Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe
Resource
win10v2004-20230220-en
General
-
Target
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe
-
Size
537KB
-
MD5
0b67d16a9d76c20a3ce121cff86916d6
-
SHA1
990cb47f7b2d423f84456fe4c758e8159466dc02
-
SHA256
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b
-
SHA512
540a1c29ec324ba43bb8bee4ba3aec67a167f592299165fe770e6bb1097770332d86a7a774d60a52af36849021c006d566c21ceb79a001156a08b652367b3082
-
SSDEEP
12288:OMroy90eZoNTvPWbEw0AUP/HHwUekvo9QRmk0vi:6ydUTvuIAInwWfRmkt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr544529.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr544529.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr544529.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr544529.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr544529.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr544529.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1312-157-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-160-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-162-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-158-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-164-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-166-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-168-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-170-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-172-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-174-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-176-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-178-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-180-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-182-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-184-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-187-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-189-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-191-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-193-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-195-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-197-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-199-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-201-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-203-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-205-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-207-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-209-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-211-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-213-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-215-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-217-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-219-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1312-221-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4700 ziiT8998.exe 5004 jr544529.exe 1312 ku157196.exe 3372 lr228866.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr544529.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiT8998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiT8998.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3960 1312 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5004 jr544529.exe 5004 jr544529.exe 1312 ku157196.exe 1312 ku157196.exe 3372 lr228866.exe 3372 lr228866.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5004 jr544529.exe Token: SeDebugPrivilege 1312 ku157196.exe Token: SeDebugPrivilege 3372 lr228866.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4700 4284 c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe 84 PID 4284 wrote to memory of 4700 4284 c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe 84 PID 4284 wrote to memory of 4700 4284 c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe 84 PID 4700 wrote to memory of 5004 4700 ziiT8998.exe 85 PID 4700 wrote to memory of 5004 4700 ziiT8998.exe 85 PID 4700 wrote to memory of 1312 4700 ziiT8998.exe 86 PID 4700 wrote to memory of 1312 4700 ziiT8998.exe 86 PID 4700 wrote to memory of 1312 4700 ziiT8998.exe 86 PID 4284 wrote to memory of 3372 4284 c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe 91 PID 4284 wrote to memory of 3372 4284 c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe 91 PID 4284 wrote to memory of 3372 4284 c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe"C:\Users\Admin\AppData\Local\Temp\c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiT8998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiT8998.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr544529.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr544529.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku157196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku157196.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 13484⤵
- Program crash
PID:3960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228866.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228866.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1312 -ip 13121⤵PID:2836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD540aaf597922875689485282e380cc39d
SHA11dc05e6b8359621dc850d60f47057ff890c464b4
SHA256620b289f6de324817803e665a8d72c04d689de8ef0e740b6a9550a2c9aa392c1
SHA5126cdc737546bafffc48a130b6209174c6e1c8c3c590448eace0275622aa480484238f6af591f24f5e1e6b5160eefc26e80e1903e319392fa637d743db5995feed
-
Filesize
176KB
MD540aaf597922875689485282e380cc39d
SHA11dc05e6b8359621dc850d60f47057ff890c464b4
SHA256620b289f6de324817803e665a8d72c04d689de8ef0e740b6a9550a2c9aa392c1
SHA5126cdc737546bafffc48a130b6209174c6e1c8c3c590448eace0275622aa480484238f6af591f24f5e1e6b5160eefc26e80e1903e319392fa637d743db5995feed
-
Filesize
395KB
MD54a8b5fbe110d07474bf6f567c9cf2724
SHA11dbeefb2db931ba957d33ff9fe97947a05e2b26c
SHA25681fab7dcfd7110ddf10d1aefbbda9eedf113a3635ff20e9663f5758a5314a7f2
SHA512644c23da510ee12acdbeec3927bc07e2b2eb2f7a352c3c27f9213fc1143bc6c2d993d9dc10eb0be57112933cb532b0329cb465a6d19ebf2fcaa2c3f798c8f628
-
Filesize
395KB
MD54a8b5fbe110d07474bf6f567c9cf2724
SHA11dbeefb2db931ba957d33ff9fe97947a05e2b26c
SHA25681fab7dcfd7110ddf10d1aefbbda9eedf113a3635ff20e9663f5758a5314a7f2
SHA512644c23da510ee12acdbeec3927bc07e2b2eb2f7a352c3c27f9213fc1143bc6c2d993d9dc10eb0be57112933cb532b0329cb465a6d19ebf2fcaa2c3f798c8f628
-
Filesize
13KB
MD5585dadaffcc235f7b600b91392ec3a28
SHA1ba1485b713785fbf3cde5234bb04a979e6ff8c2a
SHA2566bb5cce1596133da8718ae5d61dfc375d6135bc0dceee0eb592fef17ac40c37c
SHA512489d6af130e3a8c13ab1bee18d294aabc40c01afad363e6e8cdd2943f25484a38243cc797089786723074d15967a132422f166c8e214f8782924b281ff73b3f2
-
Filesize
13KB
MD5585dadaffcc235f7b600b91392ec3a28
SHA1ba1485b713785fbf3cde5234bb04a979e6ff8c2a
SHA2566bb5cce1596133da8718ae5d61dfc375d6135bc0dceee0eb592fef17ac40c37c
SHA512489d6af130e3a8c13ab1bee18d294aabc40c01afad363e6e8cdd2943f25484a38243cc797089786723074d15967a132422f166c8e214f8782924b281ff73b3f2
-
Filesize
352KB
MD51b289853200dcd1bb4cd276aa1285a85
SHA101179041b2e532585d4fb602d6124c1534fe4419
SHA256a6b4a53c407aa1acb79047ebd77e7f4ebee5b9a906820f30a10cfba61da6009c
SHA5121135d554ae9da3690c49c3c307102262d71498d8941f5ea93e69b56acf2219b87aa0f5eac6a69c72378ff4dd4f7d4f7d3e29e2eb2680c56a40e5000a4f843641
-
Filesize
352KB
MD51b289853200dcd1bb4cd276aa1285a85
SHA101179041b2e532585d4fb602d6124c1534fe4419
SHA256a6b4a53c407aa1acb79047ebd77e7f4ebee5b9a906820f30a10cfba61da6009c
SHA5121135d554ae9da3690c49c3c307102262d71498d8941f5ea93e69b56acf2219b87aa0f5eac6a69c72378ff4dd4f7d4f7d3e29e2eb2680c56a40e5000a4f843641