Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe
Resource
win10v2004-20230220-en
General
-
Target
d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe
-
Size
530KB
-
MD5
e0800922a294f1b49ab829cee166e373
-
SHA1
b6bb8edc89d2abd15d385e1109c2efc8a1cabe71
-
SHA256
d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9
-
SHA512
74f8264d6735cc375be082048948ac96d96b956e07def6d745ce2522df8db6b754953feefaaeca065f6168b08141245bf82cfd490ce9108f20d79c95391b9395
-
SSDEEP
12288:yMr0y906d2XEbeAbWPKHf5KXa/6Sy8M+Mq7/tpI:ayD2rkWMA5Sy8Oq7DI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr856582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr856582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr856582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr856582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr856582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr856582.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4416-157-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-158-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-160-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-162-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-164-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-166-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-168-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-170-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-172-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-174-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-176-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-178-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-180-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-182-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-184-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-186-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-188-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-190-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-192-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-194-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-196-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-198-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-200-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-202-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-204-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-208-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-210-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-212-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-214-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-216-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-218-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline behavioral1/memory/4416-220-0x0000000004BF0000-0x0000000004C2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4008 ziyh9031.exe 4448 jr856582.exe 4416 ku059149.exe 4672 lr915912.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr856582.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyh9031.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyh9031.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4124 4416 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4448 jr856582.exe 4448 jr856582.exe 4416 ku059149.exe 4416 ku059149.exe 4672 lr915912.exe 4672 lr915912.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4448 jr856582.exe Token: SeDebugPrivilege 4416 ku059149.exe Token: SeDebugPrivilege 4672 lr915912.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4008 2840 d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe 84 PID 2840 wrote to memory of 4008 2840 d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe 84 PID 2840 wrote to memory of 4008 2840 d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe 84 PID 4008 wrote to memory of 4448 4008 ziyh9031.exe 85 PID 4008 wrote to memory of 4448 4008 ziyh9031.exe 85 PID 4008 wrote to memory of 4416 4008 ziyh9031.exe 88 PID 4008 wrote to memory of 4416 4008 ziyh9031.exe 88 PID 4008 wrote to memory of 4416 4008 ziyh9031.exe 88 PID 2840 wrote to memory of 4672 2840 d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe 92 PID 2840 wrote to memory of 4672 2840 d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe 92 PID 2840 wrote to memory of 4672 2840 d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe"C:\Users\Admin\AppData\Local\Temp\d9e53de2de0b83824ae60fad8582894cbc5cedd4d3c1c39b31a52ab1ded32dd9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyh9031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyh9031.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr856582.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr856582.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku059149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku059149.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 16284⤵
- Program crash
PID:4124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr915912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr915912.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4416 -ip 44161⤵PID:4756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5fff6544dffe7fc022c760419ed9abbb9
SHA1f99a9069b31b34471a007501e3fea8d68e082f32
SHA256e67513829d9c2e5ac20f8c8a7e6bfd70b0391e9b32c5ab7be4c693c6c7f098a4
SHA51289c3d45621c4bb7cb0624cedb322cd9a83511f0eaefb94d49b71cd1703352ad0c99f7a0249a7e0ab3e02eeca82d3b122b5da5a581e5c000ee118de7a4c4761ea
-
Filesize
176KB
MD5fff6544dffe7fc022c760419ed9abbb9
SHA1f99a9069b31b34471a007501e3fea8d68e082f32
SHA256e67513829d9c2e5ac20f8c8a7e6bfd70b0391e9b32c5ab7be4c693c6c7f098a4
SHA51289c3d45621c4bb7cb0624cedb322cd9a83511f0eaefb94d49b71cd1703352ad0c99f7a0249a7e0ab3e02eeca82d3b122b5da5a581e5c000ee118de7a4c4761ea
-
Filesize
388KB
MD5ef20a0101575a3dfc312d128af883659
SHA14b5e8f8e251840e1933da43645cbac1b3d4a31f9
SHA256bc88bfc4d97e43df1596b959a3c11729ced75b8cdc020078d7f4594eed3bebcc
SHA512500da09f2dd2d5cd83c00f810748b27198df97c6da110b1ba85bdfa701d42054afcb0f7f51582c1dd6c29ba86522fcca22300bb796f2721a7a7e659188cf8ae0
-
Filesize
388KB
MD5ef20a0101575a3dfc312d128af883659
SHA14b5e8f8e251840e1933da43645cbac1b3d4a31f9
SHA256bc88bfc4d97e43df1596b959a3c11729ced75b8cdc020078d7f4594eed3bebcc
SHA512500da09f2dd2d5cd83c00f810748b27198df97c6da110b1ba85bdfa701d42054afcb0f7f51582c1dd6c29ba86522fcca22300bb796f2721a7a7e659188cf8ae0
-
Filesize
12KB
MD56cbffbe69479716ad5391be187161e8b
SHA1749ef2a1ab13175e85d1b5404aebfe514e0fd25b
SHA256b3120668552f5d171a8f7068d2a8a0e5c278aadd9765ef42289b3ee0f7e0abf0
SHA512821079b9e925b2544de6eb9ec43b81fa0a56fb5dc38d2ed8af6d4821ca8244e42512bd40b7783e9395fff6bb39bcea1dcf86648e75dab160e77c15b6ff74bedc
-
Filesize
12KB
MD56cbffbe69479716ad5391be187161e8b
SHA1749ef2a1ab13175e85d1b5404aebfe514e0fd25b
SHA256b3120668552f5d171a8f7068d2a8a0e5c278aadd9765ef42289b3ee0f7e0abf0
SHA512821079b9e925b2544de6eb9ec43b81fa0a56fb5dc38d2ed8af6d4821ca8244e42512bd40b7783e9395fff6bb39bcea1dcf86648e75dab160e77c15b6ff74bedc
-
Filesize
434KB
MD5ff93c82254051e61f4f886064ed9840d
SHA1aa2836554989a557407d1a9cbfcd0d1fc96291a7
SHA256bc58183088bd023e545f0979f54ea9c25b2e5ce28d9e9b238d23253a6017b5b5
SHA512bdb0a6c40a1f2929a02e0e02fedc77fd257086f9d67f16b6c6fadc72aee229b7f3392d7b06ddc2f3e9ba1a268abbed765736b552f7bf4abe6be34a2448571ca2
-
Filesize
434KB
MD5ff93c82254051e61f4f886064ed9840d
SHA1aa2836554989a557407d1a9cbfcd0d1fc96291a7
SHA256bc58183088bd023e545f0979f54ea9c25b2e5ce28d9e9b238d23253a6017b5b5
SHA512bdb0a6c40a1f2929a02e0e02fedc77fd257086f9d67f16b6c6fadc72aee229b7f3392d7b06ddc2f3e9ba1a268abbed765736b552f7bf4abe6be34a2448571ca2