Analysis
-
max time kernel
82s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe
Resource
win10v2004-20230220-en
General
-
Target
05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe
-
Size
522KB
-
MD5
6040305c5ddfe04441320136302c64a6
-
SHA1
6ced1aa1e0232872b862952f5939f72183699ebf
-
SHA256
05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b
-
SHA512
1831c3b3726dcac4ade9333d05582450c01a5cc11853c1ef8ae264016d347ba41df800e31f01a5e0d77282e2a42f34e77b822af64d99aa56d3b73c9557ed307d
-
SSDEEP
12288:MMrZy900Dv/BtfOiQDaB6RKrw+DhCTJi+cEftJeqAe1ZH:NyDDBBQDi6ANDYTA+oqZ1ZH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr320123.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr320123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr320123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr320123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr320123.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr320123.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr320123.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4188-157-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-160-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-162-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-158-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-164-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-166-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-170-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-172-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-168-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-174-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-176-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-178-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-180-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-182-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-184-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-186-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-188-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-190-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-192-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-194-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-196-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-198-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-200-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-202-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-204-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-206-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-208-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-210-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-214-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-212-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-216-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-218-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4188-220-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziUP1658.exejr320123.exeku878241.exelr610566.exepid process 444 ziUP1658.exe 3704 jr320123.exe 4188 ku878241.exe 4312 lr610566.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr320123.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr320123.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziUP1658.exe05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUP1658.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziUP1658.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 220 4188 WerFault.exe ku878241.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr320123.exeku878241.exelr610566.exepid process 3704 jr320123.exe 3704 jr320123.exe 4188 ku878241.exe 4188 ku878241.exe 4312 lr610566.exe 4312 lr610566.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr320123.exeku878241.exelr610566.exedescription pid process Token: SeDebugPrivilege 3704 jr320123.exe Token: SeDebugPrivilege 4188 ku878241.exe Token: SeDebugPrivilege 4312 lr610566.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exeziUP1658.exedescription pid process target process PID 3576 wrote to memory of 444 3576 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe ziUP1658.exe PID 3576 wrote to memory of 444 3576 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe ziUP1658.exe PID 3576 wrote to memory of 444 3576 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe ziUP1658.exe PID 444 wrote to memory of 3704 444 ziUP1658.exe jr320123.exe PID 444 wrote to memory of 3704 444 ziUP1658.exe jr320123.exe PID 444 wrote to memory of 4188 444 ziUP1658.exe ku878241.exe PID 444 wrote to memory of 4188 444 ziUP1658.exe ku878241.exe PID 444 wrote to memory of 4188 444 ziUP1658.exe ku878241.exe PID 3576 wrote to memory of 4312 3576 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe lr610566.exe PID 3576 wrote to memory of 4312 3576 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe lr610566.exe PID 3576 wrote to memory of 4312 3576 05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe lr610566.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe"C:\Users\Admin\AppData\Local\Temp\05df1faf336655e779369cacf873efd6b23032e166c55d1be6e090ca4828ea9b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUP1658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUP1658.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr320123.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr320123.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku878241.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku878241.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 17204⤵
- Program crash
PID:220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr610566.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr610566.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4188 -ip 41881⤵PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD576f8007a4afa6ec0f7fcf436f28f2c9b
SHA1306284bbf16c85e9e818cb51dd8b2cd07ea721bb
SHA256c44f5ac0be9820b632a9073a0c8e9bc59fb57c8992d6c3369f398792b4bef9cb
SHA512537de4ddeba23cb3ec9cbd65780ffcbddfc94ec1eeab06cf56974b7f88b30df5b1aa3bdcd2f6f2640f6573942c2eae4c609a8bfd543649351d4a8b3588ccf32d
-
Filesize
175KB
MD576f8007a4afa6ec0f7fcf436f28f2c9b
SHA1306284bbf16c85e9e818cb51dd8b2cd07ea721bb
SHA256c44f5ac0be9820b632a9073a0c8e9bc59fb57c8992d6c3369f398792b4bef9cb
SHA512537de4ddeba23cb3ec9cbd65780ffcbddfc94ec1eeab06cf56974b7f88b30df5b1aa3bdcd2f6f2640f6573942c2eae4c609a8bfd543649351d4a8b3588ccf32d
-
Filesize
380KB
MD5c39c936ebbf1d86042f377f99ec0bdfa
SHA13e7963fb99e67ffd5e160ce98c8f4f2f3eb35a47
SHA256dcc2b6c03cf85d0c0c4d45294c5e06ed73d2a57e13ff13ff3a41993383f0c8fe
SHA51263abf7a603aa8835579c9c5f5b1f5741528fc6e78606ca300ee96ef339472f5161be9763f824fd3ebbbad7968225ead10e67dfe92dcacd69959b72c95614e10c
-
Filesize
380KB
MD5c39c936ebbf1d86042f377f99ec0bdfa
SHA13e7963fb99e67ffd5e160ce98c8f4f2f3eb35a47
SHA256dcc2b6c03cf85d0c0c4d45294c5e06ed73d2a57e13ff13ff3a41993383f0c8fe
SHA51263abf7a603aa8835579c9c5f5b1f5741528fc6e78606ca300ee96ef339472f5161be9763f824fd3ebbbad7968225ead10e67dfe92dcacd69959b72c95614e10c
-
Filesize
15KB
MD504250f3fc0141fa99b1d86e63d15d66b
SHA1f34e9e86da0963ce0f510e7c99aa13ebe89869f5
SHA256f0cebec03ce6a223a3bce76f57fe008301d456adf7c0fe615ab29a9e23fe16c7
SHA5127d88d6db78988251e2870fdfd513b71d451bc3717bbf8a0f364d949773def0f60704f27c74fca32900c571e14e94d10a0ce7cc2d54d070c31c1de30a8b94fb76
-
Filesize
15KB
MD504250f3fc0141fa99b1d86e63d15d66b
SHA1f34e9e86da0963ce0f510e7c99aa13ebe89869f5
SHA256f0cebec03ce6a223a3bce76f57fe008301d456adf7c0fe615ab29a9e23fe16c7
SHA5127d88d6db78988251e2870fdfd513b71d451bc3717bbf8a0f364d949773def0f60704f27c74fca32900c571e14e94d10a0ce7cc2d54d070c31c1de30a8b94fb76
-
Filesize
295KB
MD51d152fa863285fe2e032f974578387f1
SHA1f69d645bfc716a1c5f1b97b6479e24782e94e9b5
SHA2567d2d3cda028861492a584bc9691468e953aec8323ddb924b382f4fb28055311c
SHA51243b03d806a6addf1b48a8c2c0afa299df99d113373268b292c13576c6784b6225de3a8f567af15528b863f003170455141f3f12e07316807a4127f53cdc7fbb3
-
Filesize
295KB
MD51d152fa863285fe2e032f974578387f1
SHA1f69d645bfc716a1c5f1b97b6479e24782e94e9b5
SHA2567d2d3cda028861492a584bc9691468e953aec8323ddb924b382f4fb28055311c
SHA51243b03d806a6addf1b48a8c2c0afa299df99d113373268b292c13576c6784b6225de3a8f567af15528b863f003170455141f3f12e07316807a4127f53cdc7fbb3