Analysis
-
max time kernel
86s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:52
Static task
static1
Behavioral task
behavioral1
Sample
435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe
Resource
win10v2004-20230221-en
General
-
Target
435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe
-
Size
522KB
-
MD5
8514165b8e563b66a85c402577ecda2a
-
SHA1
d175428295519889d2002103a5b6f4864151a173
-
SHA256
435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d
-
SHA512
1aefcef57283514845062f9adac0d8cfc57e4af1f0852dde651e87b182db388d79a4bf654a213441d1ae88818ae735a34bb539e1bc2ccfb45c9c98236d58cbeb
-
SSDEEP
12288:eMr7y90I8EFbnH+NA/KA3sRrwMShCcJsFhfWijPfiCa3:1yT8+eNdR7SYcqTPaP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr247490.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr247490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr247490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr247490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr247490.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr247490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr247490.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/228-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-159-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-161-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-163-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-165-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-167-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-169-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-171-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-175-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-177-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-179-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-183-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/228-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziEf5759.exejr247490.exeku271553.exelr937772.exepid process 3516 ziEf5759.exe 3164 jr247490.exe 228 ku271553.exe 2400 lr937772.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr247490.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr247490.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exeziEf5759.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEf5759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEf5759.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 388 228 WerFault.exe ku271553.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr247490.exeku271553.exelr937772.exepid process 3164 jr247490.exe 3164 jr247490.exe 228 ku271553.exe 228 ku271553.exe 2400 lr937772.exe 2400 lr937772.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr247490.exeku271553.exelr937772.exedescription pid process Token: SeDebugPrivilege 3164 jr247490.exe Token: SeDebugPrivilege 228 ku271553.exe Token: SeDebugPrivilege 2400 lr937772.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exeziEf5759.exedescription pid process target process PID 4780 wrote to memory of 3516 4780 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe ziEf5759.exe PID 4780 wrote to memory of 3516 4780 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe ziEf5759.exe PID 4780 wrote to memory of 3516 4780 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe ziEf5759.exe PID 3516 wrote to memory of 3164 3516 ziEf5759.exe jr247490.exe PID 3516 wrote to memory of 3164 3516 ziEf5759.exe jr247490.exe PID 3516 wrote to memory of 228 3516 ziEf5759.exe ku271553.exe PID 3516 wrote to memory of 228 3516 ziEf5759.exe ku271553.exe PID 3516 wrote to memory of 228 3516 ziEf5759.exe ku271553.exe PID 4780 wrote to memory of 2400 4780 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe lr937772.exe PID 4780 wrote to memory of 2400 4780 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe lr937772.exe PID 4780 wrote to memory of 2400 4780 435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe lr937772.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe"C:\Users\Admin\AppData\Local\Temp\435edbe209f563720d823fc10923a9ff1c54fc79b1bda8b734dab8b9f420414d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf5759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf5759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247490.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku271553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku271553.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937772.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 228 -ip 2281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937772.exeFilesize
175KB
MD57b5be8375b90069d32475f463b92cc8e
SHA146cf3ace67ae4bbadab7dc0db11668a2e3463291
SHA25643a46007ac7ca11defff8501c3423fe3926ee68aeef67df4f2991271fa30b255
SHA51228e2696e0872718368e83eb697ff6290ca8d5ad3e99be344a6b09181b3bdbf3e25b857ca14440ba2b0c16003178d53c566bed5497c34e4aed2520a39473d5710
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937772.exeFilesize
175KB
MD57b5be8375b90069d32475f463b92cc8e
SHA146cf3ace67ae4bbadab7dc0db11668a2e3463291
SHA25643a46007ac7ca11defff8501c3423fe3926ee68aeef67df4f2991271fa30b255
SHA51228e2696e0872718368e83eb697ff6290ca8d5ad3e99be344a6b09181b3bdbf3e25b857ca14440ba2b0c16003178d53c566bed5497c34e4aed2520a39473d5710
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf5759.exeFilesize
380KB
MD5dda7f20210747c9828e47ba2153e246b
SHA158c38fea02b562885d04469a26f95e715aa6156d
SHA256b1969fa9a695461f6cd4f11075e8d9b62f8c3ad6a55652cd39baec405ecf6990
SHA512f5ac36bbae232df0c50668a8c079823e976ff8f110cdde1e994ce81a727c9e273e28b6b2a02007d250a8a9f090756e77aef57e798aeed642fdb91d95b3d086b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf5759.exeFilesize
380KB
MD5dda7f20210747c9828e47ba2153e246b
SHA158c38fea02b562885d04469a26f95e715aa6156d
SHA256b1969fa9a695461f6cd4f11075e8d9b62f8c3ad6a55652cd39baec405ecf6990
SHA512f5ac36bbae232df0c50668a8c079823e976ff8f110cdde1e994ce81a727c9e273e28b6b2a02007d250a8a9f090756e77aef57e798aeed642fdb91d95b3d086b5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247490.exeFilesize
15KB
MD56e66e6f626242e723a54ff58951ef265
SHA16c9033bbde13cdf02998cfee242c7dd5ca29261e
SHA25680205a6dd31edab4a35829f7125d58ad960995a899a24f21e3a9b8f41f1ccfca
SHA512708d60b53d263c3ca3b412f60d1f3e72f19c3243cacb98aa0f06b94da338a847e69c212e3500518892179f4a23d04c60e031f73a66a289e5274c9e44f83e050e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247490.exeFilesize
15KB
MD56e66e6f626242e723a54ff58951ef265
SHA16c9033bbde13cdf02998cfee242c7dd5ca29261e
SHA25680205a6dd31edab4a35829f7125d58ad960995a899a24f21e3a9b8f41f1ccfca
SHA512708d60b53d263c3ca3b412f60d1f3e72f19c3243cacb98aa0f06b94da338a847e69c212e3500518892179f4a23d04c60e031f73a66a289e5274c9e44f83e050e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku271553.exeFilesize
295KB
MD504203303e53f31b380c793d7efb84c0b
SHA194c99d2c78b3bf786ba7e5c032d709d44d7dbd4e
SHA25655db3169f05771313850f4432742d266e891e2ef7c45b54e1054d6e73cba1900
SHA5121f2ce66136385bb3f032f713ac04b97589f31e477a23ed39b02b067de836dc2d45cdb632cf6aff6bce7b485496376a9017dd10e58ed1ce14041799b7659560ae
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku271553.exeFilesize
295KB
MD504203303e53f31b380c793d7efb84c0b
SHA194c99d2c78b3bf786ba7e5c032d709d44d7dbd4e
SHA25655db3169f05771313850f4432742d266e891e2ef7c45b54e1054d6e73cba1900
SHA5121f2ce66136385bb3f032f713ac04b97589f31e477a23ed39b02b067de836dc2d45cdb632cf6aff6bce7b485496376a9017dd10e58ed1ce14041799b7659560ae
-
memory/228-153-0x0000000000740000-0x000000000078B000-memory.dmpFilesize
300KB
-
memory/228-154-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-156-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-157-0x0000000004B40000-0x00000000050E4000-memory.dmpFilesize
5.6MB
-
memory/228-155-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-158-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-159-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-161-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-163-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-165-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-167-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-169-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-171-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-173-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-175-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-177-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-179-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-181-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-183-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-185-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-187-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-189-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-191-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-193-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-195-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-197-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-199-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-201-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-203-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-205-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-207-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-209-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-211-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-213-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-215-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-217-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-219-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-221-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/228-1064-0x00000000050F0000-0x0000000005708000-memory.dmpFilesize
6.1MB
-
memory/228-1065-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/228-1066-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/228-1067-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/228-1068-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-1070-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-1071-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-1072-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/228-1073-0x0000000006360000-0x00000000063F2000-memory.dmpFilesize
584KB
-
memory/228-1074-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/228-1075-0x0000000006450000-0x00000000064C6000-memory.dmpFilesize
472KB
-
memory/228-1076-0x00000000064E0000-0x0000000006530000-memory.dmpFilesize
320KB
-
memory/228-1078-0x0000000006560000-0x0000000006722000-memory.dmpFilesize
1.8MB
-
memory/228-1079-0x0000000006730000-0x0000000006C5C000-memory.dmpFilesize
5.2MB
-
memory/2400-1087-0x0000000000630000-0x0000000000662000-memory.dmpFilesize
200KB
-
memory/2400-1088-0x0000000002A50000-0x0000000002A60000-memory.dmpFilesize
64KB
-
memory/2400-1089-0x0000000002A50000-0x0000000002A60000-memory.dmpFilesize
64KB
-
memory/3164-147-0x00000000000A0000-0x00000000000AA000-memory.dmpFilesize
40KB