Analysis
-
max time kernel
62s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe
Resource
win10v2004-20230220-en
General
-
Target
1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe
-
Size
522KB
-
MD5
44d05720c02bb3ae516216949045ce75
-
SHA1
54ee590cdc2b26baae8b95fded5bdd89368f04f6
-
SHA256
1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0
-
SHA512
3f64ac7ec7931fc70494a99273efee729abbdd4df4cddd286ba957158809b6c5dddd755d7fb614bde69594dae7fa0ce008cfa276869fad177fdda31f0d84431a
-
SSDEEP
12288:hMrHy90uH8Y9CkfdTsRl3EbBkhCfJ6zqPfjWpUi:CyOXl36BkYf0mn6Wi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr680257.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr680257.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr680257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr680257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr680257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr680257.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr680257.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4588-155-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-156-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-158-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-160-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-162-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-164-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-166-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-168-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-170-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-172-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-174-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-176-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-178-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-180-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-182-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-184-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-186-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-189-0x0000000004B20000-0x0000000004B30000-memory.dmp family_redline behavioral1/memory/4588-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-190-0x0000000004B20000-0x0000000004B30000-memory.dmp family_redline behavioral1/memory/4588-193-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-195-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-197-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/4588-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziDy0947.exejr680257.exeku685660.exelr703178.exepid process 2056 ziDy0947.exe 376 jr680257.exe 4588 ku685660.exe 4516 lr703178.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr680257.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr680257.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziDy0947.exe1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDy0947.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDy0947.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4080 4588 WerFault.exe ku685660.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr680257.exeku685660.exelr703178.exepid process 376 jr680257.exe 376 jr680257.exe 4588 ku685660.exe 4588 ku685660.exe 4516 lr703178.exe 4516 lr703178.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr680257.exeku685660.exelr703178.exedescription pid process Token: SeDebugPrivilege 376 jr680257.exe Token: SeDebugPrivilege 4588 ku685660.exe Token: SeDebugPrivilege 4516 lr703178.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exeziDy0947.exedescription pid process target process PID 2112 wrote to memory of 2056 2112 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe ziDy0947.exe PID 2112 wrote to memory of 2056 2112 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe ziDy0947.exe PID 2112 wrote to memory of 2056 2112 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe ziDy0947.exe PID 2056 wrote to memory of 376 2056 ziDy0947.exe jr680257.exe PID 2056 wrote to memory of 376 2056 ziDy0947.exe jr680257.exe PID 2056 wrote to memory of 4588 2056 ziDy0947.exe ku685660.exe PID 2056 wrote to memory of 4588 2056 ziDy0947.exe ku685660.exe PID 2056 wrote to memory of 4588 2056 ziDy0947.exe ku685660.exe PID 2112 wrote to memory of 4516 2112 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe lr703178.exe PID 2112 wrote to memory of 4516 2112 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe lr703178.exe PID 2112 wrote to memory of 4516 2112 1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe lr703178.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe"C:\Users\Admin\AppData\Local\Temp\1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 19324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4588 -ip 45881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exeFilesize
175KB
MD5babb05b637d137d54e8203a199a28893
SHA16d86f5996ceb3e4e0ebbb893e14f9d7b6fea136a
SHA2561011cc09d55617f0dc8762054962a717377e6b670d8f0919843a36abf8c9fbba
SHA51279be41dbd0f413ed8a0ebd9b21e2b8db785bf1f0144e688969aef4d2a03ec48cf2605c1ca05c0bf6320f1729c86731f985dabaeb756cf08c1be49bb7ca51ca4f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exeFilesize
175KB
MD5babb05b637d137d54e8203a199a28893
SHA16d86f5996ceb3e4e0ebbb893e14f9d7b6fea136a
SHA2561011cc09d55617f0dc8762054962a717377e6b670d8f0919843a36abf8c9fbba
SHA51279be41dbd0f413ed8a0ebd9b21e2b8db785bf1f0144e688969aef4d2a03ec48cf2605c1ca05c0bf6320f1729c86731f985dabaeb756cf08c1be49bb7ca51ca4f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exeFilesize
380KB
MD5cb9a88a9d6db7022ac43fd12d33739fb
SHA164a92e563e96ec5ecbfc1ebe0da9944180baec48
SHA256c35a18cd879ee63fae7ca80a265759a3a88a8e19a6ef16388f6cb64faf5f66c1
SHA512a73102917adf227cbe52e0db08a9672778e15bbfa5072ecb9dff74be968794ffbb780f600673dba56e1c429e8fed48f4753cc1ff74e2e1c8c54f89bcf0174995
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exeFilesize
380KB
MD5cb9a88a9d6db7022ac43fd12d33739fb
SHA164a92e563e96ec5ecbfc1ebe0da9944180baec48
SHA256c35a18cd879ee63fae7ca80a265759a3a88a8e19a6ef16388f6cb64faf5f66c1
SHA512a73102917adf227cbe52e0db08a9672778e15bbfa5072ecb9dff74be968794ffbb780f600673dba56e1c429e8fed48f4753cc1ff74e2e1c8c54f89bcf0174995
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exeFilesize
15KB
MD5100e643fa26c74de423d4bc6c808c673
SHA1157bba6b45dcf5cca17ad2f86085f79ff03b852a
SHA25656fdfd9f880b9a10d27ad8f62e612886e51a953f7c33ea6ae661ce8aa5c869bd
SHA512a13dfcc2f20cf9f3e5d908af81167ff7852b632658770dafbd6ecea47b694f681cf56d16a1268f4f07e3fe97a43a07fe367a00d4a4c94cb12d687a607013d25d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exeFilesize
15KB
MD5100e643fa26c74de423d4bc6c808c673
SHA1157bba6b45dcf5cca17ad2f86085f79ff03b852a
SHA25656fdfd9f880b9a10d27ad8f62e612886e51a953f7c33ea6ae661ce8aa5c869bd
SHA512a13dfcc2f20cf9f3e5d908af81167ff7852b632658770dafbd6ecea47b694f681cf56d16a1268f4f07e3fe97a43a07fe367a00d4a4c94cb12d687a607013d25d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exeFilesize
295KB
MD5a4380fc8b86efb72352bb6bce7a6b276
SHA1e18e0f5f12613baae655adfad9c6578c9c610255
SHA2562c4fd6cdf294e8147473633b4462bccd0a7fc9d511536d2697a94fc11aca6bad
SHA51292b723725f6e9c3e55c8f2b9684ba08bd5ae97eefdf53bf29bc60a0c2ddda31395ea1b99e7b42d13a6cf91278d0168a039422768e22391b8da8afbec5fae67ff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exeFilesize
295KB
MD5a4380fc8b86efb72352bb6bce7a6b276
SHA1e18e0f5f12613baae655adfad9c6578c9c610255
SHA2562c4fd6cdf294e8147473633b4462bccd0a7fc9d511536d2697a94fc11aca6bad
SHA51292b723725f6e9c3e55c8f2b9684ba08bd5ae97eefdf53bf29bc60a0c2ddda31395ea1b99e7b42d13a6cf91278d0168a039422768e22391b8da8afbec5fae67ff
-
memory/376-147-0x0000000000950000-0x000000000095A000-memory.dmpFilesize
40KB
-
memory/4516-1085-0x0000000000660000-0x0000000000692000-memory.dmpFilesize
200KB
-
memory/4516-1086-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB
-
memory/4516-1087-0x0000000004FD0000-0x0000000004FE0000-memory.dmpFilesize
64KB
-
memory/4588-191-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-199-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-156-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-158-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-160-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-162-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-164-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-166-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-168-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-170-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-172-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-174-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-176-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-178-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-180-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-182-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-184-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-187-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-186-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-189-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-154-0x0000000004B30000-0x00000000050D4000-memory.dmpFilesize
5.6MB
-
memory/4588-190-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-193-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-195-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-197-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-155-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-201-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-203-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-205-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-207-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-209-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-211-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-213-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-215-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-217-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-219-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-221-0x0000000004A70000-0x0000000004AAF000-memory.dmpFilesize
252KB
-
memory/4588-1064-0x0000000005220000-0x0000000005838000-memory.dmpFilesize
6.1MB
-
memory/4588-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4588-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4588-1067-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4588-1070-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-1071-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-1072-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4588-1073-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/4588-1074-0x0000000006490000-0x0000000006506000-memory.dmpFilesize
472KB
-
memory/4588-153-0x00000000020E0000-0x000000000212B000-memory.dmpFilesize
300KB
-
memory/4588-1075-0x0000000006520000-0x0000000006570000-memory.dmpFilesize
320KB
-
memory/4588-1076-0x0000000004B20000-0x0000000004B30000-memory.dmpFilesize
64KB
-
memory/4588-1078-0x0000000009D20000-0x0000000009EE2000-memory.dmpFilesize
1.8MB
-
memory/4588-1079-0x0000000009EF0000-0x000000000A41C000-memory.dmpFilesize
5.2MB