Analysis
-
max time kernel
98s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:36
Static task
static1
Behavioral task
behavioral1
Sample
a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe
Resource
win10v2004-20230221-en
General
-
Target
a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe
-
Size
522KB
-
MD5
32b975ac67bd8ea9093281bcf4cd0976
-
SHA1
bfcdf6e23f42c748a1e632322a6f14a0a4bcca1f
-
SHA256
a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356
-
SHA512
d2f4a6713f65cea562a888549d1d8ed3f8e2f52cc0d163ac0b8b1550e5e029d9257f52627e0e46133aa0336ce56acbef09c8f11530c93e461882de6c4a0c72d1
-
SSDEEP
12288:1MrJy90NlzGX8XGkGUk8P449+zWdwLfvA2XMoEl:UyQGk7FPR9Hdvccl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr930303.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr930303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr930303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr930303.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr930303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr930303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr930303.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4076-158-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-161-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-159-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-163-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-167-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-169-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-171-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-173-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-175-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-177-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-179-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-181-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-187-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4076-221-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziio0230.exejr930303.exeku621238.exelr777808.exepid process 2640 ziio0230.exe 1648 jr930303.exe 4076 ku621238.exe 5020 lr777808.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr930303.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr930303.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exeziio0230.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziio0230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziio0230.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3816 4076 WerFault.exe ku621238.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr930303.exeku621238.exelr777808.exepid process 1648 jr930303.exe 1648 jr930303.exe 4076 ku621238.exe 4076 ku621238.exe 5020 lr777808.exe 5020 lr777808.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr930303.exeku621238.exelr777808.exedescription pid process Token: SeDebugPrivilege 1648 jr930303.exe Token: SeDebugPrivilege 4076 ku621238.exe Token: SeDebugPrivilege 5020 lr777808.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exeziio0230.exedescription pid process target process PID 4896 wrote to memory of 2640 4896 a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe ziio0230.exe PID 4896 wrote to memory of 2640 4896 a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe ziio0230.exe PID 4896 wrote to memory of 2640 4896 a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe ziio0230.exe PID 2640 wrote to memory of 1648 2640 ziio0230.exe jr930303.exe PID 2640 wrote to memory of 1648 2640 ziio0230.exe jr930303.exe PID 2640 wrote to memory of 4076 2640 ziio0230.exe ku621238.exe PID 2640 wrote to memory of 4076 2640 ziio0230.exe ku621238.exe PID 2640 wrote to memory of 4076 2640 ziio0230.exe ku621238.exe PID 4896 wrote to memory of 5020 4896 a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe lr777808.exe PID 4896 wrote to memory of 5020 4896 a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe lr777808.exe PID 4896 wrote to memory of 5020 4896 a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe lr777808.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe"C:\Users\Admin\AppData\Local\Temp\a45d909888a93495322d0459b9cd376d50449ecebc63422eafde0a2490b76356.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziio0230.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziio0230.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930303.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930303.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku621238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku621238.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr777808.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr777808.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4076 -ip 40761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr777808.exeFilesize
175KB
MD5840fbe9d3933921d9cd5af591f0ff755
SHA1139212c95e49ff5bab3f66d215177042d5ab3bbb
SHA256949fd7f8cc13b77722cf64bff769a2eb09d7b5ef4629e662b094803010d19e8a
SHA512a54f12709eea621beb16369ba29e42b17e5454ba40b2855993a2779fc3ae0a7ca142f1ab0019d31a721a47f69a8012c242be7fbd56caf4d2b835de84e9a77cc9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr777808.exeFilesize
175KB
MD5840fbe9d3933921d9cd5af591f0ff755
SHA1139212c95e49ff5bab3f66d215177042d5ab3bbb
SHA256949fd7f8cc13b77722cf64bff769a2eb09d7b5ef4629e662b094803010d19e8a
SHA512a54f12709eea621beb16369ba29e42b17e5454ba40b2855993a2779fc3ae0a7ca142f1ab0019d31a721a47f69a8012c242be7fbd56caf4d2b835de84e9a77cc9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziio0230.exeFilesize
380KB
MD5aaa8cfb505f1d5a17c5af9adc823365d
SHA18cdef1ded0eb9dd5573c888ff3332b80fdb5433d
SHA256051b3f011823781ff46adf6fbdbf434f08c897259167d7debd306359574a4166
SHA51286a89cd7095d11ae048f7b30b677f2bbeabb5061263da737c2f0b3286f1b35557352eb66f339cf95dd7edef6a81ec54026da92166dbb97ff4c34f44ec3336486
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziio0230.exeFilesize
380KB
MD5aaa8cfb505f1d5a17c5af9adc823365d
SHA18cdef1ded0eb9dd5573c888ff3332b80fdb5433d
SHA256051b3f011823781ff46adf6fbdbf434f08c897259167d7debd306359574a4166
SHA51286a89cd7095d11ae048f7b30b677f2bbeabb5061263da737c2f0b3286f1b35557352eb66f339cf95dd7edef6a81ec54026da92166dbb97ff4c34f44ec3336486
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930303.exeFilesize
15KB
MD5986121ae69b512ea7578f159d9f3466c
SHA1881f944338732acaf876cfede9d921dcfbec85c2
SHA256c0dc576055e3a98d7b1a3dfb8c3a433183b5f55c520f781c0af15b53273955b2
SHA5121979849ae618ec36f0fe1f6ba475cb8273af2405f4d8c5d090ddde3e13a3391ed98d4c6764b5ecf4e5f67df2a8f576bc72eb45e62c699766f0dfa0b8aa4e0bd5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930303.exeFilesize
15KB
MD5986121ae69b512ea7578f159d9f3466c
SHA1881f944338732acaf876cfede9d921dcfbec85c2
SHA256c0dc576055e3a98d7b1a3dfb8c3a433183b5f55c520f781c0af15b53273955b2
SHA5121979849ae618ec36f0fe1f6ba475cb8273af2405f4d8c5d090ddde3e13a3391ed98d4c6764b5ecf4e5f67df2a8f576bc72eb45e62c699766f0dfa0b8aa4e0bd5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku621238.exeFilesize
294KB
MD5c8bc2758a1432d8f955fefd009eceaf7
SHA14d749269db90ff0a8aba004c89329d17d4d44b92
SHA256ce5b3827dcc2451adcf69dcecb38d47f52b2c810a4eb6a36f42c296185fb1411
SHA512f033ac2e02694c4a56ea831067620c7c2f80c1c17755fb1b6ab6568afb75a20fd7a1e45e893b416fc9281f9810af5d7c51d10ee5fc730d3ccd603e3553ee5e48
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku621238.exeFilesize
294KB
MD5c8bc2758a1432d8f955fefd009eceaf7
SHA14d749269db90ff0a8aba004c89329d17d4d44b92
SHA256ce5b3827dcc2451adcf69dcecb38d47f52b2c810a4eb6a36f42c296185fb1411
SHA512f033ac2e02694c4a56ea831067620c7c2f80c1c17755fb1b6ab6568afb75a20fd7a1e45e893b416fc9281f9810af5d7c51d10ee5fc730d3ccd603e3553ee5e48
-
memory/1648-147-0x0000000000BF0000-0x0000000000BFA000-memory.dmpFilesize
40KB
-
memory/4076-153-0x0000000004BB0000-0x0000000005154000-memory.dmpFilesize
5.6MB
-
memory/4076-154-0x0000000002020000-0x000000000206B000-memory.dmpFilesize
300KB
-
memory/4076-155-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-156-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-157-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-158-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-161-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-159-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-163-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-167-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-169-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-171-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-173-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-175-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-177-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-179-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-181-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-187-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-221-0x0000000004AA0000-0x0000000004ADF000-memory.dmpFilesize
252KB
-
memory/4076-1064-0x0000000005160000-0x0000000005778000-memory.dmpFilesize
6.1MB
-
memory/4076-1065-0x0000000005780000-0x000000000588A000-memory.dmpFilesize
1.0MB
-
memory/4076-1066-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/4076-1067-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/4076-1068-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-1070-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-1071-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-1072-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4076-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4076-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4076-1075-0x0000000006360000-0x00000000063D6000-memory.dmpFilesize
472KB
-
memory/4076-1076-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/4076-1077-0x0000000006550000-0x0000000006712000-memory.dmpFilesize
1.8MB
-
memory/4076-1078-0x0000000006730000-0x0000000006C5C000-memory.dmpFilesize
5.2MB
-
memory/4076-1079-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/5020-1085-0x0000000000620000-0x0000000000652000-memory.dmpFilesize
200KB
-
memory/5020-1086-0x00000000051E0000-0x00000000051F0000-memory.dmpFilesize
64KB
-
memory/5020-1088-0x00000000051E0000-0x00000000051F0000-memory.dmpFilesize
64KB