ff5fdc440a8b93f9f5522822e39202ec706941fa3
SHA512f5dc3024e16a75b309d9ae4e78c08cc0c894ce5d0e6965f7de8b884c6f8f7dcf033193e6ba6a22c9addac450d595023a194fb3f8e90c9231ea987281667d7f7c
-
Filesize
12KB
MD5fdc3f33ade48c83d37dff3b125a6951b
SHA1930178dd3b75a1aa911b0fd6b6445c3c612c9c20
SHA2566ed55681f1131bae63d1ab5ff5fdc440a8b93f9f5522822e39202ec706941fa3
SHA512f5dc3024e16a75b309d9ae4e78c08cc0c894ce5d0e6965f7de8b884c6f8f7dcf033193e6ba6a22c9addac450d595023a194fb3f8e90c9231ea987281667d7f7c
-
Filesize
319KB
MD5fd032fb2d556fa5abefa45f8700cdb9a
SHA1423f7a2f5a431378b07d6ae0932d0ce3d7017ad5
SHA256bc4ccd8085bd501e241346dca5869fa9c9dac84a4611077384f9cdcb29679efe
SHA512043dd4ba65754a60cb0e6c8585eb1434a0dcd835e7aea338ca8f32621f546e0fab36b3cc67e836edb9f120dbeb4f13cc409b02dea58869418326e35f86ce1c6e
-
Filesize
319KB
MD5fd032fb2d556fa5abefa45f8700cdb9a
SHA1423f7a2f5a431378b07d6ae0932d0ce3d7017ad5
SHA256bc4ccd8085bd501e241346dca5869fa9c9dac84a4611077384f9cdcb29679efe
SHA512043dd4ba65754a60cb0e6c8585eb1434a0dcd835e7aea338ca8f32621f546e0fab36b3cc67e836edb9f120dbeb4f13cc409b02dea58869418326e35f86ce1c6e