Analysis
-
max time kernel
61s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 09:30
Static task
static1
Behavioral task
behavioral1
Sample
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe
Resource
win10v2004-20230220-en
General
-
Target
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe
-
Size
529KB
-
MD5
3c5aa3b17a3d9a013aa7f0287f5c8c27
-
SHA1
cce8ccd6ef820ab32beae068b9b123858aaead44
-
SHA256
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7
-
SHA512
7b18205fde082c3d3bf63a88a904b03125193fc51ee9b83bd47175e4d1778e7e7dae3683441f579a714058e5c088388528365dc5a65df1d6c560bab14a9dccfb
-
SSDEEP
12288:kMrmy90sja8tKnqsDmbI5guWGeKTDRzlTebCHYoMAN3k6K:ayb8nbZoGeODRZTdh3kD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr719544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr719544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr719544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr719544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr719544.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr719544.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4852-157-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-158-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-160-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-162-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-164-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-166-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-168-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-170-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-172-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-174-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-176-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-178-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-180-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-182-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-186-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-184-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-188-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-190-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-192-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-196-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-194-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-198-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-200-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-202-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-204-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-206-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-208-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-210-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-214-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-216-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-212-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-218-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline behavioral1/memory/4852-220-0x0000000002BA0000-0x0000000002BDF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4516 ziXY5908.exe 1220 jr719544.exe 4852 ku763789.exe 4840 lr999662.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr719544.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXY5908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXY5908.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1408 4852 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1220 jr719544.exe 1220 jr719544.exe 4852 ku763789.exe 4852 ku763789.exe 4840 lr999662.exe 4840 lr999662.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1220 jr719544.exe Token: SeDebugPrivilege 4852 ku763789.exe Token: SeDebugPrivilege 4840 lr999662.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1340 wrote to memory of 4516 1340 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe 81 PID 1340 wrote to memory of 4516 1340 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe 81 PID 1340 wrote to memory of 4516 1340 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe 81 PID 4516 wrote to memory of 1220 4516 ziXY5908.exe 82 PID 4516 wrote to memory of 1220 4516 ziXY5908.exe 82 PID 4516 wrote to memory of 4852 4516 ziXY5908.exe 87 PID 4516 wrote to memory of 4852 4516 ziXY5908.exe 87 PID 4516 wrote to memory of 4852 4516 ziXY5908.exe 87 PID 1340 wrote to memory of 4840 1340 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe 95 PID 1340 wrote to memory of 4840 1340 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe 95 PID 1340 wrote to memory of 4840 1340 2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe"C:\Users\Admin\AppData\Local\Temp\2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXY5908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXY5908.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr719544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr719544.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku763789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku763789.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 18524⤵
- Program crash
PID:1408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr999662.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr999662.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4852 -ip 48521⤵PID:4320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5177aef522b20ba13bda6d607278eeda5
SHA13c49e975b15771664c9d11ae1bc8942ec3674785
SHA25671870b997863462c60999330fbcf9785b663c0bfec76baf5d561766e90ecee51
SHA5128dcfa933f845b384e2d7069e613a849d8212ca5a8af00d4405d49a58dd026853055eadfd300f56836b79eb84be105f340e349561e3912061ffbb78d2f96c36de
-
Filesize
176KB
MD5177aef522b20ba13bda6d607278eeda5
SHA13c49e975b15771664c9d11ae1bc8942ec3674785
SHA25671870b997863462c60999330fbcf9785b663c0bfec76baf5d561766e90ecee51
SHA5128dcfa933f845b384e2d7069e613a849d8212ca5a8af00d4405d49a58dd026853055eadfd300f56836b79eb84be105f340e349561e3912061ffbb78d2f96c36de
-
Filesize
387KB
MD5b0cdef228dd2c4dea5db0e17432aee00
SHA1ac34cdf732a051b03753c16ca3aad83722a06df8
SHA2561b7c87c04a8f3784c53ffb3314c2a6f15eb16539a2f46e56e59aae14f89e4dfc
SHA51248aeb67642d28a0c3f3f70156ea0df7cb1d9cc53244e930b05dcfaa1aa9e2862006363b001517e686328a22175009f0623bb3bd1b56d1cecb0f8fbef3971d580
-
Filesize
387KB
MD5b0cdef228dd2c4dea5db0e17432aee00
SHA1ac34cdf732a051b03753c16ca3aad83722a06df8
SHA2561b7c87c04a8f3784c53ffb3314c2a6f15eb16539a2f46e56e59aae14f89e4dfc
SHA51248aeb67642d28a0c3f3f70156ea0df7cb1d9cc53244e930b05dcfaa1aa9e2862006363b001517e686328a22175009f0623bb3bd1b56d1cecb0f8fbef3971d580
-
Filesize
12KB
MD5a7e9bfbab8043ae6b1a71b8d2ea1ed9f
SHA10849763c2b3adf737409d1572b05647f5cf5e97f
SHA256d3e7b01a08b291a48894b3682f248da76e932ac90d82c3cc599e30e8ae453a72
SHA51261edf844bca2049fdcbd0e5ba59402c91bfc7b18fd37edb04aeec5d729627cb5670d257b7a1f03a4886e2c84f52f3a86980818345f43909fa755b31836d891f4
-
Filesize
12KB
MD5a7e9bfbab8043ae6b1a71b8d2ea1ed9f
SHA10849763c2b3adf737409d1572b05647f5cf5e97f
SHA256d3e7b01a08b291a48894b3682f248da76e932ac90d82c3cc599e30e8ae453a72
SHA51261edf844bca2049fdcbd0e5ba59402c91bfc7b18fd37edb04aeec5d729627cb5670d257b7a1f03a4886e2c84f52f3a86980818345f43909fa755b31836d891f4
-
Filesize
353KB
MD5aa813edffe493d84e72080f795e60b39
SHA1e5f7313d6c42b6aeb5951e959593949e154c8319
SHA25627a0b0b029e6e775c353af0f2b09020df227efda69464dd7b4b29698d5d62e38
SHA5124d3aab3f9726b370e1293a8378ad29ce84be1c356f3f97d68c25cd359ebf084fab5d9765ff352d297212c5dfc7d0c2267aa332ab0e0f7691348585c63273fae2
-
Filesize
353KB
MD5aa813edffe493d84e72080f795e60b39
SHA1e5f7313d6c42b6aeb5951e959593949e154c8319
SHA25627a0b0b029e6e775c353af0f2b09020df227efda69464dd7b4b29698d5d62e38
SHA5124d3aab3f9726b370e1293a8378ad29ce84be1c356f3f97d68c25cd359ebf084fab5d9765ff352d297212c5dfc7d0c2267aa332ab0e0f7691348585c63273fae2