Analysis
-
max time kernel
78s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 20:10
Static task
static1
Behavioral task
behavioral1
Sample
bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe
Resource
win10v2004-20230220-en
General
-
Target
bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe
-
Size
530KB
-
MD5
802d18b1cbe4f0b6032305ade1b25cf9
-
SHA1
b62245faee6830e48353b53093eafe9de0a3202e
-
SHA256
bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415
-
SHA512
a0a78d7a3c2a726861b821eb298206a63d1f4b3b730a7579cfd8ed8ff83c2f6923f62cdbc3d9dd2300d9fbbcf19933a8286f9b888e4f9b5e52b51d6ab9cd57dd
-
SSDEEP
12288:cMr+y9083uFiKZfoCWwkpJeLMeTytRaE8WxAk1ar7WRH:yy33uF7RWwmeMeTytRaE8cAk1aet
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr284532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr284532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr284532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr284532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr284532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr284532.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/336-155-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-156-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-158-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-160-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-162-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-164-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-166-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-168-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-175-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-172-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-177-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-179-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-181-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-183-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-185-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-187-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-189-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-191-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-193-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-195-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-197-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-199-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-201-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-203-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-205-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-207-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-209-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-211-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-213-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-215-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-217-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-219-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline behavioral1/memory/336-221-0x00000000072A0000-0x00000000072DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1816 ziNR9133.exe 3740 jr284532.exe 336 ku204590.exe 2244 lr450733.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr284532.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNR9133.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNR9133.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1664 336 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3740 jr284532.exe 3740 jr284532.exe 336 ku204590.exe 336 ku204590.exe 2244 lr450733.exe 2244 lr450733.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3740 jr284532.exe Token: SeDebugPrivilege 336 ku204590.exe Token: SeDebugPrivilege 2244 lr450733.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4496 wrote to memory of 1816 4496 bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe 83 PID 4496 wrote to memory of 1816 4496 bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe 83 PID 4496 wrote to memory of 1816 4496 bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe 83 PID 1816 wrote to memory of 3740 1816 ziNR9133.exe 84 PID 1816 wrote to memory of 3740 1816 ziNR9133.exe 84 PID 1816 wrote to memory of 336 1816 ziNR9133.exe 89 PID 1816 wrote to memory of 336 1816 ziNR9133.exe 89 PID 1816 wrote to memory of 336 1816 ziNR9133.exe 89 PID 4496 wrote to memory of 2244 4496 bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe 96 PID 4496 wrote to memory of 2244 4496 bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe 96 PID 4496 wrote to memory of 2244 4496 bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe"C:\Users\Admin\AppData\Local\Temp\bd433ed8a96c6a7f0348f5e5187b5259e96d287db34d5b4593c0e51088dd4415.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNR9133.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNR9133.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr284532.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr284532.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku204590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku204590.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 17844⤵
- Program crash
PID:1664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr450733.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr450733.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 336 -ip 3361⤵PID:4148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53757edc0192ad080aecd1fae5f6ae89a
SHA1f4cef8698c729e14cbecf20fb71cebb0ba8f2b61
SHA256a7f23be4cd59d49ec5d14576d42c6add542abac2122bfd156bba5bf1fe288920
SHA5129be3e897d8c5dad2092ea3fe5f02ee5ea4ff5953862dcc69e4dd7a125ec8527a0e06a303fb1e15eb95436aef548cd051ff2b17ee6d70e3bab0b2cef2dfd3c49f
-
Filesize
175KB
MD53757edc0192ad080aecd1fae5f6ae89a
SHA1f4cef8698c729e14cbecf20fb71cebb0ba8f2b61
SHA256a7f23be4cd59d49ec5d14576d42c6add542abac2122bfd156bba5bf1fe288920
SHA5129be3e897d8c5dad2092ea3fe5f02ee5ea4ff5953862dcc69e4dd7a125ec8527a0e06a303fb1e15eb95436aef548cd051ff2b17ee6d70e3bab0b2cef2dfd3c49f
-
Filesize
388KB
MD5026b01e6e137f2c4265ec0cfa582a5d5
SHA101a161497ddebd255e7de3e16486a78bfc649d8b
SHA256b2cd976f7604c2de3e80da55750459e34942ed924fb75bba69ba4a721132234a
SHA5128982e15fc82f2bdd1278a56a322ad9a1f419280a44652fd4fd5c2fa3d8c871ceba02d760f3c31be48d0a7ccbc4c6c203d96f73691e3ffd3a4f94ef92474af141
-
Filesize
388KB
MD5026b01e6e137f2c4265ec0cfa582a5d5
SHA101a161497ddebd255e7de3e16486a78bfc649d8b
SHA256b2cd976f7604c2de3e80da55750459e34942ed924fb75bba69ba4a721132234a
SHA5128982e15fc82f2bdd1278a56a322ad9a1f419280a44652fd4fd5c2fa3d8c871ceba02d760f3c31be48d0a7ccbc4c6c203d96f73691e3ffd3a4f94ef92474af141
-
Filesize
11KB
MD58ae9a28dc8e090b3f455032427e65a99
SHA107f120d19ec3522a9ff8ec35237d748cda1b8450
SHA25634a987981c8737cd20c925ab2ed8df0e4977acfcf12d5432c3118cd9af7f2a05
SHA512a192629f7f4e1136b7703c20ef3b23091f3d79e5732d870518b51167bf08ae654b64617b3ba08265c6b159de1a6fbfb0f4579292fbd07acd65144fa4c3653fd5
-
Filesize
11KB
MD58ae9a28dc8e090b3f455032427e65a99
SHA107f120d19ec3522a9ff8ec35237d748cda1b8450
SHA25634a987981c8737cd20c925ab2ed8df0e4977acfcf12d5432c3118cd9af7f2a05
SHA512a192629f7f4e1136b7703c20ef3b23091f3d79e5732d870518b51167bf08ae654b64617b3ba08265c6b159de1a6fbfb0f4579292fbd07acd65144fa4c3653fd5
-
Filesize
354KB
MD5d764ab131a147f5e5f337603e0349c8a
SHA128580698fecdefa59fe0f8645563663f38c0399e
SHA2569c3b79afa761db065fcae65b0fdd1b08f2e253740033f7767d9985826e92bcd2
SHA5124f5a3fc6e69c2ab636d21db2bba34b16f1f20c97391753a0a6bcc36080efe386013647c28bc676c53156a384d0ce2717df1e91e42f5fecd1e661caa4766ec3bd
-
Filesize
354KB
MD5d764ab131a147f5e5f337603e0349c8a
SHA128580698fecdefa59fe0f8645563663f38c0399e
SHA2569c3b79afa761db065fcae65b0fdd1b08f2e253740033f7767d9985826e92bcd2
SHA5124f5a3fc6e69c2ab636d21db2bba34b16f1f20c97391753a0a6bcc36080efe386013647c28bc676c53156a384d0ce2717df1e91e42f5fecd1e661caa4766ec3bd