Analysis
-
max time kernel
86s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:46
Static task
static1
Behavioral task
behavioral1
Sample
e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe
Resource
win10v2004-20230220-en
General
-
Target
e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe
-
Size
522KB
-
MD5
660a8edde32ba57cdf890c90b49138f1
-
SHA1
91225f2c163d62cb9974cafd10eeaa72b029fee8
-
SHA256
e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169
-
SHA512
6b223dc4c9f9aaa5bd7bd2470bb31e9668674b64b232249a045303cea561259c25b2e4c31bc89c33f9353bfe832eac8b5a21f72a0b25e069fefafcadc1b47691
-
SSDEEP
12288:cMrjy901HRgBRI8Q4xHvCqrwtZhCfJRdmO:fycNJYjyZYfjdf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr385108.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr385108.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr385108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr385108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr385108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr385108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr385108.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/5052-157-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-158-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-160-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-162-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-164-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-166-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-168-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-170-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-172-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-174-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline behavioral1/memory/5052-175-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-177-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-179-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-181-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-183-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-185-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-187-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-189-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-193-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-197-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-213-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-215-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-219-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5052-221-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziKA6274.exejr385108.exeku543399.exelr994363.exepid process 1860 ziKA6274.exe 4264 jr385108.exe 5052 ku543399.exe 3068 lr994363.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr385108.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr385108.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exeziKA6274.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziKA6274.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKA6274.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2280 5052 WerFault.exe ku543399.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr385108.exeku543399.exelr994363.exepid process 4264 jr385108.exe 4264 jr385108.exe 5052 ku543399.exe 5052 ku543399.exe 3068 lr994363.exe 3068 lr994363.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr385108.exeku543399.exelr994363.exedescription pid process Token: SeDebugPrivilege 4264 jr385108.exe Token: SeDebugPrivilege 5052 ku543399.exe Token: SeDebugPrivilege 3068 lr994363.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exeziKA6274.exedescription pid process target process PID 1844 wrote to memory of 1860 1844 e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe ziKA6274.exe PID 1844 wrote to memory of 1860 1844 e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe ziKA6274.exe PID 1844 wrote to memory of 1860 1844 e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe ziKA6274.exe PID 1860 wrote to memory of 4264 1860 ziKA6274.exe jr385108.exe PID 1860 wrote to memory of 4264 1860 ziKA6274.exe jr385108.exe PID 1860 wrote to memory of 5052 1860 ziKA6274.exe ku543399.exe PID 1860 wrote to memory of 5052 1860 ziKA6274.exe ku543399.exe PID 1860 wrote to memory of 5052 1860 ziKA6274.exe ku543399.exe PID 1844 wrote to memory of 3068 1844 e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe lr994363.exe PID 1844 wrote to memory of 3068 1844 e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe lr994363.exe PID 1844 wrote to memory of 3068 1844 e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe lr994363.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe"C:\Users\Admin\AppData\Local\Temp\e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 13524⤵
- Program crash
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5052 -ip 50521⤵PID:4332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exeFilesize
175KB
MD5e296c470a14209b5ed35f67780c9a586
SHA1d7d51ad92212804096ff31781c8a28d969258e28
SHA256e471d6a736b6356705b5273b8db720402bf65fdf32ec5ddc08479d9969da0e62
SHA512376597f830b79326634fbc17fe8d8ef2fb9afddea0f9407d749c1568a851fd9b38c516e2abd212469b2c08f52ed870fe4be079d4ee212e86bb6512f3356effe7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exeFilesize
175KB
MD5e296c470a14209b5ed35f67780c9a586
SHA1d7d51ad92212804096ff31781c8a28d969258e28
SHA256e471d6a736b6356705b5273b8db720402bf65fdf32ec5ddc08479d9969da0e62
SHA512376597f830b79326634fbc17fe8d8ef2fb9afddea0f9407d749c1568a851fd9b38c516e2abd212469b2c08f52ed870fe4be079d4ee212e86bb6512f3356effe7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exeFilesize
380KB
MD5a74e0781fc624e369c8f3beb692d000e
SHA18fb02e653677504cfae064efa72a9e22b5245794
SHA256179fc6f4eb6f57a79b97b055357978e72b781cb804fe0e8432656e36638457ed
SHA512496ffc85636ddba8127c1abac1814e688df44c01b4e7a6533b15783e64dd1d8fd94e2a64fa1a49488b2fec16782754f4f856ad2c8890affffb4111e8594bf0c2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exeFilesize
380KB
MD5a74e0781fc624e369c8f3beb692d000e
SHA18fb02e653677504cfae064efa72a9e22b5245794
SHA256179fc6f4eb6f57a79b97b055357978e72b781cb804fe0e8432656e36638457ed
SHA512496ffc85636ddba8127c1abac1814e688df44c01b4e7a6533b15783e64dd1d8fd94e2a64fa1a49488b2fec16782754f4f856ad2c8890affffb4111e8594bf0c2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exeFilesize
15KB
MD569c6fa74977064114381d99b789c7ebc
SHA1ea0f80eed6aaa7ea26ec2abf757e84ebe60f94f3
SHA2561a3e19c7aad3ae6df7e9790e275a2cd561ca0a9397ae7a3e52b34737ce577c66
SHA512d22b19984e7918a4eb593f2b8efb4f9e52d1dbf7fb7518f4bb13c93d1bf4123a4a51418650b2fac7a2d24b49f15299d7c38335f33911863542eeb3b9d964ff87
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exeFilesize
15KB
MD569c6fa74977064114381d99b789c7ebc
SHA1ea0f80eed6aaa7ea26ec2abf757e84ebe60f94f3
SHA2561a3e19c7aad3ae6df7e9790e275a2cd561ca0a9397ae7a3e52b34737ce577c66
SHA512d22b19984e7918a4eb593f2b8efb4f9e52d1dbf7fb7518f4bb13c93d1bf4123a4a51418650b2fac7a2d24b49f15299d7c38335f33911863542eeb3b9d964ff87
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exeFilesize
295KB
MD5831255e8a7463fe13b50281e94153e94
SHA196b21766b555f1ec1d2091f2b562134973f3348d
SHA256d123d9f0974588e9e8dfb2a29b041471efa4d2bf5aaa6bec65c1d9f5e58dc159
SHA512e02364666b8e89cc169fe658551ed5f371d8d8e70a33106c5847edf1c7d935e74b208cef4c9b3faf733a885148ccf72d3e1a6697f4b6693c8cab4dda8c9e655c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exeFilesize
295KB
MD5831255e8a7463fe13b50281e94153e94
SHA196b21766b555f1ec1d2091f2b562134973f3348d
SHA256d123d9f0974588e9e8dfb2a29b041471efa4d2bf5aaa6bec65c1d9f5e58dc159
SHA512e02364666b8e89cc169fe658551ed5f371d8d8e70a33106c5847edf1c7d935e74b208cef4c9b3faf733a885148ccf72d3e1a6697f4b6693c8cab4dda8c9e655c
-
memory/3068-1086-0x00000000005F0000-0x0000000000622000-memory.dmpFilesize
200KB
-
memory/3068-1087-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/4264-147-0x00000000003D0000-0x00000000003DA000-memory.dmpFilesize
40KB
-
memory/5052-189-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-201-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-155-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-156-0x0000000004B70000-0x0000000005114000-memory.dmpFilesize
5.6MB
-
memory/5052-157-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-158-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-160-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-162-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-164-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-166-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-168-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-170-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-172-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-174-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-175-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-177-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-179-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-181-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-183-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-185-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-187-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-153-0x0000000002150000-0x000000000219B000-memory.dmpFilesize
300KB
-
memory/5052-191-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-193-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-195-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-197-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-199-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-154-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-203-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-205-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-207-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-209-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-211-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-213-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-215-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-217-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-219-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-221-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/5052-1064-0x0000000005220000-0x0000000005838000-memory.dmpFilesize
6.1MB
-
memory/5052-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/5052-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/5052-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/5052-1068-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-1070-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-1071-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-1072-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/5052-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/5052-1075-0x00000000066F0000-0x00000000068B2000-memory.dmpFilesize
1.8MB
-
memory/5052-1076-0x00000000068D0000-0x0000000006DFC000-memory.dmpFilesize
5.2MB
-
memory/5052-1077-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/5052-1078-0x0000000007080000-0x00000000070F6000-memory.dmpFilesize
472KB
-
memory/5052-1079-0x0000000007110000-0x0000000007160000-memory.dmpFilesize
320KB