Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe
Resource
win10v2004-20230220-en
General
-
Target
57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe
-
Size
530KB
-
MD5
328e6128c7d083a8b95308f694d5998f
-
SHA1
a244298b52d2b06a2d6e6f252719483b924b1ce1
-
SHA256
57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584
-
SHA512
5339a5665a9a544d7391ee0079344dd22d32bb40f4d3185bcc7408045b4c2619e54e497c9a9a65c1f5b1e89e5338502fa50768fa9b32ba278314deb328436041
-
SSDEEP
12288:SMrgy90LnUAoRXYhyUcuf5KXa/oI402FuXbF:GynXY5AbJ0XXZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr110597.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr110597.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr110597.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr110597.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr110597.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr110597.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3976-158-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-161-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-159-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-163-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-165-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-167-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-169-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-171-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-173-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-177-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-175-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-179-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-181-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-183-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-185-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-187-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-189-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-191-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-193-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-195-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-197-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-199-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-201-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-203-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-205-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-207-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-209-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-211-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-213-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-215-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-217-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-219-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/3976-221-0x0000000002710000-0x000000000274F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4024 ziyu3086.exe 1264 jr110597.exe 3976 ku416855.exe 5084 lr861440.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr110597.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyu3086.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyu3086.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 436 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1968 3976 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1264 jr110597.exe 1264 jr110597.exe 3976 ku416855.exe 3976 ku416855.exe 5084 lr861440.exe 5084 lr861440.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1264 jr110597.exe Token: SeDebugPrivilege 3976 ku416855.exe Token: SeDebugPrivilege 5084 lr861440.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4024 2784 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe 83 PID 2784 wrote to memory of 4024 2784 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe 83 PID 2784 wrote to memory of 4024 2784 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe 83 PID 4024 wrote to memory of 1264 4024 ziyu3086.exe 84 PID 4024 wrote to memory of 1264 4024 ziyu3086.exe 84 PID 4024 wrote to memory of 3976 4024 ziyu3086.exe 89 PID 4024 wrote to memory of 3976 4024 ziyu3086.exe 89 PID 4024 wrote to memory of 3976 4024 ziyu3086.exe 89 PID 2784 wrote to memory of 5084 2784 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe 93 PID 2784 wrote to memory of 5084 2784 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe 93 PID 2784 wrote to memory of 5084 2784 57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe"C:\Users\Admin\AppData\Local\Temp\57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyu3086.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyu3086.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr110597.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr110597.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku416855.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku416855.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 14644⤵
- Program crash
PID:1968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr861440.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr861440.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3976 -ip 39761⤵PID:1068
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5305eedee10e85c03011037fc39bbe922
SHA1d195b166f2f661b24388fbfb30fbe06e8ef32006
SHA256bfcd1315edfc05c06918ccf87a7153255cfe1c6b4e36ea033b47bd1de67965ac
SHA51212d3828f68cea79a4d4d06076dc2e83a433f4d25fb46fcf48491ad36e65e61a5c300c6e0d5314460b1894a0d2f745f73e1ae926641276fee49557ee6e1a8c3fd
-
Filesize
176KB
MD5305eedee10e85c03011037fc39bbe922
SHA1d195b166f2f661b24388fbfb30fbe06e8ef32006
SHA256bfcd1315edfc05c06918ccf87a7153255cfe1c6b4e36ea033b47bd1de67965ac
SHA51212d3828f68cea79a4d4d06076dc2e83a433f4d25fb46fcf48491ad36e65e61a5c300c6e0d5314460b1894a0d2f745f73e1ae926641276fee49557ee6e1a8c3fd
-
Filesize
388KB
MD524b89777bbb6c4ccf79438943f7ea184
SHA1c7dfd9f17ffa95fd423c19c38fc2b25bb4a3551a
SHA256138016f91f1132652f4fa371c73534236f877618d5375bd66b260f76303bb6d4
SHA51263dc0a7a6d9c6933dff5fbd533c2c5d186e542d0e24a0559d891f5bffd82b4b4f5c05a117f7b1448f81727712f8569f7f2e9cbda66c594b38b743c9b9c595b4f
-
Filesize
388KB
MD524b89777bbb6c4ccf79438943f7ea184
SHA1c7dfd9f17ffa95fd423c19c38fc2b25bb4a3551a
SHA256138016f91f1132652f4fa371c73534236f877618d5375bd66b260f76303bb6d4
SHA51263dc0a7a6d9c6933dff5fbd533c2c5d186e542d0e24a0559d891f5bffd82b4b4f5c05a117f7b1448f81727712f8569f7f2e9cbda66c594b38b743c9b9c595b4f
-
Filesize
12KB
MD56011b3e4c57b5469011aa444617729be
SHA14e41e2865bcb32e7e89f03f48ed9b6866bdbc776
SHA256ecce9ba68e667200976332686d037b7f2ca645a3a75cddd6fe884c21c472a610
SHA512770c3b09ac466dfb528c8deb0977d41640dfb637de7bf8ebff183ea37853cb16b637702a731d36b3ca2a3373e7ecf73f036aa5fdf8bd1a55be7c5e2970fa30e4
-
Filesize
12KB
MD56011b3e4c57b5469011aa444617729be
SHA14e41e2865bcb32e7e89f03f48ed9b6866bdbc776
SHA256ecce9ba68e667200976332686d037b7f2ca645a3a75cddd6fe884c21c472a610
SHA512770c3b09ac466dfb528c8deb0977d41640dfb637de7bf8ebff183ea37853cb16b637702a731d36b3ca2a3373e7ecf73f036aa5fdf8bd1a55be7c5e2970fa30e4
-
Filesize
434KB
MD51b741d852590967d66bb4b8cadb66188
SHA1d36f998208c6984bec0f8a48c2f52d7b69fa52af
SHA2567d22529a340181e77d8c11fa0e6ae9f8dbd966b4eb12b738354cfe3e49be7607
SHA51275d3778218884fe23ad96edcacbac2ba7c2881cd0a069c34791214e1915d357c8ec61b9887b42261fbf23027c199696ad388aaaf8eb3327cb400d61ef07decd2
-
Filesize
434KB
MD51b741d852590967d66bb4b8cadb66188
SHA1d36f998208c6984bec0f8a48c2f52d7b69fa52af
SHA2567d22529a340181e77d8c11fa0e6ae9f8dbd966b4eb12b738354cfe3e49be7607
SHA51275d3778218884fe23ad96edcacbac2ba7c2881cd0a069c34791214e1915d357c8ec61b9887b42261fbf23027c199696ad388aaaf8eb3327cb400d61ef07decd2