Analysis
-
max time kernel
156s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe
Resource
win10v2004-20230220-en
General
-
Target
7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe
-
Size
522KB
-
MD5
0e2f9647b0d388f7050b3bd76f17e2c7
-
SHA1
97224b787d5f02d23cd7982b36f02a3c1669435b
-
SHA256
7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120
-
SHA512
f66abd7e08d8fddab07826ba61e08ebf2c4986fdd95deee46126b43b2e249918f56a5ae7e8d301b56846a4c122f68643908aef4ac3c410f488f24f0ec1644772
-
SSDEEP
12288:iMrSy90YM88BEmtrwXuhCqJRUd1swwd2M:AyrM8gwuYqnUdFwd3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr593904.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr593904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr593904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr593904.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr593904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr593904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr593904.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4868-157-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-158-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-160-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-162-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-164-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-166-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-168-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-170-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-172-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-174-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-176-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-178-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-180-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-182-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-184-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-186-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-188-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-190-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-192-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-194-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-196-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-198-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-200-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-202-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-204-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-206-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-208-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-210-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-212-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-214-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-216-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-218-0x0000000002620000-0x000000000265F000-memory.dmp family_redline behavioral1/memory/4868-220-0x0000000002620000-0x000000000265F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziGk6167.exejr593904.exeku979680.exelr349327.exepid process 480 ziGk6167.exe 1988 jr593904.exe 4868 ku979680.exe 4976 lr349327.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr593904.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr593904.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exeziGk6167.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGk6167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGk6167.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3580 4868 WerFault.exe ku979680.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr593904.exeku979680.exelr349327.exepid process 1988 jr593904.exe 1988 jr593904.exe 4868 ku979680.exe 4868 ku979680.exe 4976 lr349327.exe 4976 lr349327.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr593904.exeku979680.exelr349327.exedescription pid process Token: SeDebugPrivilege 1988 jr593904.exe Token: SeDebugPrivilege 4868 ku979680.exe Token: SeDebugPrivilege 4976 lr349327.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exeziGk6167.exedescription pid process target process PID 2680 wrote to memory of 480 2680 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe ziGk6167.exe PID 2680 wrote to memory of 480 2680 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe ziGk6167.exe PID 2680 wrote to memory of 480 2680 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe ziGk6167.exe PID 480 wrote to memory of 1988 480 ziGk6167.exe jr593904.exe PID 480 wrote to memory of 1988 480 ziGk6167.exe jr593904.exe PID 480 wrote to memory of 4868 480 ziGk6167.exe ku979680.exe PID 480 wrote to memory of 4868 480 ziGk6167.exe ku979680.exe PID 480 wrote to memory of 4868 480 ziGk6167.exe ku979680.exe PID 2680 wrote to memory of 4976 2680 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe lr349327.exe PID 2680 wrote to memory of 4976 2680 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe lr349327.exe PID 2680 wrote to memory of 4976 2680 7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe lr349327.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe"C:\Users\Admin\AppData\Local\Temp\7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 12804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4868 -ip 48681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exeFilesize
175KB
MD5ceb00d2dd7ba432c109a24c3283a430e
SHA11887f5397484742a5a21c80e3ef544a17df0ea6d
SHA256165117a05d297f77aa70d02a74611f80cef5bec9bb3b71f18fb984266edb016b
SHA51294db967d9fc377868d023331a398c3f07e21a5be51a0be14eb567adba97947881e882a93f1eaee21153cbcf3354fa8fe923a422c4f8724e61f0c13f2be77d5c2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exeFilesize
175KB
MD5ceb00d2dd7ba432c109a24c3283a430e
SHA11887f5397484742a5a21c80e3ef544a17df0ea6d
SHA256165117a05d297f77aa70d02a74611f80cef5bec9bb3b71f18fb984266edb016b
SHA51294db967d9fc377868d023331a398c3f07e21a5be51a0be14eb567adba97947881e882a93f1eaee21153cbcf3354fa8fe923a422c4f8724e61f0c13f2be77d5c2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exeFilesize
380KB
MD59a28e5ab7126e20cb4259d21a11b6fc6
SHA1c57d1856b8de2468865a5db73357863fde91a474
SHA256ab72e11ec49ff0192b09023b76ac89bd02e241bb5b1fe7cee10bb2bdf36c01c7
SHA51225b19c0287ee8e6b3c567b2a3c73030757bef59b313382caa4ff7605d645bdfb0dcc07ffbd1580e0702d590a5282b78dabdad7a2f04e4ff145a3a75a452c0833
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exeFilesize
380KB
MD59a28e5ab7126e20cb4259d21a11b6fc6
SHA1c57d1856b8de2468865a5db73357863fde91a474
SHA256ab72e11ec49ff0192b09023b76ac89bd02e241bb5b1fe7cee10bb2bdf36c01c7
SHA51225b19c0287ee8e6b3c567b2a3c73030757bef59b313382caa4ff7605d645bdfb0dcc07ffbd1580e0702d590a5282b78dabdad7a2f04e4ff145a3a75a452c0833
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exeFilesize
15KB
MD5113f7b74c81f5b703a3eda02e974b7be
SHA10c30292c23049158a7a1438661ca3bbe1eb00079
SHA2560211702a99c570b8f4ab04c39971d10796c83a1c9c9f3737a1e467fda98dddf5
SHA5129994c06e926959ced36c06aa34601f1a50486cdfa7fc7c36b3cf03e19d1aba856b45d26b467288c27dce82f906a29934ee6b1243d4dcba54e8ca3f8f1ce9c637
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exeFilesize
15KB
MD5113f7b74c81f5b703a3eda02e974b7be
SHA10c30292c23049158a7a1438661ca3bbe1eb00079
SHA2560211702a99c570b8f4ab04c39971d10796c83a1c9c9f3737a1e467fda98dddf5
SHA5129994c06e926959ced36c06aa34601f1a50486cdfa7fc7c36b3cf03e19d1aba856b45d26b467288c27dce82f906a29934ee6b1243d4dcba54e8ca3f8f1ce9c637
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exeFilesize
295KB
MD5cf06b6e3ff537e48dba81dadc982c487
SHA13851b9af734ff39ba8e6c621b91d2d4a6f9f18e5
SHA2563de84bb53434f4c6a20579a8706d50332a511077f8163d4c24c809167aaf523e
SHA512eb74635c276e0cd4d55e8324bb5ed2d97c79f17508905f83608da8e2beba5650430c3edcad218c8a91a59c71348f3c084a7dc5a8cf99c1c6d022b20b1699d91b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exeFilesize
295KB
MD5cf06b6e3ff537e48dba81dadc982c487
SHA13851b9af734ff39ba8e6c621b91d2d4a6f9f18e5
SHA2563de84bb53434f4c6a20579a8706d50332a511077f8163d4c24c809167aaf523e
SHA512eb74635c276e0cd4d55e8324bb5ed2d97c79f17508905f83608da8e2beba5650430c3edcad218c8a91a59c71348f3c084a7dc5a8cf99c1c6d022b20b1699d91b
-
memory/1988-147-0x00000000002D0000-0x00000000002DA000-memory.dmpFilesize
40KB
-
memory/4868-153-0x0000000004C90000-0x0000000005234000-memory.dmpFilesize
5.6MB
-
memory/4868-154-0x0000000000740000-0x000000000078B000-memory.dmpFilesize
300KB
-
memory/4868-156-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4868-155-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4868-157-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-158-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-160-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-162-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-164-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-166-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-168-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-170-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-172-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-174-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-176-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-178-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-180-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-182-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-184-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-186-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-188-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-190-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-192-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-194-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-196-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-198-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-200-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-202-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-204-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-206-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-208-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-210-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-212-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-214-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-216-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-218-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-220-0x0000000002620000-0x000000000265F000-memory.dmpFilesize
252KB
-
memory/4868-1063-0x0000000005240000-0x0000000005858000-memory.dmpFilesize
6.1MB
-
memory/4868-1064-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4868-1065-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4868-1066-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4868-1067-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4868-1069-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4868-1070-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4868-1071-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4868-1072-0x00000000064F0000-0x0000000006582000-memory.dmpFilesize
584KB
-
memory/4868-1073-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4868-1074-0x0000000006A30000-0x0000000006BF2000-memory.dmpFilesize
1.8MB
-
memory/4868-1075-0x0000000006C10000-0x000000000713C000-memory.dmpFilesize
5.2MB
-
memory/4868-1076-0x0000000007280000-0x00000000072F6000-memory.dmpFilesize
472KB
-
memory/4868-1077-0x0000000007300000-0x0000000007350000-memory.dmpFilesize
320KB
-
memory/4976-1083-0x0000000000D10000-0x0000000000D42000-memory.dmpFilesize
200KB
-
memory/4976-1084-0x00000000058E0000-0x00000000058F0000-memory.dmpFilesize
64KB