Analysis
-
max time kernel
95s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 16:24
Static task
static1
Behavioral task
behavioral1
Sample
fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe
Resource
win10v2004-20230221-en
General
-
Target
fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe
-
Size
530KB
-
MD5
079de82795491acafbb6bd9be90fbf4e
-
SHA1
82280bdb777cdbeb2e98e9441a1dd97d1a141080
-
SHA256
fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef
-
SHA512
93b9c457d8fe7674790e414bb26a655782a4a4fa723d6afc65de893543be51baec4035e572e8be019acabf61b2591797096bca09794a6548d70466839f92fd92
-
SSDEEP
12288:+MrQy90aJp+bCihVS/lnhllUzOkpE85xGEHtCqvhtN:CynpBihVSV3qzbpE8TG6tCqJtN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr083498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr083498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr083498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr083498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr083498.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr083498.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/248-154-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-155-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-157-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-159-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-161-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-163-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-165-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-167-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-170-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-177-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-173-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-179-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-181-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-183-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-185-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-187-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-189-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-191-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-195-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-193-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-197-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-199-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-201-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-203-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-205-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-207-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-209-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-211-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-213-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-215-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-217-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-219-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/248-221-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4064 ziEd1126.exe 2836 jr083498.exe 248 ku044623.exe 4768 lr999143.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr083498.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEd1126.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEd1126.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1416 248 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2836 jr083498.exe 2836 jr083498.exe 248 ku044623.exe 248 ku044623.exe 4768 lr999143.exe 4768 lr999143.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2836 jr083498.exe Token: SeDebugPrivilege 248 ku044623.exe Token: SeDebugPrivilege 4768 lr999143.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2712 wrote to memory of 4064 2712 fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe 83 PID 2712 wrote to memory of 4064 2712 fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe 83 PID 2712 wrote to memory of 4064 2712 fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe 83 PID 4064 wrote to memory of 2836 4064 ziEd1126.exe 84 PID 4064 wrote to memory of 2836 4064 ziEd1126.exe 84 PID 4064 wrote to memory of 248 4064 ziEd1126.exe 89 PID 4064 wrote to memory of 248 4064 ziEd1126.exe 89 PID 4064 wrote to memory of 248 4064 ziEd1126.exe 89 PID 2712 wrote to memory of 4768 2712 fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe 96 PID 2712 wrote to memory of 4768 2712 fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe 96 PID 2712 wrote to memory of 4768 2712 fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe"C:\Users\Admin\AppData\Local\Temp\fcf9dd59f6e9c5945dd61b77262d7ddcf04fe5647b692c69e3d6b2d0e655d1ef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEd1126.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEd1126.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083498.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku044623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku044623.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 248 -s 16964⤵
- Program crash
PID:1416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr999143.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr999143.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 248 -ip 2481⤵PID:1616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53f1f7118827b3509d281f99194ae7db7
SHA1fc892e4e777a4a16cc23967e8cdfb7ecb481e886
SHA256c72e63311d1e6ffe1a0456003d3fd6343f492978d9dd6aa059616b73a0f68239
SHA5120d770f7ea2a710aa66d74745d6d9dd6ffbc4a71e57af85dcb61c70ec122a43f16232bff895ec28874764af719542504ed1a534922110e064e6e558587e5855a2
-
Filesize
175KB
MD53f1f7118827b3509d281f99194ae7db7
SHA1fc892e4e777a4a16cc23967e8cdfb7ecb481e886
SHA256c72e63311d1e6ffe1a0456003d3fd6343f492978d9dd6aa059616b73a0f68239
SHA5120d770f7ea2a710aa66d74745d6d9dd6ffbc4a71e57af85dcb61c70ec122a43f16232bff895ec28874764af719542504ed1a534922110e064e6e558587e5855a2
-
Filesize
388KB
MD57dfcfeef3d7bc8a7b954e981099ceb62
SHA1bd03ecb4255edd298d2bc1f80ad785e6dad158be
SHA2563ad8d7ecd436d5737bec45002480fe61757f613082a73da705716b125f3ddf69
SHA51211e29890855824802c11a06285a320c5ae1bc577cffb76529b2493ebaf9a6623201b5fc7dfca1bb68e4a0e66c121ff97fe416d5a80eb5cc35195ee0fbea675b5
-
Filesize
388KB
MD57dfcfeef3d7bc8a7b954e981099ceb62
SHA1bd03ecb4255edd298d2bc1f80ad785e6dad158be
SHA2563ad8d7ecd436d5737bec45002480fe61757f613082a73da705716b125f3ddf69
SHA51211e29890855824802c11a06285a320c5ae1bc577cffb76529b2493ebaf9a6623201b5fc7dfca1bb68e4a0e66c121ff97fe416d5a80eb5cc35195ee0fbea675b5
-
Filesize
11KB
MD52ab87adf90a74bb149218a77401f8e5b
SHA1338bb5d8d8eaebb0e70e5b69fe99fe1672e81d6d
SHA256e3f0680e53442b642030b1abdf3adae95d1e6f6149c928d58f76fd78f08bfa93
SHA5124695837a768dad91f709cf6f423c2f9242cb0d3abf395fdeb1945549d9a90af6f5719f1d20b657437c663c77f8c968710898dfde4a1c65949d7c9015545460d3
-
Filesize
11KB
MD52ab87adf90a74bb149218a77401f8e5b
SHA1338bb5d8d8eaebb0e70e5b69fe99fe1672e81d6d
SHA256e3f0680e53442b642030b1abdf3adae95d1e6f6149c928d58f76fd78f08bfa93
SHA5124695837a768dad91f709cf6f423c2f9242cb0d3abf395fdeb1945549d9a90af6f5719f1d20b657437c663c77f8c968710898dfde4a1c65949d7c9015545460d3
-
Filesize
354KB
MD5d55dd22902ce381e7f32d7664756931f
SHA1e4dd3842c20db1573e10b4a75e6615df16d911d9
SHA256493f68f9fd6f279ea96d82c1a093d31f65b476c4d3581a6c06cf87acd7e3b848
SHA5127816afe507ef0b75c82e441f6dfc1f905565667eb04e81e1d64ae7398d351d562e5ab5ed438c941e888616e64b987c070c4aabb941ddf038dae63d0785809117
-
Filesize
354KB
MD5d55dd22902ce381e7f32d7664756931f
SHA1e4dd3842c20db1573e10b4a75e6615df16d911d9
SHA256493f68f9fd6f279ea96d82c1a093d31f65b476c4d3581a6c06cf87acd7e3b848
SHA5127816afe507ef0b75c82e441f6dfc1f905565667eb04e81e1d64ae7398d351d562e5ab5ed438c941e888616e64b987c070c4aabb941ddf038dae63d0785809117