Analysis
-
max time kernel
124s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe
Resource
win10v2004-20230220-en
General
-
Target
19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe
-
Size
536KB
-
MD5
42e850809c3ea61f97af4dda73cd9cd3
-
SHA1
a9304367bf5d8654e50815255315810fb8b46f2a
-
SHA256
19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79
-
SHA512
fa642414b43c05fb838705cee64dc233f9da3456d53b9ccb160ab86ec54ce1a41917d04fd61978fc95ee1f6cb9951f9aa635f0e012c647de63b85d157e98d8bc
-
SSDEEP
12288:zMrly90Jso2AZ6eKJPpflW1qNazY2XgL3NO7s9q0+NOR:Oyssob6dbNaPgzNms4Ne
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr650061.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr650061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr650061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr650061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr650061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr650061.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2968-158-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-157-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-160-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-164-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-162-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-166-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-168-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-170-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-172-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-174-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-176-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-178-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-180-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-182-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-184-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-186-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-188-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-190-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-192-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-194-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-196-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-198-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-200-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-202-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-204-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-206-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-208-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-210-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-212-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-214-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-216-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-218-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2968-220-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4380 zieZ7631.exe 1296 jr650061.exe 2968 ku965238.exe 1680 lr333713.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr650061.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieZ7631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieZ7631.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4240 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3648 2968 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1296 jr650061.exe 1296 jr650061.exe 2968 ku965238.exe 2968 ku965238.exe 1680 lr333713.exe 1680 lr333713.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1296 jr650061.exe Token: SeDebugPrivilege 2968 ku965238.exe Token: SeDebugPrivilege 1680 lr333713.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4380 2320 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe 84 PID 2320 wrote to memory of 4380 2320 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe 84 PID 2320 wrote to memory of 4380 2320 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe 84 PID 4380 wrote to memory of 1296 4380 zieZ7631.exe 85 PID 4380 wrote to memory of 1296 4380 zieZ7631.exe 85 PID 4380 wrote to memory of 2968 4380 zieZ7631.exe 91 PID 4380 wrote to memory of 2968 4380 zieZ7631.exe 91 PID 4380 wrote to memory of 2968 4380 zieZ7631.exe 91 PID 2320 wrote to memory of 1680 2320 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe 95 PID 2320 wrote to memory of 1680 2320 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe 95 PID 2320 wrote to memory of 1680 2320 19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe"C:\Users\Admin\AppData\Local\Temp\19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieZ7631.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieZ7631.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr650061.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr650061.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965238.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 13364⤵
- Program crash
PID:3648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr333713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr333713.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2968 -ip 29681⤵PID:3988
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD559b323cde584cd2fc555448b6f58461a
SHA1ad62d7ef9bf4f56019820ee4a2cf89e399234424
SHA2566f18ae1fdbba398a201dc80234135278ddbec1c8a6e45d4822e209fc05868113
SHA512f793969f41bbfd1d29e5e89a37a0eb45def575c07abc75035b70739cfacb25ca0f0928ce56cf55be6ed487a488cf95dc280aa569417974fb2f50f4855f6e848e
-
Filesize
175KB
MD559b323cde584cd2fc555448b6f58461a
SHA1ad62d7ef9bf4f56019820ee4a2cf89e399234424
SHA2566f18ae1fdbba398a201dc80234135278ddbec1c8a6e45d4822e209fc05868113
SHA512f793969f41bbfd1d29e5e89a37a0eb45def575c07abc75035b70739cfacb25ca0f0928ce56cf55be6ed487a488cf95dc280aa569417974fb2f50f4855f6e848e
-
Filesize
394KB
MD54b15f758ecf17c843145d61beaec71f1
SHA1f46522835748dacd9ccd313c0592d7231e705176
SHA256e4cc2b6e7315c56c93412c9cc4080977c4693b0391d7458cfb355f5c47c262ee
SHA5122627a3a938cbf0a332eec216a60b128d15ab0ac3e47aa75e04eefe608241e054c9023bfb47e9408f76ecf9eddd23351d0462f7774349513087c0f0b1aedb8ad6
-
Filesize
394KB
MD54b15f758ecf17c843145d61beaec71f1
SHA1f46522835748dacd9ccd313c0592d7231e705176
SHA256e4cc2b6e7315c56c93412c9cc4080977c4693b0391d7458cfb355f5c47c262ee
SHA5122627a3a938cbf0a332eec216a60b128d15ab0ac3e47aa75e04eefe608241e054c9023bfb47e9408f76ecf9eddd23351d0462f7774349513087c0f0b1aedb8ad6
-
Filesize
13KB
MD574b4cd2879e230c46212c672b90c8dd7
SHA175b9a2a056e185f5279fa3a6687382a67b5e4e54
SHA256cf58a20bed8654fc2c19bcf25f7d8d83571cd20265038e5152bde780ce137cba
SHA512fb5a30964f477f07eda412c1fe7fba21856c4292ec13b8ce499faef8169471e4bebd8d8d1b0528ad6a17f7520efbf7630b5c73876eb4ac375801fe7a22d4c57f
-
Filesize
13KB
MD574b4cd2879e230c46212c672b90c8dd7
SHA175b9a2a056e185f5279fa3a6687382a67b5e4e54
SHA256cf58a20bed8654fc2c19bcf25f7d8d83571cd20265038e5152bde780ce137cba
SHA512fb5a30964f477f07eda412c1fe7fba21856c4292ec13b8ce499faef8169471e4bebd8d8d1b0528ad6a17f7520efbf7630b5c73876eb4ac375801fe7a22d4c57f
-
Filesize
353KB
MD581243b9da40bd368a977aa0cccfc4a0d
SHA13ae76af94d8bc49262bd916f27d0c912468ef60e
SHA2562ca250f30c19fb3a6bbf567a3de7fa2b5e00194bd4fc4a2a9515c547934bb77e
SHA512f1437ad835632a6d970893a67287ee519951707d7631e42cb824c02a2fcb6b09f004800ecaf972e6fecd2e2aef769d2df9d7e926adc55ab8d42b2890e0892129
-
Filesize
353KB
MD581243b9da40bd368a977aa0cccfc4a0d
SHA13ae76af94d8bc49262bd916f27d0c912468ef60e
SHA2562ca250f30c19fb3a6bbf567a3de7fa2b5e00194bd4fc4a2a9515c547934bb77e
SHA512f1437ad835632a6d970893a67287ee519951707d7631e42cb824c02a2fcb6b09f004800ecaf972e6fecd2e2aef769d2df9d7e926adc55ab8d42b2890e0892129