Analysis
-
max time kernel
88s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe
Resource
win10v2004-20230221-en
General
-
Target
f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe
-
Size
531KB
-
MD5
a90aa81fabe18fd0d2b26c8301ed3332
-
SHA1
718159ee17bb73a65055983c884a54345a001fec
-
SHA256
f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9
-
SHA512
4b147bfbcdcabc1635e31510a6e5f6ef97e68d16b1df19aca20c50aaf638f87984cffcc1ca4e4d19ac6069b0f71b48bf21222335dc7fa275695ef981d56b7117
-
SSDEEP
12288:FMruy90SG1f7VEubkDapZ5Ia8AnbU8Eu6:XyhsHkDafnwHb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr715506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr715506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr715506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr715506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr715506.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr715506.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
resource yara_rule behavioral1/memory/228-159-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-160-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-162-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-164-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-166-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-168-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-170-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-172-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-174-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-176-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-178-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-180-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-182-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-184-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-186-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-188-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-190-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-196-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-198-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/228-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5012 zibi7268.exe 4920 jr715506.exe 228 ku108623.exe 3240 lr843469.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr715506.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibi7268.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zibi7268.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5048 228 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4920 jr715506.exe 4920 jr715506.exe 228 ku108623.exe 228 ku108623.exe 3240 lr843469.exe 3240 lr843469.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4920 jr715506.exe Token: SeDebugPrivilege 228 ku108623.exe Token: SeDebugPrivilege 3240 lr843469.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4936 wrote to memory of 5012 4936 f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe 83 PID 4936 wrote to memory of 5012 4936 f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe 83 PID 4936 wrote to memory of 5012 4936 f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe 83 PID 5012 wrote to memory of 4920 5012 zibi7268.exe 84 PID 5012 wrote to memory of 4920 5012 zibi7268.exe 84 PID 5012 wrote to memory of 228 5012 zibi7268.exe 91 PID 5012 wrote to memory of 228 5012 zibi7268.exe 91 PID 5012 wrote to memory of 228 5012 zibi7268.exe 91 PID 4936 wrote to memory of 3240 4936 f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe 95 PID 4936 wrote to memory of 3240 4936 f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe 95 PID 4936 wrote to memory of 3240 4936 f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe"C:\Users\Admin\AppData\Local\Temp\f301b9918a4606ebf24a88c535a8b87acb75f0eacb30dfef39c5c203a885a1d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibi7268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibi7268.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr715506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr715506.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku108623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku108623.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 15484⤵
- Program crash
PID:5048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr843469.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr843469.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 228 -ip 2281⤵PID:3568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5121b92617462c469186747ad10d8d81a
SHA1e78046245a9588deaffb8b740a3e80b83b279c18
SHA2563fe4ddb7b3bfc1414cb1a1e82c63240cda4cb9ccb98d243140ec94edec521137
SHA512d960d69583265823cd16c41c976b187df6d13aef49bdad567b4dd392c4519f8df6ab147d88428e89e5aaf0ee8e083213bfac76820de8dcd963b65c00d2c7051e
-
Filesize
175KB
MD5121b92617462c469186747ad10d8d81a
SHA1e78046245a9588deaffb8b740a3e80b83b279c18
SHA2563fe4ddb7b3bfc1414cb1a1e82c63240cda4cb9ccb98d243140ec94edec521137
SHA512d960d69583265823cd16c41c976b187df6d13aef49bdad567b4dd392c4519f8df6ab147d88428e89e5aaf0ee8e083213bfac76820de8dcd963b65c00d2c7051e
-
Filesize
389KB
MD51e55fba355bb72f59c24f10b7a3b7d89
SHA133f11f5f9981f47dc51cf3d727332b420a0cc39f
SHA2562c328863d6574dadfcc49f0e2a053f3d7bc5dd2a860b279defc1aa41487d653a
SHA512152152bcae1d4b3e6e39d04133950516f532cc5f04e118a5869dc4e7bce4faf946d4d2250b2c8d86cf4d752d3b17ab53590787d392838b154b058d5e9a12a659
-
Filesize
389KB
MD51e55fba355bb72f59c24f10b7a3b7d89
SHA133f11f5f9981f47dc51cf3d727332b420a0cc39f
SHA2562c328863d6574dadfcc49f0e2a053f3d7bc5dd2a860b279defc1aa41487d653a
SHA512152152bcae1d4b3e6e39d04133950516f532cc5f04e118a5869dc4e7bce4faf946d4d2250b2c8d86cf4d752d3b17ab53590787d392838b154b058d5e9a12a659
-
Filesize
11KB
MD5095b8cc26883cc1cb72e7b1c5838c181
SHA1764216622b952d86630d4f6cde45c0649c31246e
SHA256402d27f2f330d0fa4b75976501e16dfd153adece583d6e0c82300b78b79d15e8
SHA512768f8c59d46319d94303141aa5c5a7bd49309c67e859f3df44f9c563830a38d5222dd5ac8deca7427f98e77282ef78331fc8a8b618af3b7de6eb834cdc92cf08
-
Filesize
11KB
MD5095b8cc26883cc1cb72e7b1c5838c181
SHA1764216622b952d86630d4f6cde45c0649c31246e
SHA256402d27f2f330d0fa4b75976501e16dfd153adece583d6e0c82300b78b79d15e8
SHA512768f8c59d46319d94303141aa5c5a7bd49309c67e859f3df44f9c563830a38d5222dd5ac8deca7427f98e77282ef78331fc8a8b618af3b7de6eb834cdc92cf08
-
Filesize
355KB
MD58de80e7de41c135e5693e1463292b1f9
SHA10e703aa6b70f49460c7187f523b372dd9b570ca1
SHA25666039f2f705b566d342e629c3e6f203a9c5da7385884e0d01cd794b724ae45f9
SHA512fd745587daf06d8a1bd48d2ad862e0ff3b63804057b1370166dfc44c2b37efdabfcd820860980c36fccd9cbfdcc5c3fa8580bfdf0d4df12c43ebe2daff88eb9f
-
Filesize
355KB
MD58de80e7de41c135e5693e1463292b1f9
SHA10e703aa6b70f49460c7187f523b372dd9b570ca1
SHA25666039f2f705b566d342e629c3e6f203a9c5da7385884e0d01cd794b724ae45f9
SHA512fd745587daf06d8a1bd48d2ad862e0ff3b63804057b1370166dfc44c2b37efdabfcd820860980c36fccd9cbfdcc5c3fa8580bfdf0d4df12c43ebe2daff88eb9f