Analysis
-
max time kernel
67s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:53
Static task
static1
Behavioral task
behavioral1
Sample
73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe
Resource
win10v2004-20230220-en
General
-
Target
73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe
-
Size
522KB
-
MD5
479ab4b494d5e25287a27c7057345bbc
-
SHA1
cf4fa049e89a4bf9038d1418de2a31296cb731e9
-
SHA256
73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164
-
SHA512
dd3edec41d58c237590cccce74fb928c66e1aa0f2ce5e32f4e3a361edc4bf621ebb883f8698814ce58e4b5ca7be0435e41904cea65d3fe8fbe185f0b992a36f7
-
SSDEEP
12288:9Mr5y90BKKL2OmyHvGrwvchCSJXubXvphW31oa:4y83myPGkcYS6C31oa
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr757094.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr757094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr757094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr757094.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr757094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr757094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr757094.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-158-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-159-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-161-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-163-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-165-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-167-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-169-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-171-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-173-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-175-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-177-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-179-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-181-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-183-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-185-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-187-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-189-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-191-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-193-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-195-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-197-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-199-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-201-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-203-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-205-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-207-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-209-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-211-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-213-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-217-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-215-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-219-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2820-221-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zieL6555.exejr757094.exeku780106.exelr823359.exepid process 4940 zieL6555.exe 4512 jr757094.exe 2820 ku780106.exe 1232 lr823359.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr757094.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr757094.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exezieL6555.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieL6555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieL6555.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2540 2820 WerFault.exe ku780106.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr757094.exeku780106.exelr823359.exepid process 4512 jr757094.exe 4512 jr757094.exe 2820 ku780106.exe 2820 ku780106.exe 1232 lr823359.exe 1232 lr823359.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr757094.exeku780106.exelr823359.exedescription pid process Token: SeDebugPrivilege 4512 jr757094.exe Token: SeDebugPrivilege 2820 ku780106.exe Token: SeDebugPrivilege 1232 lr823359.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exezieL6555.exedescription pid process target process PID 3248 wrote to memory of 4940 3248 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe zieL6555.exe PID 3248 wrote to memory of 4940 3248 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe zieL6555.exe PID 3248 wrote to memory of 4940 3248 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe zieL6555.exe PID 4940 wrote to memory of 4512 4940 zieL6555.exe jr757094.exe PID 4940 wrote to memory of 4512 4940 zieL6555.exe jr757094.exe PID 4940 wrote to memory of 2820 4940 zieL6555.exe ku780106.exe PID 4940 wrote to memory of 2820 4940 zieL6555.exe ku780106.exe PID 4940 wrote to memory of 2820 4940 zieL6555.exe ku780106.exe PID 3248 wrote to memory of 1232 3248 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe lr823359.exe PID 3248 wrote to memory of 1232 3248 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe lr823359.exe PID 3248 wrote to memory of 1232 3248 73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe lr823359.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe"C:\Users\Admin\AppData\Local\Temp\73f152b1821d2f46138c20c2989c58a00d7ddee1a1774801a1e12f85f384f164.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieL6555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieL6555.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr757094.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr757094.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku780106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku780106.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 13284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr823359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr823359.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2820 -ip 28201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr823359.exeFilesize
175KB
MD58a3678832328593dcc018431748a6e73
SHA19a3d015eb5e43662e05ce65fd27c30e3df700c22
SHA256789c76f73267991b62eec85538b144d2e3452ad694408f8c19b924651ed8ddd3
SHA51250c6aaf3d20044a9e8d1b82024ca8bf998685bced0bf33a9da51a00bb44788b41be541c1816005e75efe37b7fbc87605d8ae924e4d33a472e648ed883515d312
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr823359.exeFilesize
175KB
MD58a3678832328593dcc018431748a6e73
SHA19a3d015eb5e43662e05ce65fd27c30e3df700c22
SHA256789c76f73267991b62eec85538b144d2e3452ad694408f8c19b924651ed8ddd3
SHA51250c6aaf3d20044a9e8d1b82024ca8bf998685bced0bf33a9da51a00bb44788b41be541c1816005e75efe37b7fbc87605d8ae924e4d33a472e648ed883515d312
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieL6555.exeFilesize
380KB
MD5051b6e8b9079733518553b2e3764a722
SHA1e5a859990c75df9ff17a4aaeefe4986edb04c0fc
SHA25640092a8b86d6ed47878c0b6f9d8e99acb5f4b8e34efad7a68ac854389f467dfd
SHA512776884f6d8ca04408ecf55d7aae76be3922cee622d57f516ce5b642d591b80ad5c4261e718c7cd910c4b2a03530680002ad80d86c2c87d8582e995e3a61d49a6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieL6555.exeFilesize
380KB
MD5051b6e8b9079733518553b2e3764a722
SHA1e5a859990c75df9ff17a4aaeefe4986edb04c0fc
SHA25640092a8b86d6ed47878c0b6f9d8e99acb5f4b8e34efad7a68ac854389f467dfd
SHA512776884f6d8ca04408ecf55d7aae76be3922cee622d57f516ce5b642d591b80ad5c4261e718c7cd910c4b2a03530680002ad80d86c2c87d8582e995e3a61d49a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr757094.exeFilesize
15KB
MD530cc3a815de31093c38d55345c424a50
SHA163b676e5fd719b07d7efb24f30029b457fc0ab80
SHA25691a062b60f2024d036f39901a8413b9024bfcd8cc5b302430d08ce8f5e620055
SHA5124642fd84e851175ae59e443024f3a618445d8bb3b546d8cd8066d48f220875748396b5f57c296411c19a8091b0a6de0659f106512ec1f396b4331f3c615edffb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr757094.exeFilesize
15KB
MD530cc3a815de31093c38d55345c424a50
SHA163b676e5fd719b07d7efb24f30029b457fc0ab80
SHA25691a062b60f2024d036f39901a8413b9024bfcd8cc5b302430d08ce8f5e620055
SHA5124642fd84e851175ae59e443024f3a618445d8bb3b546d8cd8066d48f220875748396b5f57c296411c19a8091b0a6de0659f106512ec1f396b4331f3c615edffb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku780106.exeFilesize
295KB
MD50a246e31bf40d6407d1094d438eba82c
SHA140897e1c94a614bfb70b4e5bb5cfb4a87d499cd8
SHA25657c03417c082edc993d69f31eb7800110b4f92c4c774cb8f74687884c30e7472
SHA5129b594516c5af14fadc43a260ad4ca1ea64e727b557f3144eef044993d9ec6010c0919d86ef56d38fcf1717223b0ec742abe482a02c2b91414a3e88f8edab106b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku780106.exeFilesize
295KB
MD50a246e31bf40d6407d1094d438eba82c
SHA140897e1c94a614bfb70b4e5bb5cfb4a87d499cd8
SHA25657c03417c082edc993d69f31eb7800110b4f92c4c774cb8f74687884c30e7472
SHA5129b594516c5af14fadc43a260ad4ca1ea64e727b557f3144eef044993d9ec6010c0919d86ef56d38fcf1717223b0ec742abe482a02c2b91414a3e88f8edab106b
-
memory/1232-1087-0x00000000003A0000-0x00000000003D2000-memory.dmpFilesize
200KB
-
memory/1232-1088-0x0000000004F80000-0x0000000004F90000-memory.dmpFilesize
64KB
-
memory/2820-191-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-201-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-155-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-156-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-157-0x0000000004CB0000-0x0000000005254000-memory.dmpFilesize
5.6MB
-
memory/2820-158-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-159-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-161-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-163-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-165-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-167-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-169-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-171-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-173-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-175-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-177-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-179-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-181-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-183-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-185-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-187-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-189-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-153-0x0000000000690000-0x00000000006DB000-memory.dmpFilesize
300KB
-
memory/2820-193-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-195-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-197-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-199-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-154-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-203-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-205-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-207-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-209-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-211-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-213-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-217-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-215-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-219-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-221-0x00000000027A0000-0x00000000027DF000-memory.dmpFilesize
252KB
-
memory/2820-1065-0x0000000005260000-0x0000000005878000-memory.dmpFilesize
6.1MB
-
memory/2820-1066-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2820-1067-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2820-1068-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-1069-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/2820-1070-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-1071-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-1072-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-1073-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/2820-1074-0x00000000063C0000-0x0000000006452000-memory.dmpFilesize
584KB
-
memory/2820-1076-0x00000000065C0000-0x0000000006782000-memory.dmpFilesize
1.8MB
-
memory/2820-1077-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/2820-1078-0x0000000002500000-0x0000000002510000-memory.dmpFilesize
64KB
-
memory/2820-1079-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/2820-1080-0x0000000006FC0000-0x0000000007010000-memory.dmpFilesize
320KB
-
memory/4512-147-0x00000000005E0000-0x00000000005EA000-memory.dmpFilesize
40KB