Analysis
-
max time kernel
96s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:26
Static task
static1
Behavioral task
behavioral1
Sample
1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe
Resource
win10v2004-20230220-en
General
-
Target
1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe
-
Size
522KB
-
MD5
5cca3c33c85645d285d2e4aa77151770
-
SHA1
5a97be06f28dfb0009f5fc542206ad5edb14252b
-
SHA256
1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439
-
SHA512
5669fc67f6012be8b87e2e1acd3857dbda1c0fdd3f123bf1b4ebfc48413fee73c50f1ea5a2b119b2f854007fdf6ccab73640c7518427ee1ec45bf936df3e5e37
-
SSDEEP
12288:FMrfy90XDTeBefzQoQX4M1hTEnHeZR8s34hQzWRwjUv+cG:qyUCYfEoQXDTE+EsohZR+cG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr468844.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr468844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr468844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr468844.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr468844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr468844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr468844.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1804-159-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-161-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-158-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-163-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-165-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-167-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-169-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-171-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-173-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-175-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-177-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-179-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-181-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-183-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-185-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-191-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-189-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-187-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-193-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-195-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-197-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-199-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-201-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-203-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-205-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-207-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-209-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-211-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-213-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-215-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-217-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-219-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline behavioral1/memory/1804-221-0x0000000002790000-0x00000000027CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziGA6350.exejr468844.exeku986365.exelr076853.exepid process 4840 ziGA6350.exe 1652 jr468844.exe 1804 ku986365.exe 4332 lr076853.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr468844.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr468844.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exeziGA6350.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGA6350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGA6350.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 840 1804 WerFault.exe ku986365.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr468844.exeku986365.exelr076853.exepid process 1652 jr468844.exe 1652 jr468844.exe 1804 ku986365.exe 1804 ku986365.exe 4332 lr076853.exe 4332 lr076853.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr468844.exeku986365.exelr076853.exedescription pid process Token: SeDebugPrivilege 1652 jr468844.exe Token: SeDebugPrivilege 1804 ku986365.exe Token: SeDebugPrivilege 4332 lr076853.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exeziGA6350.exedescription pid process target process PID 3068 wrote to memory of 4840 3068 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe ziGA6350.exe PID 3068 wrote to memory of 4840 3068 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe ziGA6350.exe PID 3068 wrote to memory of 4840 3068 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe ziGA6350.exe PID 4840 wrote to memory of 1652 4840 ziGA6350.exe jr468844.exe PID 4840 wrote to memory of 1652 4840 ziGA6350.exe jr468844.exe PID 4840 wrote to memory of 1804 4840 ziGA6350.exe ku986365.exe PID 4840 wrote to memory of 1804 4840 ziGA6350.exe ku986365.exe PID 4840 wrote to memory of 1804 4840 ziGA6350.exe ku986365.exe PID 3068 wrote to memory of 4332 3068 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe lr076853.exe PID 3068 wrote to memory of 4332 3068 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe lr076853.exe PID 3068 wrote to memory of 4332 3068 1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe lr076853.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe"C:\Users\Admin\AppData\Local\Temp\1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGA6350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGA6350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr468844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr468844.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku986365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku986365.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 13524⤵
- Program crash
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076853.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076853.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1804 -ip 18041⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efa370cacd287d7a84a64bd56208475c
SHA14ad8d948901b05d2be16fc6b93a5d1dbddf97612
SHA256d211e6eb8810f4f9b16f2c1ca8f03622394d20128f389ce9b20e58d9bde71ae8
SHA512f854249da4bed654dfe84aa013975a8eb74a0082334213d5a8487f442d1b4cd2185aa3b1d30c1fae250d3d9b96a2283148e977e0e1e77701353706276982c2d6
-
Filesize
175KB
MD5efa370cacd287d7a84a64bd56208475c
SHA14ad8d948901b05d2be16fc6b93a5d1dbddf97612
SHA256d211e6eb8810f4f9b16f2c1ca8f03622394d20128f389ce9b20e58d9bde71ae8
SHA512f854249da4bed654dfe84aa013975a8eb74a0082334213d5a8487f442d1b4cd2185aa3b1d30c1fae250d3d9b96a2283148e977e0e1e77701353706276982c2d6
-
Filesize
380KB
MD589064fde819cc76ad5c423073944e6f9
SHA1e955894bb60157965c67c11e875407d1562458b1
SHA256a8d927f0d32891aeb8c4823950580360f740ba4f6fce4e9a1e3ad61d91ce0267
SHA5126ea23209b42a927f9108bde7c06ee3146c57a888bdc3f10cda21757346a1028c5a7e0a9fac61bf53c79d162883f4f811a0fd6e97fdbb384de9e952040b9a5171
-
Filesize
380KB
MD589064fde819cc76ad5c423073944e6f9
SHA1e955894bb60157965c67c11e875407d1562458b1
SHA256a8d927f0d32891aeb8c4823950580360f740ba4f6fce4e9a1e3ad61d91ce0267
SHA5126ea23209b42a927f9108bde7c06ee3146c57a888bdc3f10cda21757346a1028c5a7e0a9fac61bf53c79d162883f4f811a0fd6e97fdbb384de9e952040b9a5171
-
Filesize
15KB
MD5f81f6b37983d6bfe10d495426bbb284e
SHA11da43285b753b8fc6c774356912f460dd50c66d1
SHA256222f17dd178bfc4e249088016e38b9c9779d291077d144609cd67dc5b93c3693
SHA51271be4d8b99eac30cae8d80c6f6ecddabdf6334c391688119006c5dbca5855f2008df13a52714d71f7e37494166fe771bb5215b4a5e76fc818eff0f552c197032
-
Filesize
15KB
MD5f81f6b37983d6bfe10d495426bbb284e
SHA11da43285b753b8fc6c774356912f460dd50c66d1
SHA256222f17dd178bfc4e249088016e38b9c9779d291077d144609cd67dc5b93c3693
SHA51271be4d8b99eac30cae8d80c6f6ecddabdf6334c391688119006c5dbca5855f2008df13a52714d71f7e37494166fe771bb5215b4a5e76fc818eff0f552c197032
-
Filesize
294KB
MD56d429446a01f910417cd979b1e422d31
SHA178e3f4303a1680e8fe497d2fda64fe15008816cd
SHA2566774f45ca8db4fab0d806ed62252fe4ccd7e909c8f923df75ce1ecd185a97236
SHA51206b5f3939b2b189a3abd806084b02c47c12bd45bb19dbe40a88685eeb739c46931f28a7151f774497f3759dbdf342ac7ddb31eed14fde24eee3ba14f4c9f8a17
-
Filesize
294KB
MD56d429446a01f910417cd979b1e422d31
SHA178e3f4303a1680e8fe497d2fda64fe15008816cd
SHA2566774f45ca8db4fab0d806ed62252fe4ccd7e909c8f923df75ce1ecd185a97236
SHA51206b5f3939b2b189a3abd806084b02c47c12bd45bb19dbe40a88685eeb739c46931f28a7151f774497f3759dbdf342ac7ddb31eed14fde24eee3ba14f4c9f8a17