Analysis
-
max time kernel
109s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe
Resource
win10v2004-20230221-en
General
-
Target
045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe
-
Size
538KB
-
MD5
e0612032f4ef3d5a861a8738d126006f
-
SHA1
5dfe3e833fd83128db164297e1accc40942655e3
-
SHA256
045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218
-
SHA512
0afe95b4d12965f3eda2da0996d576d1a97f17b4c8bc5222fe09edd5257e282864f7acd4d2d2fe56305ed00f174e0c1d29d69419b30a04ea2002cbaecae7fbff
-
SSDEEP
12288:EMray90BaXfD6s0n/L2xBLUvqY/ruuEb:+yOkD6s0n/L2xCCVb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr215062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr215062.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr215062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr215062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr215062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr215062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3816-156-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-159-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-157-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-161-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-163-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-165-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-167-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-169-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-171-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-173-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-175-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-177-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-179-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-183-0x0000000002830000-0x0000000002840000-memory.dmp family_redline behavioral1/memory/3816-181-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-185-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-187-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-189-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-191-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-193-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-201-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-199-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-197-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-195-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-203-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-205-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-207-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-209-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-211-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-217-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-219-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-215-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-213-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-221-0x0000000005370000-0x00000000053AF000-memory.dmp family_redline behavioral1/memory/3816-1072-0x0000000002830000-0x0000000002840000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4400 ziuJ8442.exe 5060 jr215062.exe 3816 ku825650.exe 824 lr224134.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr215062.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziuJ8442.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuJ8442.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4316 3816 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5060 jr215062.exe 5060 jr215062.exe 3816 ku825650.exe 3816 ku825650.exe 824 lr224134.exe 824 lr224134.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5060 jr215062.exe Token: SeDebugPrivilege 3816 ku825650.exe Token: SeDebugPrivilege 824 lr224134.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3204 wrote to memory of 4400 3204 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe 85 PID 3204 wrote to memory of 4400 3204 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe 85 PID 3204 wrote to memory of 4400 3204 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe 85 PID 4400 wrote to memory of 5060 4400 ziuJ8442.exe 86 PID 4400 wrote to memory of 5060 4400 ziuJ8442.exe 86 PID 4400 wrote to memory of 3816 4400 ziuJ8442.exe 91 PID 4400 wrote to memory of 3816 4400 ziuJ8442.exe 91 PID 4400 wrote to memory of 3816 4400 ziuJ8442.exe 91 PID 3204 wrote to memory of 824 3204 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe 98 PID 3204 wrote to memory of 824 3204 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe 98 PID 3204 wrote to memory of 824 3204 045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe"C:\Users\Admin\AppData\Local\Temp\045620da8aff1397a3ace2ff242ebf4e614bfd926f4fffaec51caad022e59218.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuJ8442.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuJ8442.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr215062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr215062.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku825650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku825650.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 13484⤵
- Program crash
PID:4316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr224134.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr224134.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3816 -ip 38161⤵PID:1808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57a292785a4f863b007487231fa112a57
SHA1e1e60c4891300c1bad4d1a7b9dddd9326350af4d
SHA25676a33c06d6159e991f908645ad6babea4aec9e07e78e79b490b2267ee4051f57
SHA5120cd31d0bef0b5eeb44162232541491c05e1f88882a6b7ce1627abe4ff060cf6b0828905bbb509b152a6e39d6a124bee9d4183697f156f58d4b3608aab9867580
-
Filesize
175KB
MD57a292785a4f863b007487231fa112a57
SHA1e1e60c4891300c1bad4d1a7b9dddd9326350af4d
SHA25676a33c06d6159e991f908645ad6babea4aec9e07e78e79b490b2267ee4051f57
SHA5120cd31d0bef0b5eeb44162232541491c05e1f88882a6b7ce1627abe4ff060cf6b0828905bbb509b152a6e39d6a124bee9d4183697f156f58d4b3608aab9867580
-
Filesize
395KB
MD58a53e4f51bd25b7c0865cff14d761b76
SHA1c281655270efe3919584f4504b2d22f22458c0d5
SHA2563fe7bb80a46bfc61c735c3be2acaf9d381863a5ef24b371115b471debcf0dd2b
SHA5122175f0a1c9813e7a090be1cee2c6c8e87fc52c29b8020bd8506dab240f4e366c818f87cf8714ba942aab2431eb0ae8df1f081ac2e0a6d1da4d2594b7dcdadb9c
-
Filesize
395KB
MD58a53e4f51bd25b7c0865cff14d761b76
SHA1c281655270efe3919584f4504b2d22f22458c0d5
SHA2563fe7bb80a46bfc61c735c3be2acaf9d381863a5ef24b371115b471debcf0dd2b
SHA5122175f0a1c9813e7a090be1cee2c6c8e87fc52c29b8020bd8506dab240f4e366c818f87cf8714ba942aab2431eb0ae8df1f081ac2e0a6d1da4d2594b7dcdadb9c
-
Filesize
13KB
MD527c5f860aba12e5dcf8fbd158d512349
SHA1e335f6adba32a9ba9989c8b8e127df3b3dd89c19
SHA25673ec83a7a7b24b02710fdc7c6840d4321f13d28e7f3d98dc326a7774c0f46175
SHA5122d9f4e42fc6955e9fd710bacc54819b9b91acc83f562ef5e246645dcb7c3f9744ee49e42638cbe0ac51cc0681926cf2e66320036f4f085da37b7472d934bd17b
-
Filesize
13KB
MD527c5f860aba12e5dcf8fbd158d512349
SHA1e335f6adba32a9ba9989c8b8e127df3b3dd89c19
SHA25673ec83a7a7b24b02710fdc7c6840d4321f13d28e7f3d98dc326a7774c0f46175
SHA5122d9f4e42fc6955e9fd710bacc54819b9b91acc83f562ef5e246645dcb7c3f9744ee49e42638cbe0ac51cc0681926cf2e66320036f4f085da37b7472d934bd17b
-
Filesize
353KB
MD54f6c0a6bac0764d07251c03c5af6b225
SHA1e14ab7f5c60339a1fe15bf6e8e7c382f50eb4d34
SHA2569538113cc36dab290b49c29191c20082829e145b1a386621c3d8cd0f27a321ee
SHA5128839246ce52d6e18b2f20fae27108573d292050b13b62d59a7633f43242277e66ca0c20008dccf1931425fe532f020e5921dbb186aa4e625f3126e0529dcb2da
-
Filesize
353KB
MD54f6c0a6bac0764d07251c03c5af6b225
SHA1e14ab7f5c60339a1fe15bf6e8e7c382f50eb4d34
SHA2569538113cc36dab290b49c29191c20082829e145b1a386621c3d8cd0f27a321ee
SHA5128839246ce52d6e18b2f20fae27108573d292050b13b62d59a7633f43242277e66ca0c20008dccf1931425fe532f020e5921dbb186aa4e625f3126e0529dcb2da