Analysis
-
max time kernel
98s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe
Resource
win10v2004-20230220-en
General
-
Target
7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe
-
Size
530KB
-
MD5
d83183071887588d4851118dcdbb2be3
-
SHA1
0cb36c88ff1138c9c0044810a2dca178becd7b0e
-
SHA256
7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d
-
SHA512
82e78eec3c8a79e596f2e9b29b149f8c1fd8008e1e177be2bedf291dfa6e143f70d047c00fa46affc7dae26cc062b2ea6513e0bf5912e4f523adb12cdb6481f7
-
SSDEEP
12288:nMrsy90lFMkxItJjDgAZ7SW/zijcQPqBcb/p9R9hix:LyIFMa6lGWWAQiG/7Ix
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr006100.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr006100.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2324-158-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-159-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-161-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-163-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-165-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-167-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-169-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-171-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-173-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-175-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-177-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-179-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-181-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-183-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-185-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-187-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-189-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-193-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-197-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-199-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-201-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-203-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-205-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-207-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-209-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-211-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-213-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-215-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-217-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-219-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/2324-221-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 632 ziap8519.exe 644 jr006100.exe 2324 ku730077.exe 3120 lr672037.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr006100.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziap8519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziap8519.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2408 2324 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 644 jr006100.exe 644 jr006100.exe 2324 ku730077.exe 2324 ku730077.exe 3120 lr672037.exe 3120 lr672037.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 644 jr006100.exe Token: SeDebugPrivilege 2324 ku730077.exe Token: SeDebugPrivilege 3120 lr672037.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4952 wrote to memory of 632 4952 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 83 PID 4952 wrote to memory of 632 4952 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 83 PID 4952 wrote to memory of 632 4952 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 83 PID 632 wrote to memory of 644 632 ziap8519.exe 84 PID 632 wrote to memory of 644 632 ziap8519.exe 84 PID 632 wrote to memory of 2324 632 ziap8519.exe 89 PID 632 wrote to memory of 2324 632 ziap8519.exe 89 PID 632 wrote to memory of 2324 632 ziap8519.exe 89 PID 4952 wrote to memory of 3120 4952 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 96 PID 4952 wrote to memory of 3120 4952 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 96 PID 4952 wrote to memory of 3120 4952 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe"C:\Users\Admin\AppData\Local\Temp\7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziap8519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziap8519.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006100.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku730077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku730077.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 13484⤵
- Program crash
PID:2408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr672037.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr672037.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2324 -ip 23241⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5223ee225978f6e0fe48938c13bf351bb
SHA11076345f45a456fc4de006a5dd268f96cb4bd089
SHA256632541aceb1f2e80c0ebe5f778eb6feaaac3b14883a95dd01da155aa96f9ee18
SHA5127642ab81e432480502db80babff05801ec192784aa30b0eafd790d935c0f4362f53eeac8cbb608f4eb70a4703649f2d9a44dd0211113f5ebaaf901c2223cda1b
-
Filesize
175KB
MD5223ee225978f6e0fe48938c13bf351bb
SHA11076345f45a456fc4de006a5dd268f96cb4bd089
SHA256632541aceb1f2e80c0ebe5f778eb6feaaac3b14883a95dd01da155aa96f9ee18
SHA5127642ab81e432480502db80babff05801ec192784aa30b0eafd790d935c0f4362f53eeac8cbb608f4eb70a4703649f2d9a44dd0211113f5ebaaf901c2223cda1b
-
Filesize
388KB
MD51693d05ff3f774cdb40516a4a3f375a6
SHA184721f7fe833cc53128d7a47365a667a6d76c0bd
SHA2561c9c761a2caba433c29644cd840f74560e7daeb26236ac12e25b335e4e5871c7
SHA5122beeb8dbb841007967ecb956ab2782e60e12edffde6c34a666112d66dce3c482c7dafc998f7e0d3cba5e5f08f45bdbb5da87d1833ea757e6713ab1cf0f4d57dc
-
Filesize
388KB
MD51693d05ff3f774cdb40516a4a3f375a6
SHA184721f7fe833cc53128d7a47365a667a6d76c0bd
SHA2561c9c761a2caba433c29644cd840f74560e7daeb26236ac12e25b335e4e5871c7
SHA5122beeb8dbb841007967ecb956ab2782e60e12edffde6c34a666112d66dce3c482c7dafc998f7e0d3cba5e5f08f45bdbb5da87d1833ea757e6713ab1cf0f4d57dc
-
Filesize
11KB
MD57a67e1b185f738d8f1076ef43cdf08a3
SHA107d5e5bf24eabd1ddf6a229d9a625e1a57d25c79
SHA256042bcdd7691df8a5fa05948656a076a3ffd3bbee4bc8eef405852b7e1e1e899b
SHA51279557b6d2d568121c96e15bcb07736f91216f40dc2eb2b080b7cb054c0ebcd1ee1738bcf8d98efc1f80e31f86661ecb9b98b47402f80ddc1e2d452f863f87d84
-
Filesize
11KB
MD57a67e1b185f738d8f1076ef43cdf08a3
SHA107d5e5bf24eabd1ddf6a229d9a625e1a57d25c79
SHA256042bcdd7691df8a5fa05948656a076a3ffd3bbee4bc8eef405852b7e1e1e899b
SHA51279557b6d2d568121c96e15bcb07736f91216f40dc2eb2b080b7cb054c0ebcd1ee1738bcf8d98efc1f80e31f86661ecb9b98b47402f80ddc1e2d452f863f87d84
-
Filesize
354KB
MD5e77a06025bf5eba2a5ea46e383bd1c33
SHA1d96f4a0901c5947a8aa99a59fce3ee3211e7ffe9
SHA256c23878c7b8f5e73c02cbf8285aa45f9b63f92dc3a2c74a0d25637e9205e0097e
SHA512cb719d49c0a5114377a5f01a5fc0bc8609d7395b0123a5bab731d2e8cc763a8717f997050a0150db7fce6c24a39f9173ccad17487e56aecff7c3b181e18aeb43
-
Filesize
354KB
MD5e77a06025bf5eba2a5ea46e383bd1c33
SHA1d96f4a0901c5947a8aa99a59fce3ee3211e7ffe9
SHA256c23878c7b8f5e73c02cbf8285aa45f9b63f92dc3a2c74a0d25637e9205e0097e
SHA512cb719d49c0a5114377a5f01a5fc0bc8609d7395b0123a5bab731d2e8cc763a8717f997050a0150db7fce6c24a39f9173ccad17487e56aecff7c3b181e18aeb43