Analysis
-
max time kernel
96s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe
Resource
win10v2004-20230220-en
General
-
Target
6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe
-
Size
530KB
-
MD5
c854a8c0640906ce351c9741322c9e37
-
SHA1
08547c98a6dfbb9f48432168ae467b80d7e3ecc6
-
SHA256
6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f
-
SHA512
d84b24a792cb41686ffc47a23b25e848bde3b9b33b2bf2f602eb064f219260652253e73ea17b39387ebc81c65ff0800d1d359eb6896567995e31d7fe1d03d94d
-
SSDEEP
12288:9MrPy9042UvyzwzMlvUKtQbs0evsWQLm9:+yBgzwY1QbhgpIE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr102583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr102583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr102583.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr102583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr102583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr102583.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2432-158-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-159-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-161-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-163-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-165-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-167-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-169-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-171-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-173-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-175-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-177-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-179-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-181-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-183-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-185-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-187-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-189-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-191-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-193-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-195-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-197-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-199-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-201-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-203-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-205-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-207-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-209-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-211-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-213-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-215-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-217-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-219-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2432-221-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 648 ziEH4297.exe 4852 jr102583.exe 2432 ku605713.exe 1948 lr164100.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr102583.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEH4297.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEH4297.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5112 2432 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 jr102583.exe 4852 jr102583.exe 2432 ku605713.exe 2432 ku605713.exe 1948 lr164100.exe 1948 lr164100.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4852 jr102583.exe Token: SeDebugPrivilege 2432 ku605713.exe Token: SeDebugPrivilege 1948 lr164100.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4528 wrote to memory of 648 4528 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe 84 PID 4528 wrote to memory of 648 4528 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe 84 PID 4528 wrote to memory of 648 4528 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe 84 PID 648 wrote to memory of 4852 648 ziEH4297.exe 85 PID 648 wrote to memory of 4852 648 ziEH4297.exe 85 PID 648 wrote to memory of 2432 648 ziEH4297.exe 88 PID 648 wrote to memory of 2432 648 ziEH4297.exe 88 PID 648 wrote to memory of 2432 648 ziEH4297.exe 88 PID 4528 wrote to memory of 1948 4528 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe 92 PID 4528 wrote to memory of 1948 4528 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe 92 PID 4528 wrote to memory of 1948 4528 6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe"C:\Users\Admin\AppData\Local\Temp\6f0de333048b7a384dd658a4ef3ac7e96be6ac94e2318fdf3a57efe18f44841f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEH4297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEH4297.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr102583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr102583.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku605713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku605713.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 13524⤵
- Program crash
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr164100.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr164100.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2432 -ip 24321⤵PID:4780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD573e0df652f0d140ca3b85f2348c1f919
SHA1d66bfbb4c2649311ed003df143994d270534ae2f
SHA256548675f148eefbd771d20242178c46b17f7f42e325ca898276c04f17611d357a
SHA512c41285b0e357a3fb2da1e42f060ae76b1dcfdcd4b6e65642ad155cd3fc2eebd00d20b5f7fd1595165a16a94f452929d4c5abbb69a3daef36860aba7f743cfa45
-
Filesize
176KB
MD573e0df652f0d140ca3b85f2348c1f919
SHA1d66bfbb4c2649311ed003df143994d270534ae2f
SHA256548675f148eefbd771d20242178c46b17f7f42e325ca898276c04f17611d357a
SHA512c41285b0e357a3fb2da1e42f060ae76b1dcfdcd4b6e65642ad155cd3fc2eebd00d20b5f7fd1595165a16a94f452929d4c5abbb69a3daef36860aba7f743cfa45
-
Filesize
387KB
MD559956498ef7294bd48b0fddea0afd25f
SHA173755cc1407f248f544049cb65bbd0bb67511993
SHA2567befb8ce6fde8c61d5e0c1b09da1e85864014ef188d52a4d91b96e11ed86fcd0
SHA512be171df4deb407fa355c25e11406eefdfdeff5998cdb6ae68a81c52a907d306cbbe3bdd4364f93e6605a9716395e483d5a441b12ff8331ecbe7aa28e699480aa
-
Filesize
387KB
MD559956498ef7294bd48b0fddea0afd25f
SHA173755cc1407f248f544049cb65bbd0bb67511993
SHA2567befb8ce6fde8c61d5e0c1b09da1e85864014ef188d52a4d91b96e11ed86fcd0
SHA512be171df4deb407fa355c25e11406eefdfdeff5998cdb6ae68a81c52a907d306cbbe3bdd4364f93e6605a9716395e483d5a441b12ff8331ecbe7aa28e699480aa
-
Filesize
12KB
MD52d76854eb73471a04b82ef60461a9a96
SHA1c770daaea61758f60a2278474daa9104a41b41cf
SHA256fc62d7d0f54d5037519a96207f7596e8f5cecaeeb18481402331dfbecb6af4de
SHA5123d28db059133b97fb7ddda511542e819bead4a45b58f63cca2c4876530054a49717e9da84bc508498ded7adcd3c0683f3c66dee998f33e919b629c7b668dac37
-
Filesize
12KB
MD52d76854eb73471a04b82ef60461a9a96
SHA1c770daaea61758f60a2278474daa9104a41b41cf
SHA256fc62d7d0f54d5037519a96207f7596e8f5cecaeeb18481402331dfbecb6af4de
SHA5123d28db059133b97fb7ddda511542e819bead4a45b58f63cca2c4876530054a49717e9da84bc508498ded7adcd3c0683f3c66dee998f33e919b629c7b668dac37
-
Filesize
342KB
MD59d0f4857d332fd6f885f7c46a93f697e
SHA1f19ad920586d203807d7cf1b5e2994b91ecc1a41
SHA256c9da4fc18192528b38902313172592b449fafb50f7aba16decc52c3cd3492dc9
SHA5126ec0b7be3daa9de013a66f3e875c1f65d234ce0190e8334ed24ff2eb28589b2fa562da78e387b742338cf8ee9e67d30ffe8bdae7a43149ab36ceedf12c1dda2d
-
Filesize
342KB
MD59d0f4857d332fd6f885f7c46a93f697e
SHA1f19ad920586d203807d7cf1b5e2994b91ecc1a41
SHA256c9da4fc18192528b38902313172592b449fafb50f7aba16decc52c3cd3492dc9
SHA5126ec0b7be3daa9de013a66f3e875c1f65d234ce0190e8334ed24ff2eb28589b2fa562da78e387b742338cf8ee9e67d30ffe8bdae7a43149ab36ceedf12c1dda2d