Analysis
-
max time kernel
98s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe
Resource
win10v2004-20230221-en
General
-
Target
f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe
-
Size
529KB
-
MD5
ce5b57b56db09c7a9c43cfe461106be3
-
SHA1
65053c3a049e0b30297d3d5722fb86fa1b1e3872
-
SHA256
f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f
-
SHA512
a70cbfcee6cbaf6e92209738dccc9f5513ab6b37ad0e67ba5f58cfa8e5708f76fbfded8b5108dbbfc8b63b7d3646f3381d40aa9eb6961d3b5ea83574ef595b2a
-
SSDEEP
12288:eMriy90CFAqggZ2+dLNnHsCE8sx2BQJfbHDXB:YyRCsXdyCE8yxx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr402128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr402128.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr402128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr402128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr402128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr402128.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3952-155-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-156-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-158-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-160-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-162-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-164-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-166-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-168-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-170-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-172-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-174-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-176-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-178-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-180-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-182-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-184-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-186-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-188-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-190-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-193-0x0000000004B20000-0x0000000004B30000-memory.dmp family_redline behavioral1/memory/3952-197-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-194-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-199-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-201-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-203-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-205-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-207-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-209-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-211-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-213-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-215-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-217-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-219-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3952-221-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1804 zidq2419.exe 1952 jr402128.exe 3952 ku624044.exe 4376 lr275048.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr402128.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidq2419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidq2419.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3788 3952 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 jr402128.exe 1952 jr402128.exe 3952 ku624044.exe 3952 ku624044.exe 4376 lr275048.exe 4376 lr275048.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1952 jr402128.exe Token: SeDebugPrivilege 3952 ku624044.exe Token: SeDebugPrivilege 4376 lr275048.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1804 3812 f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe 84 PID 3812 wrote to memory of 1804 3812 f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe 84 PID 3812 wrote to memory of 1804 3812 f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe 84 PID 1804 wrote to memory of 1952 1804 zidq2419.exe 85 PID 1804 wrote to memory of 1952 1804 zidq2419.exe 85 PID 1804 wrote to memory of 3952 1804 zidq2419.exe 88 PID 1804 wrote to memory of 3952 1804 zidq2419.exe 88 PID 1804 wrote to memory of 3952 1804 zidq2419.exe 88 PID 3812 wrote to memory of 4376 3812 f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe 92 PID 3812 wrote to memory of 4376 3812 f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe 92 PID 3812 wrote to memory of 4376 3812 f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe"C:\Users\Admin\AppData\Local\Temp\f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidq2419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidq2419.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr402128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr402128.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624044.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 13444⤵
- Program crash
PID:3788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275048.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3952 -ip 39521⤵PID:5108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ed3e63a2373e5ada4f97cdab46063086
SHA113ccc05b257f7337a5ac1ffd4c0a558e10007608
SHA256f66499bc7db078b25f4854dde0886687f87aab4ef6164bd962c472d8d2c12c3e
SHA512c230ea689f5992c53a7b7eaf4976d9c9bb73bb302e545c40f7a82d17c3072f27f167e1c9525c574af584f66a73c41cf1dc6819442a00e8a354b548b42cd2cf86
-
Filesize
175KB
MD5ed3e63a2373e5ada4f97cdab46063086
SHA113ccc05b257f7337a5ac1ffd4c0a558e10007608
SHA256f66499bc7db078b25f4854dde0886687f87aab4ef6164bd962c472d8d2c12c3e
SHA512c230ea689f5992c53a7b7eaf4976d9c9bb73bb302e545c40f7a82d17c3072f27f167e1c9525c574af584f66a73c41cf1dc6819442a00e8a354b548b42cd2cf86
-
Filesize
387KB
MD5eb37e5a9d013a263cb97c64d0e743ebb
SHA1ac499baf52d337819323dddcd5253fe3bab3508e
SHA2560b6725c624d1e8533c1b07901480f15a159aa19fd59b82205e82653a3e613b20
SHA5129c9c45daef0d41e7b117c6a2f2e8ba91ca57bcd4485d9dadec1bba2cf141d263b214b0f829e7a99510e35d990e4a27d69f9eaf4049af2e97776b3d1a6db11db8
-
Filesize
387KB
MD5eb37e5a9d013a263cb97c64d0e743ebb
SHA1ac499baf52d337819323dddcd5253fe3bab3508e
SHA2560b6725c624d1e8533c1b07901480f15a159aa19fd59b82205e82653a3e613b20
SHA5129c9c45daef0d41e7b117c6a2f2e8ba91ca57bcd4485d9dadec1bba2cf141d263b214b0f829e7a99510e35d990e4a27d69f9eaf4049af2e97776b3d1a6db11db8
-
Filesize
11KB
MD561b99ad96e943ccb4429281d694a988a
SHA1791b39e3ffcc45d8843c022f048fb08ee6cada66
SHA2569816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd
SHA512c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78
-
Filesize
11KB
MD561b99ad96e943ccb4429281d694a988a
SHA1791b39e3ffcc45d8843c022f048fb08ee6cada66
SHA2569816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd
SHA512c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78
-
Filesize
354KB
MD557cefbea91d472c20601a71e54a105fb
SHA11a00665d1946f8d2e3df0d87413434510fb103cc
SHA256894d79e415d3ac0a08209b5a3984ee5efcd585b6ce1eda14e8577b3f2bc81946
SHA51206e7e1af6e7f76726bd06ccd3ad5a535ab25a868f88765f5bea7dc5aad65bce70e46ea2916edf8326817fd7c28d52f2e1d37dff0b686115e4284eec36f813426
-
Filesize
354KB
MD557cefbea91d472c20601a71e54a105fb
SHA11a00665d1946f8d2e3df0d87413434510fb103cc
SHA256894d79e415d3ac0a08209b5a3984ee5efcd585b6ce1eda14e8577b3f2bc81946
SHA51206e7e1af6e7f76726bd06ccd3ad5a535ab25a868f88765f5bea7dc5aad65bce70e46ea2916edf8326817fd7c28d52f2e1d37dff0b686115e4284eec36f813426