Analysis
-
max time kernel
68s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:36
Static task
static1
Behavioral task
behavioral1
Sample
fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe
Resource
win10v2004-20230220-en
General
-
Target
fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe
-
Size
522KB
-
MD5
c7866b8c3742a8ab3b9c705d4f658ca8
-
SHA1
742036e1d97f59a6c83ef5a54bb47b32e03faa21
-
SHA256
fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795
-
SHA512
0172fb52614592ca62e0bc6331c09cc03ed0d0813a5fbec875b72d4ecb57c269b79a0cda90222923e2dcf4c3d9d11a872f6e829bca7d84e5d169965acf76ae60
-
SSDEEP
12288:HMrFy90gKUaEsUA4oI+Fhr0urwhThC6JTfTIGkLAqJqQOjij:uyFKtUAbiu+TY6CGSACI2j
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr046691.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr046691.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr046691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr046691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr046691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr046691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr046691.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3688-158-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-159-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-161-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-163-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-167-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-169-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-165-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-173-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-171-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-175-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-177-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-179-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-181-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-183-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-185-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-187-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-189-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-191-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-193-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-195-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-197-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-199-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-201-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-203-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-205-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-207-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-209-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-211-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-213-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-215-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-217-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-219-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/3688-221-0x0000000002610000-0x000000000264F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziQg4532.exejr046691.exeku223472.exelr738523.exepid process 2328 ziQg4532.exe 1416 jr046691.exe 3688 ku223472.exe 4936 lr738523.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr046691.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr046691.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exeziQg4532.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQg4532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQg4532.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3516 3688 WerFault.exe ku223472.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr046691.exeku223472.exelr738523.exepid process 1416 jr046691.exe 1416 jr046691.exe 3688 ku223472.exe 3688 ku223472.exe 4936 lr738523.exe 4936 lr738523.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr046691.exeku223472.exelr738523.exedescription pid process Token: SeDebugPrivilege 1416 jr046691.exe Token: SeDebugPrivilege 3688 ku223472.exe Token: SeDebugPrivilege 4936 lr738523.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exeziQg4532.exedescription pid process target process PID 432 wrote to memory of 2328 432 fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe ziQg4532.exe PID 432 wrote to memory of 2328 432 fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe ziQg4532.exe PID 432 wrote to memory of 2328 432 fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe ziQg4532.exe PID 2328 wrote to memory of 1416 2328 ziQg4532.exe jr046691.exe PID 2328 wrote to memory of 1416 2328 ziQg4532.exe jr046691.exe PID 2328 wrote to memory of 3688 2328 ziQg4532.exe ku223472.exe PID 2328 wrote to memory of 3688 2328 ziQg4532.exe ku223472.exe PID 2328 wrote to memory of 3688 2328 ziQg4532.exe ku223472.exe PID 432 wrote to memory of 4936 432 fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe lr738523.exe PID 432 wrote to memory of 4936 432 fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe lr738523.exe PID 432 wrote to memory of 4936 432 fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe lr738523.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe"C:\Users\Admin\AppData\Local\Temp\fb1210a7e1ad8faef7945fd657598c871d2f71c6662e3f11827b9fc03eb78795.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQg4532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQg4532.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr046691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr046691.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku223472.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku223472.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 13484⤵
- Program crash
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr738523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr738523.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3688 -ip 36881⤵PID:4156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr738523.exeFilesize
175KB
MD5936e7e7096a105c4c7358827e9e003c7
SHA1ac86e9475e966c67c04e757cfc83c24cabac775e
SHA256441da91ec74f09a874332d9cb319eaf7939414eb834d27abd4522d215c87de2d
SHA5127a8c1d972e0dbd9db801a26216be24fb849572da721db49d13072f51c96ddc11f3c475dc14c5f656eaa3bf88cc50b97c60750425a1e759beb3001bcc67139c84
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr738523.exeFilesize
175KB
MD5936e7e7096a105c4c7358827e9e003c7
SHA1ac86e9475e966c67c04e757cfc83c24cabac775e
SHA256441da91ec74f09a874332d9cb319eaf7939414eb834d27abd4522d215c87de2d
SHA5127a8c1d972e0dbd9db801a26216be24fb849572da721db49d13072f51c96ddc11f3c475dc14c5f656eaa3bf88cc50b97c60750425a1e759beb3001bcc67139c84
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQg4532.exeFilesize
380KB
MD54dd9a6d44c160dfb1b820dcbf6b9b35f
SHA1b55ed3f52727466440b105e29a10dde5eb9f65cc
SHA25669386deffe7713b134022e10837b4946448b616c562d836190d558e499310ae4
SHA512e07a32e94c9e0c26f793af89170be7e9d0aa10219794f7a482ecaadb0c865868cf21ee519596a575122225d38cb2b687f6b4003608fb1b41bd4b10ab0c2e5091
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQg4532.exeFilesize
380KB
MD54dd9a6d44c160dfb1b820dcbf6b9b35f
SHA1b55ed3f52727466440b105e29a10dde5eb9f65cc
SHA25669386deffe7713b134022e10837b4946448b616c562d836190d558e499310ae4
SHA512e07a32e94c9e0c26f793af89170be7e9d0aa10219794f7a482ecaadb0c865868cf21ee519596a575122225d38cb2b687f6b4003608fb1b41bd4b10ab0c2e5091
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr046691.exeFilesize
15KB
MD54f22d08f822671ce13afae3b6a6f36cb
SHA14bd639c033f8904f5447639acf57ceae1de7653e
SHA256dff2bfee714e7fa698e63bd8b3f06ebaaf6fc58a6169323596bea6ed62e699a7
SHA512176eebb12ad5644cb123e31647fbbd966f4438b220721e4da080751d8f7d4e1bc559a908f1f018a8313b6b6d07c4abe274dad1845a2a3aecfcfc5f939274166d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr046691.exeFilesize
15KB
MD54f22d08f822671ce13afae3b6a6f36cb
SHA14bd639c033f8904f5447639acf57ceae1de7653e
SHA256dff2bfee714e7fa698e63bd8b3f06ebaaf6fc58a6169323596bea6ed62e699a7
SHA512176eebb12ad5644cb123e31647fbbd966f4438b220721e4da080751d8f7d4e1bc559a908f1f018a8313b6b6d07c4abe274dad1845a2a3aecfcfc5f939274166d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku223472.exeFilesize
295KB
MD5cc2718c058b9a021fb758589d4fc5206
SHA1147a2904628dee016787b35dc58ad958eec8a4a9
SHA256c6ce29403ae435a4627ba5904ce2aef86f690230cd68a19873c0fa76826c9c82
SHA512bb253431a701974f3a03720e8f0aabe7fe2c0bfcac81aa7ea5a1aa5337e8df8b1db1aaa304dfd1e8b12514bfec4a4637ccd35aa9ba0185f6c930a59b10567a53
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku223472.exeFilesize
295KB
MD5cc2718c058b9a021fb758589d4fc5206
SHA1147a2904628dee016787b35dc58ad958eec8a4a9
SHA256c6ce29403ae435a4627ba5904ce2aef86f690230cd68a19873c0fa76826c9c82
SHA512bb253431a701974f3a03720e8f0aabe7fe2c0bfcac81aa7ea5a1aa5337e8df8b1db1aaa304dfd1e8b12514bfec4a4637ccd35aa9ba0185f6c930a59b10567a53
-
memory/1416-147-0x0000000000E10000-0x0000000000E1A000-memory.dmpFilesize
40KB
-
memory/3688-153-0x0000000000670000-0x00000000006BB000-memory.dmpFilesize
300KB
-
memory/3688-154-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-155-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-156-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-157-0x0000000004BC0000-0x0000000005164000-memory.dmpFilesize
5.6MB
-
memory/3688-158-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-159-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-161-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-163-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-167-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-169-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-165-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-173-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-171-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-175-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-177-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-179-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-181-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-183-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-185-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-187-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-189-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-191-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-193-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-195-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-197-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-199-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-201-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-203-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-205-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-207-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-209-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-211-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-213-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-215-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-217-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-219-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-221-0x0000000002610000-0x000000000264F000-memory.dmpFilesize
252KB
-
memory/3688-1065-0x0000000000670000-0x00000000006BB000-memory.dmpFilesize
300KB
-
memory/3688-1066-0x0000000005170000-0x0000000005788000-memory.dmpFilesize
6.1MB
-
memory/3688-1067-0x0000000005790000-0x000000000589A000-memory.dmpFilesize
1.0MB
-
memory/3688-1068-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/3688-1069-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-1070-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-1071-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/3688-1072-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-1073-0x0000000004BB0000-0x0000000004BC0000-memory.dmpFilesize
64KB
-
memory/3688-1075-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/3688-1076-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/3688-1077-0x0000000006380000-0x0000000006542000-memory.dmpFilesize
1.8MB
-
memory/3688-1078-0x0000000006550000-0x0000000006A7C000-memory.dmpFilesize
5.2MB
-
memory/3688-1079-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/3688-1080-0x0000000006FC0000-0x0000000007010000-memory.dmpFilesize
320KB
-
memory/4936-1088-0x00000000000F0000-0x0000000000122000-memory.dmpFilesize
200KB
-
memory/4936-1089-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB