Analysis
-
max time kernel
110s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:30
Static task
static1
Behavioral task
behavioral1
Sample
f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe
Resource
win10v2004-20230220-en
General
-
Target
f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe
-
Size
522KB
-
MD5
89b2536b8e36c1ed6eb49cc5629a14ff
-
SHA1
47ca497446b33ad7469218270a03521bf2fb551f
-
SHA256
f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877
-
SHA512
f4dbfda6b284a075d8484eaa82c91fede8031a6b7c20aa5869d652772c97f1272d2c0cae32cbd5e8c454caa488578b7b2190984e21857be453a1b724b2ef7fc0
-
SSDEEP
12288:LMrNy90B/lxDo8Xg/3GYsec8Yn4GWzWVwFSv732hu1K:WyujDoEg/GDetY4GPVxhw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr337334.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr337334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr337334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr337334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr337334.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr337334.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr337334.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/688-155-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-156-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-158-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-160-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-162-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-166-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-168-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-164-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-170-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-172-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-175-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-213-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-215-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-217-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-221-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/688-1071-0x00000000025E0000-0x00000000025F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziip6154.exejr337334.exeku499885.exelr657561.exepid process 4788 ziip6154.exe 5068 jr337334.exe 688 ku499885.exe 60 lr657561.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr337334.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr337334.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exeziip6154.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziip6154.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziip6154.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4528 688 WerFault.exe ku499885.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr337334.exeku499885.exelr657561.exepid process 5068 jr337334.exe 5068 jr337334.exe 688 ku499885.exe 688 ku499885.exe 60 lr657561.exe 60 lr657561.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr337334.exeku499885.exelr657561.exedescription pid process Token: SeDebugPrivilege 5068 jr337334.exe Token: SeDebugPrivilege 688 ku499885.exe Token: SeDebugPrivilege 60 lr657561.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exeziip6154.exedescription pid process target process PID 4624 wrote to memory of 4788 4624 f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe ziip6154.exe PID 4624 wrote to memory of 4788 4624 f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe ziip6154.exe PID 4624 wrote to memory of 4788 4624 f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe ziip6154.exe PID 4788 wrote to memory of 5068 4788 ziip6154.exe jr337334.exe PID 4788 wrote to memory of 5068 4788 ziip6154.exe jr337334.exe PID 4788 wrote to memory of 688 4788 ziip6154.exe ku499885.exe PID 4788 wrote to memory of 688 4788 ziip6154.exe ku499885.exe PID 4788 wrote to memory of 688 4788 ziip6154.exe ku499885.exe PID 4624 wrote to memory of 60 4624 f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe lr657561.exe PID 4624 wrote to memory of 60 4624 f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe lr657561.exe PID 4624 wrote to memory of 60 4624 f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe lr657561.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe"C:\Users\Admin\AppData\Local\Temp\f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 13444⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 688 -ip 6881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exeFilesize
175KB
MD5b7d2d1a5a0cd2ab1ee11383e3df5438f
SHA13381868fe3e0f2324ae91f38cb2a0185309f1ea4
SHA25661016f59f2e80d28ff0a1bbd57ae644c9f4743014bb0795ceffe7072cd08731b
SHA51217f245f11431c64fdc91be590eb9070705793391a25179f8fbf09b5b7e7fb6c154826fe96ff11de6d4c448ce1fad791147acc28f090edab21cac47bfb5e7f5f3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exeFilesize
175KB
MD5b7d2d1a5a0cd2ab1ee11383e3df5438f
SHA13381868fe3e0f2324ae91f38cb2a0185309f1ea4
SHA25661016f59f2e80d28ff0a1bbd57ae644c9f4743014bb0795ceffe7072cd08731b
SHA51217f245f11431c64fdc91be590eb9070705793391a25179f8fbf09b5b7e7fb6c154826fe96ff11de6d4c448ce1fad791147acc28f090edab21cac47bfb5e7f5f3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exeFilesize
380KB
MD51ab53b2fd3e3ffdb52b1f122459fcce7
SHA1cc673a06870c58ba658ad38c0290e834cab3dea2
SHA2564a6b62a6b8bd6110df705b9eab6effe49f4dbc3d7b63994d71c7cb1f8a35f000
SHA5128e9330c759d811d034e8ae8417c55eb9ace015daf5c1168a34e034f21e260d9bfdb4471fda90fae0f16d9840c336c839170a3b92f57c1b1fdb61d254e8a11871
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exeFilesize
380KB
MD51ab53b2fd3e3ffdb52b1f122459fcce7
SHA1cc673a06870c58ba658ad38c0290e834cab3dea2
SHA2564a6b62a6b8bd6110df705b9eab6effe49f4dbc3d7b63994d71c7cb1f8a35f000
SHA5128e9330c759d811d034e8ae8417c55eb9ace015daf5c1168a34e034f21e260d9bfdb4471fda90fae0f16d9840c336c839170a3b92f57c1b1fdb61d254e8a11871
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exeFilesize
15KB
MD55cde7ecec51a8bd4f66b9927c7476f3f
SHA15439d11b4e3c5041c5478b1e181f66a54dfae3cd
SHA2562c06178a5a00b316fd1b723f93bb6e7de74026168c85017982bf86425188d851
SHA512ab5c28d9267232342450073c748c5fbbce4983b5e0d7a9d53667ef1220d3bfc3e4429d8a9920ea87a9385bfdfff87a63d74594cb450f78529ee58c9bac321d80
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exeFilesize
15KB
MD55cde7ecec51a8bd4f66b9927c7476f3f
SHA15439d11b4e3c5041c5478b1e181f66a54dfae3cd
SHA2562c06178a5a00b316fd1b723f93bb6e7de74026168c85017982bf86425188d851
SHA512ab5c28d9267232342450073c748c5fbbce4983b5e0d7a9d53667ef1220d3bfc3e4429d8a9920ea87a9385bfdfff87a63d74594cb450f78529ee58c9bac321d80
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exeFilesize
294KB
MD5dcb72ecab5f87c11c9cf0df49fc9e876
SHA13c95345470ed6164d5815027f0a0000ef9c542d6
SHA256609d92e898356d91dd015f79b1d5cc1019217a7c0740e5a2abbdba75c1d9c5c7
SHA512b4860e1e76ff89d1fdfc2be829966210076756810b0fa3e693231ce902d1d8737edcab8bee11f60271fcdb3bc092cff414e86c7ebbd1da73a33b706dca5dd681
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exeFilesize
294KB
MD5dcb72ecab5f87c11c9cf0df49fc9e876
SHA13c95345470ed6164d5815027f0a0000ef9c542d6
SHA256609d92e898356d91dd015f79b1d5cc1019217a7c0740e5a2abbdba75c1d9c5c7
SHA512b4860e1e76ff89d1fdfc2be829966210076756810b0fa3e693231ce902d1d8737edcab8bee11f60271fcdb3bc092cff414e86c7ebbd1da73a33b706dca5dd681
-
memory/60-1086-0x0000000000ED0000-0x0000000000F02000-memory.dmpFilesize
200KB
-
memory/60-1087-0x0000000005B10000-0x0000000005B20000-memory.dmpFilesize
64KB
-
memory/688-191-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-201-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-155-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-156-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-158-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-160-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-162-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-166-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-168-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-164-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-170-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-172-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-174-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-176-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-178-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-175-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-179-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-181-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-183-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-185-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-187-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-189-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-153-0x0000000000630000-0x000000000067B000-memory.dmpFilesize
300KB
-
memory/688-193-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-195-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-197-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-199-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-154-0x0000000004C40000-0x00000000051E4000-memory.dmpFilesize
5.6MB
-
memory/688-203-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-205-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-207-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-209-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-211-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-213-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-215-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-217-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-219-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-221-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/688-1064-0x00000000052F0000-0x0000000005908000-memory.dmpFilesize
6.1MB
-
memory/688-1065-0x0000000005910000-0x0000000005A1A000-memory.dmpFilesize
1.0MB
-
memory/688-1066-0x00000000027B0000-0x00000000027C2000-memory.dmpFilesize
72KB
-
memory/688-1067-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-1068-0x0000000005A20000-0x0000000005A5C000-memory.dmpFilesize
240KB
-
memory/688-1070-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-1071-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-1072-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/688-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/688-1075-0x00000000066F0000-0x0000000006766000-memory.dmpFilesize
472KB
-
memory/688-1076-0x0000000006780000-0x00000000067D0000-memory.dmpFilesize
320KB
-
memory/688-1077-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/688-1078-0x0000000006810000-0x00000000069D2000-memory.dmpFilesize
1.8MB
-
memory/688-1079-0x00000000069E0000-0x0000000006F0C000-memory.dmpFilesize
5.2MB
-
memory/5068-147-0x0000000000F60000-0x0000000000F6A000-memory.dmpFilesize
40KB