Analysis
-
max time kernel
83s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 05:00
Static task
static1
Behavioral task
behavioral1
Sample
829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe
Resource
win10v2004-20230220-en
General
-
Target
829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe
-
Size
534KB
-
MD5
060a101bdac854ad314aeb9b7b5f63e7
-
SHA1
f5af2b97a903e2c0480624a4ef5b8ed5559d6142
-
SHA256
829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a
-
SHA512
2e1814aa80bbf2d45967c25a5b39904ed94d7bbf7a9e2b9740855ca494cfe7f1690ed7df3d97d5ecd6d138c5995dd485804bcb332f8191a7d74dd45b6cc66de0
-
SSDEEP
12288:eMrVy90jWqkLLkDvHuc++umwzFb5WItpZOECD/GP2ns:Hy+HvtZwzp5FtpmaP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr207306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr207306.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr207306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr207306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr207306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr207306.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4112-154-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-155-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-157-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-159-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-161-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-163-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-165-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-167-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-169-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-175-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-177-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-179-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-181-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-183-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-185-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-187-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4112-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1916 zidE9779.exe 1564 jr207306.exe 4112 ku154125.exe 948 lr205778.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr207306.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidE9779.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidE9779.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1364 4112 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1564 jr207306.exe 1564 jr207306.exe 4112 ku154125.exe 4112 ku154125.exe 948 lr205778.exe 948 lr205778.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1564 jr207306.exe Token: SeDebugPrivilege 4112 ku154125.exe Token: SeDebugPrivilege 948 lr205778.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1916 1832 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe 83 PID 1832 wrote to memory of 1916 1832 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe 83 PID 1832 wrote to memory of 1916 1832 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe 83 PID 1916 wrote to memory of 1564 1916 zidE9779.exe 84 PID 1916 wrote to memory of 1564 1916 zidE9779.exe 84 PID 1916 wrote to memory of 4112 1916 zidE9779.exe 89 PID 1916 wrote to memory of 4112 1916 zidE9779.exe 89 PID 1916 wrote to memory of 4112 1916 zidE9779.exe 89 PID 1832 wrote to memory of 948 1832 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe 96 PID 1832 wrote to memory of 948 1832 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe 96 PID 1832 wrote to memory of 948 1832 829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe"C:\Users\Admin\AppData\Local\Temp\829bee0039ce4b18d3b6ce11926f38a155ac9ee4887170509c362cfd96b44a6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidE9779.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidE9779.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207306.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207306.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku154125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku154125.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 14804⤵
- Program crash
PID:1364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr205778.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr205778.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4112 -ip 41121⤵PID:3288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5b32fe3a83193acd2ef57cd6395b38482
SHA170773bd523572e939c1c4ad034a716030513aa95
SHA2565d6bee7d8fda77287c594efdfe728d7d0cdfa0d8cb71bb5c262604dc1e4ea68b
SHA51227ff5c42c6e625532674020f7e5df6e0b3ac9cea94d5e387ca221b072458e5da67bc8360e608458e05eb5e8ead42341217cce29050c2db64c1a9a18df8542410
-
Filesize
176KB
MD5b32fe3a83193acd2ef57cd6395b38482
SHA170773bd523572e939c1c4ad034a716030513aa95
SHA2565d6bee7d8fda77287c594efdfe728d7d0cdfa0d8cb71bb5c262604dc1e4ea68b
SHA51227ff5c42c6e625532674020f7e5df6e0b3ac9cea94d5e387ca221b072458e5da67bc8360e608458e05eb5e8ead42341217cce29050c2db64c1a9a18df8542410
-
Filesize
392KB
MD59ec80ad224effaf1a647536e0e5716ae
SHA18ceb4f963ebe40b762f6882aa470e73c6a4ea1ea
SHA25675acd6b32d0d75656560b890fa3a51a3cc10ac4ede5941d988466794979379f8
SHA512098116f99801828f76dc2019c718dfe88f2718dddeab2920fcf8f05d0141e5179981a0afba3c9663ff51912c8c66c91dc2ab1c86fe238f0f660d9cd4ea08d4f7
-
Filesize
392KB
MD59ec80ad224effaf1a647536e0e5716ae
SHA18ceb4f963ebe40b762f6882aa470e73c6a4ea1ea
SHA25675acd6b32d0d75656560b890fa3a51a3cc10ac4ede5941d988466794979379f8
SHA512098116f99801828f76dc2019c718dfe88f2718dddeab2920fcf8f05d0141e5179981a0afba3c9663ff51912c8c66c91dc2ab1c86fe238f0f660d9cd4ea08d4f7
-
Filesize
12KB
MD50ee9057f54482764d57de3704660c52f
SHA136fb1302d8d7f90cf4645737a3eb522b7f1c2412
SHA2569f30ec1839b39b042cc00cd4f86173ab99e5d5df9a99d4d2bb32232caf749bc7
SHA5129e8822e2f793e3a39d90138beae5d8f4a42f3155ce67e0e090e7845f16b651667158f13090cf5b9cfe6411396f0fbc68b23a1f9ebab3765f89da449ca25bc85b
-
Filesize
12KB
MD50ee9057f54482764d57de3704660c52f
SHA136fb1302d8d7f90cf4645737a3eb522b7f1c2412
SHA2569f30ec1839b39b042cc00cd4f86173ab99e5d5df9a99d4d2bb32232caf749bc7
SHA5129e8822e2f793e3a39d90138beae5d8f4a42f3155ce67e0e090e7845f16b651667158f13090cf5b9cfe6411396f0fbc68b23a1f9ebab3765f89da449ca25bc85b
-
Filesize
319KB
MD52dc7bcde816e033f22c41c6ddb2b10ae
SHA1a94863bab098a111bd5c7d6dc15436fd5267b9a6
SHA256173745b77918e94bedd7a41c7dcd131eab5acc409959263f6f34c946155f0da4
SHA51267e308a7a48d7c0250c0d0a4c87f9ed33f892cba55c39c06edc892ad91ae51c3e6a353f7eed8c8df806d617aa36c16ce80873cd18257bcb9f5cd1f1b7546d716
-
Filesize
319KB
MD52dc7bcde816e033f22c41c6ddb2b10ae
SHA1a94863bab098a111bd5c7d6dc15436fd5267b9a6
SHA256173745b77918e94bedd7a41c7dcd131eab5acc409959263f6f34c946155f0da4
SHA51267e308a7a48d7c0250c0d0a4c87f9ed33f892cba55c39c06edc892ad91ae51c3e6a353f7eed8c8df806d617aa36c16ce80873cd18257bcb9f5cd1f1b7546d716