Analysis
-
max time kernel
62s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe
Resource
win10v2004-20230220-en
General
-
Target
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe
-
Size
530KB
-
MD5
b83545dbf659017b4b90a8c55320b912
-
SHA1
ee31c72d28c58cc78472448d84cbb2db806e7cce
-
SHA256
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b
-
SHA512
6fa96ef741de79fa92cca80dfec2366f86bc87f944a1d2332b7b87a86f25235749b04cfc77aaa807f141d8ea366194675378c67d95bd684e8f9c200b5cf3f560
-
SSDEEP
12288:DMrSy906Vn8ApR3bCh/4VEwu0me+6ucjW+ogi:py/8Ap9bCN4V9vmDcGgi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr324877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr324877.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr324877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr324877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr324877.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr324877.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3696-158-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-159-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-161-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-163-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-165-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-167-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-169-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-171-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-173-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-175-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-177-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-179-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-181-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-183-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-185-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-187-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-189-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-191-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-193-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-195-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-197-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-199-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-201-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-203-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-205-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-207-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-209-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-211-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-213-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-215-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-217-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-219-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3696-221-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4500 ziWW0803.exe 1156 jr324877.exe 3696 ku336969.exe 2108 lr391795.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr324877.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWW0803.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWW0803.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 908 3696 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1156 jr324877.exe 1156 jr324877.exe 3696 ku336969.exe 3696 ku336969.exe 2108 lr391795.exe 2108 lr391795.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1156 jr324877.exe Token: SeDebugPrivilege 3696 ku336969.exe Token: SeDebugPrivilege 2108 lr391795.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4500 2000 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe 78 PID 2000 wrote to memory of 4500 2000 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe 78 PID 2000 wrote to memory of 4500 2000 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe 78 PID 4500 wrote to memory of 1156 4500 ziWW0803.exe 79 PID 4500 wrote to memory of 1156 4500 ziWW0803.exe 79 PID 4500 wrote to memory of 3696 4500 ziWW0803.exe 86 PID 4500 wrote to memory of 3696 4500 ziWW0803.exe 86 PID 4500 wrote to memory of 3696 4500 ziWW0803.exe 86 PID 2000 wrote to memory of 2108 2000 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe 94 PID 2000 wrote to memory of 2108 2000 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe 94 PID 2000 wrote to memory of 2108 2000 7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe"C:\Users\Admin\AppData\Local\Temp\7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW0803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW0803.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324877.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku336969.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku336969.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 13444⤵
- Program crash
PID:908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr391795.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr391795.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3696 -ip 36961⤵PID:4956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5f0a9978a1252d2528c4dfbc127d4df80
SHA1d86d08c8063bbf39b91d3f5681333dc941ce99a3
SHA2569992fad60e8da19984007355d54ab29b8244b5cc86bea8664672c13f7ff61be9
SHA51220915c240818415aac9e5432edb7d2b6e4f17d6c58f73afb6c241cd9d94ec37aadb27154e066be74dded4aaae80f21fff39264944f29551077248f91f7d695ea
-
Filesize
176KB
MD5f0a9978a1252d2528c4dfbc127d4df80
SHA1d86d08c8063bbf39b91d3f5681333dc941ce99a3
SHA2569992fad60e8da19984007355d54ab29b8244b5cc86bea8664672c13f7ff61be9
SHA51220915c240818415aac9e5432edb7d2b6e4f17d6c58f73afb6c241cd9d94ec37aadb27154e066be74dded4aaae80f21fff39264944f29551077248f91f7d695ea
-
Filesize
388KB
MD5401696862f093fb0f480ad602f4276aa
SHA1a5ec5b59a4e0ef7a67a64938108b721f851ccf21
SHA256e7f51c3a27db9ccf1b5bf5698672276984aae83d8e5a4517341a66f11914ab12
SHA51232358e28e25e974d3f6ed2c38d855a59c7b4083363d374514f63f7c81febb5ca58b77bf3601659e70f6258137661d388ecc39a4e373dde9d62a8562432d61d65
-
Filesize
388KB
MD5401696862f093fb0f480ad602f4276aa
SHA1a5ec5b59a4e0ef7a67a64938108b721f851ccf21
SHA256e7f51c3a27db9ccf1b5bf5698672276984aae83d8e5a4517341a66f11914ab12
SHA51232358e28e25e974d3f6ed2c38d855a59c7b4083363d374514f63f7c81febb5ca58b77bf3601659e70f6258137661d388ecc39a4e373dde9d62a8562432d61d65
-
Filesize
12KB
MD50d363598d1ee18fe7dca64cdc424f46b
SHA15d08e58de9a46a2383f5ce4a52ff9de36fce4474
SHA256449495b8d8b6a5cdb59b0ef8d4702319ad950766e7feab322f5dd1ec6c3565ab
SHA512f263f7e67e7e19280d267db1754e16e314d4426681501bbe2ec752e034ab77f78cc6fab1afe99cb3dda9bd1893be6dc0c1310dd29aac9dfc64074e16d4b97d3e
-
Filesize
12KB
MD50d363598d1ee18fe7dca64cdc424f46b
SHA15d08e58de9a46a2383f5ce4a52ff9de36fce4474
SHA256449495b8d8b6a5cdb59b0ef8d4702319ad950766e7feab322f5dd1ec6c3565ab
SHA512f263f7e67e7e19280d267db1754e16e314d4426681501bbe2ec752e034ab77f78cc6fab1afe99cb3dda9bd1893be6dc0c1310dd29aac9dfc64074e16d4b97d3e
-
Filesize
434KB
MD57dffc90726dd825ec7bb34eab04c2c34
SHA1f4a9d552adae470da7068e126ef978587c3f0c8b
SHA256ec5f9ecf6c25a4b5722824e8b2b33b461433fcafd88b3cbf13bc771921d8005d
SHA512c8956044708b66a1fadbd830adcbcde7a70ac5e8858d22e6456fd947c1eb793db8a51543ffa174d10b7f714d4a14f9a2379e64ccaf2f8c94702e3152fb9e3448
-
Filesize
434KB
MD57dffc90726dd825ec7bb34eab04c2c34
SHA1f4a9d552adae470da7068e126ef978587c3f0c8b
SHA256ec5f9ecf6c25a4b5722824e8b2b33b461433fcafd88b3cbf13bc771921d8005d
SHA512c8956044708b66a1fadbd830adcbcde7a70ac5e8858d22e6456fd947c1eb793db8a51543ffa174d10b7f714d4a14f9a2379e64ccaf2f8c94702e3152fb9e3448