Analysis
-
max time kernel
58s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 04:15
Static task
static1
Behavioral task
behavioral1
Sample
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
Resource
win10v2004-20230220-en
General
-
Target
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
-
Size
534KB
-
MD5
4cccd2d13c5f3b787b3d92f61d827eb4
-
SHA1
270c3e061d718b10a63bcf53d3136cc2522d9ca9
-
SHA256
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
SHA512
c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035
-
SSDEEP
12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr456218.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4436-158-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-159-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-161-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-163-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-165-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-167-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-169-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-171-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-173-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-175-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-177-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-179-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-181-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-183-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-185-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-187-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-189-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-191-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-193-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-195-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-197-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-199-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-201-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-203-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-205-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-207-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-209-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-211-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-213-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-215-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-217-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-219-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4436-221-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2792 zirM6966.exe 396 jr456218.exe 4436 ku106547.exe 4108 lr883572.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr456218.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zirM6966.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirM6966.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 528 4436 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 396 jr456218.exe 396 jr456218.exe 4436 ku106547.exe 4436 ku106547.exe 4108 lr883572.exe 4108 lr883572.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 396 jr456218.exe Token: SeDebugPrivilege 4436 ku106547.exe Token: SeDebugPrivilege 4108 lr883572.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 864 wrote to memory of 2792 864 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe 84 PID 864 wrote to memory of 2792 864 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe 84 PID 864 wrote to memory of 2792 864 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe 84 PID 2792 wrote to memory of 396 2792 zirM6966.exe 85 PID 2792 wrote to memory of 396 2792 zirM6966.exe 85 PID 2792 wrote to memory of 4436 2792 zirM6966.exe 90 PID 2792 wrote to memory of 4436 2792 zirM6966.exe 90 PID 2792 wrote to memory of 4436 2792 zirM6966.exe 90 PID 864 wrote to memory of 4108 864 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe 97 PID 864 wrote to memory of 4108 864 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe 97 PID 864 wrote to memory of 4108 864 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe"C:\Users\Admin\AppData\Local\Temp\59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 14924⤵
- Program crash
PID:528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr883572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr883572.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4436 -ip 44361⤵PID:2212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5e6b3c5d2fbe1164faa24f5cf38e9a600
SHA1c3c20a7352b563a78bfe21741a7dae4f8c0e0421
SHA2568a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b
SHA512da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3
-
Filesize
176KB
MD5e6b3c5d2fbe1164faa24f5cf38e9a600
SHA1c3c20a7352b563a78bfe21741a7dae4f8c0e0421
SHA2568a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b
SHA512da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3
-
Filesize
392KB
MD5e0dff0e465db1d21c6a29278fd95eaa7
SHA19a4350bafa95a7c361b2f9a44d5affb85f9ff4e7
SHA2568166019e222c62b813d089e831a597def6efbf920ac0bb6e7ffafc27763e0560
SHA51285decfe57eb0076c0959d2c9fa95514a3d164c9eea1ca4443cab96d4191d946b64db010d31fb0ee54f26faf3439c8869a8c6bf332ae3422d07ce7c9f48812824
-
Filesize
392KB
MD5e0dff0e465db1d21c6a29278fd95eaa7
SHA19a4350bafa95a7c361b2f9a44d5affb85f9ff4e7
SHA2568166019e222c62b813d089e831a597def6efbf920ac0bb6e7ffafc27763e0560
SHA51285decfe57eb0076c0959d2c9fa95514a3d164c9eea1ca4443cab96d4191d946b64db010d31fb0ee54f26faf3439c8869a8c6bf332ae3422d07ce7c9f48812824
-
Filesize
12KB
MD5d8f0ca8a6cc5d2cb5aa392135886795a
SHA1c9e6e2c8b3986e237886c2670e8e68d5dc6b1973
SHA256def0c9212749f519413f713756d71973b13eb580804d1e0d3e9d301a1e471458
SHA5123d8dd513e586b99b81b79780c43fa9c9a2c995d8eabccbfcb51db36be526fc920e0a69697a25eb5e2d616ff79f30d2fa11e70a49f6fd95434d8f15b877d64591
-
Filesize
12KB
MD5d8f0ca8a6cc5d2cb5aa392135886795a
SHA1c9e6e2c8b3986e237886c2670e8e68d5dc6b1973
SHA256def0c9212749f519413f713756d71973b13eb580804d1e0d3e9d301a1e471458
SHA5123d8dd513e586b99b81b79780c43fa9c9a2c995d8eabccbfcb51db36be526fc920e0a69697a25eb5e2d616ff79f30d2fa11e70a49f6fd95434d8f15b877d64591
-
Filesize
319KB
MD5ec5902c90835381a20bb548fcde9ab30
SHA1ce265ac3fd74a011edbc4b641ddcbdd97e0fc472
SHA256cc45ef6509b33a1e07e7cbfb265bb6ab1e537f5172e6e2722b004157a809e436
SHA512a9707c9a32590f051bdc886951facafee6075078ec3d4cb3d122e481119888f60b975dd466fe1ef7f2108579d0143ed6d040e335a5a4c722dad48d339715ccee
-
Filesize
319KB
MD5ec5902c90835381a20bb548fcde9ab30
SHA1ce265ac3fd74a011edbc4b641ddcbdd97e0fc472
SHA256cc45ef6509b33a1e07e7cbfb265bb6ab1e537f5172e6e2722b004157a809e436
SHA512a9707c9a32590f051bdc886951facafee6075078ec3d4cb3d122e481119888f60b975dd466fe1ef7f2108579d0143ed6d040e335a5a4c722dad48d339715ccee