Analysis
-
max time kernel
184s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 22:39
Static task
static1
Behavioral task
behavioral1
Sample
e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe
Resource
win10v2004-20230221-en
General
-
Target
e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe
-
Size
522KB
-
MD5
79ca6b8ac730eae4d65c136c80957914
-
SHA1
b96d33182871d9c22982b318a7c977f16c20416e
-
SHA256
e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998
-
SHA512
975a91a36a82a443b0b5190811de87bf68b67e7e89ddaf09ce29a8ed24ad261eadbf3004c21091a6f17119ef496f376bfe367112aacbea68a09e35f6f110e244
-
SSDEEP
12288:IMrSy905rqTnXhnK6BrwyEhCfJL7L23yQ:6yUWTnXhnKgNEYfFSiQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr776445.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr776445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr776445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr776445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr776445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr776445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr776445.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/4796-159-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-160-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-162-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-164-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-166-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-168-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-172-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-170-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-174-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-176-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-180-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-178-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-182-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-184-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-186-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-188-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4796-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zigu4121.exejr776445.exeku492048.exelr973982.exepid process 1204 zigu4121.exe 5048 jr776445.exe 4796 ku492048.exe 4460 lr973982.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr776445.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr776445.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exezigu4121.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zigu4121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigu4121.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1636 4796 WerFault.exe ku492048.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr776445.exeku492048.exelr973982.exepid process 5048 jr776445.exe 5048 jr776445.exe 4796 ku492048.exe 4796 ku492048.exe 4460 lr973982.exe 4460 lr973982.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr776445.exeku492048.exelr973982.exedescription pid process Token: SeDebugPrivilege 5048 jr776445.exe Token: SeDebugPrivilege 4796 ku492048.exe Token: SeDebugPrivilege 4460 lr973982.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exezigu4121.exedescription pid process target process PID 3708 wrote to memory of 1204 3708 e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe zigu4121.exe PID 3708 wrote to memory of 1204 3708 e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe zigu4121.exe PID 3708 wrote to memory of 1204 3708 e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe zigu4121.exe PID 1204 wrote to memory of 5048 1204 zigu4121.exe jr776445.exe PID 1204 wrote to memory of 5048 1204 zigu4121.exe jr776445.exe PID 1204 wrote to memory of 4796 1204 zigu4121.exe ku492048.exe PID 1204 wrote to memory of 4796 1204 zigu4121.exe ku492048.exe PID 1204 wrote to memory of 4796 1204 zigu4121.exe ku492048.exe PID 3708 wrote to memory of 4460 3708 e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe lr973982.exe PID 3708 wrote to memory of 4460 3708 e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe lr973982.exe PID 3708 wrote to memory of 4460 3708 e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe lr973982.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe"C:\Users\Admin\AppData\Local\Temp\e6ae0f5927535d447a8a8af80955c4175f1abd66a3bdaca816b1ffa71e4bd998.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigu4121.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigu4121.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr776445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr776445.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku492048.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku492048.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973982.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973982.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4796 -ip 47961⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973982.exeFilesize
175KB
MD591246c4a3768f7d0694fd1c61183718c
SHA1692c997b2e640e2d0ba761e6d615a18ba2e07c8c
SHA256756ba3ed801fef7a24e455e46e0de19477585dbf807594bdb25312fcf574c935
SHA5125541e6ca8c94525111fa62766c612e2ab3ca59fb963f38c36c38716961c52dbfb305bf10f69d5833997d7aa8f79af96afe64075c1d6163dce3d09eede2f39b8e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr973982.exeFilesize
175KB
MD591246c4a3768f7d0694fd1c61183718c
SHA1692c997b2e640e2d0ba761e6d615a18ba2e07c8c
SHA256756ba3ed801fef7a24e455e46e0de19477585dbf807594bdb25312fcf574c935
SHA5125541e6ca8c94525111fa62766c612e2ab3ca59fb963f38c36c38716961c52dbfb305bf10f69d5833997d7aa8f79af96afe64075c1d6163dce3d09eede2f39b8e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigu4121.exeFilesize
380KB
MD56f31830d0e1849c32ee871f40c14de26
SHA198fa3283cb705ebab58d9fbadfed251a9069696d
SHA256209cc9caa058043ff28e115a5fd4d0aa54be71a798b8ea770d2cc593b899b97a
SHA5129b7c0c503907eee34f9ebd88b36b9e3e7840d108b142aaa55b0c7130bc58f0c242855ade7ee8c7ab2a36d953bba2c64d61bb554fa9f3eb61b1d28e4c09f1d94a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigu4121.exeFilesize
380KB
MD56f31830d0e1849c32ee871f40c14de26
SHA198fa3283cb705ebab58d9fbadfed251a9069696d
SHA256209cc9caa058043ff28e115a5fd4d0aa54be71a798b8ea770d2cc593b899b97a
SHA5129b7c0c503907eee34f9ebd88b36b9e3e7840d108b142aaa55b0c7130bc58f0c242855ade7ee8c7ab2a36d953bba2c64d61bb554fa9f3eb61b1d28e4c09f1d94a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr776445.exeFilesize
15KB
MD5ec78ba7078c7b94a4c91b57e394c7dd3
SHA1c42d59c3a885ea9f14afe8ff6c08cd459b742ee8
SHA2566353e0c799074d3f2babdb9c323cdb076151b4ed39a18abd2b273fe313686e2a
SHA512b61ce216460da4ceb3ddbb62e3ed1420d2a98f36058cad7d38d885f87a830c613ab81251defbd14e34a594192550c58ce480f5752cac046f587ebfc92849e168
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr776445.exeFilesize
15KB
MD5ec78ba7078c7b94a4c91b57e394c7dd3
SHA1c42d59c3a885ea9f14afe8ff6c08cd459b742ee8
SHA2566353e0c799074d3f2babdb9c323cdb076151b4ed39a18abd2b273fe313686e2a
SHA512b61ce216460da4ceb3ddbb62e3ed1420d2a98f36058cad7d38d885f87a830c613ab81251defbd14e34a594192550c58ce480f5752cac046f587ebfc92849e168
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku492048.exeFilesize
295KB
MD5d042c231e8c814660805eb40c0ba3506
SHA1adb22e8c09801df482ccbfab2fbba5568ca1f8df
SHA256c92b19f3e427428398cae02c1f44da2fb030f179a685bc4d3da3f9bd0aa8b2af
SHA512e9fb4293f5d6beb300ae3917d0532c2aa51f76d340d65a4cd5b8467bd323f8e35ee6ac07cb4fb75c20885ab32298a83a7523072fbc15fae02c38dbe34173ee1a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku492048.exeFilesize
295KB
MD5d042c231e8c814660805eb40c0ba3506
SHA1adb22e8c09801df482ccbfab2fbba5568ca1f8df
SHA256c92b19f3e427428398cae02c1f44da2fb030f179a685bc4d3da3f9bd0aa8b2af
SHA512e9fb4293f5d6beb300ae3917d0532c2aa51f76d340d65a4cd5b8467bd323f8e35ee6ac07cb4fb75c20885ab32298a83a7523072fbc15fae02c38dbe34173ee1a
-
memory/4460-1093-0x00000000001C0000-0x00000000001F2000-memory.dmpFilesize
200KB
-
memory/4460-1094-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/4460-1095-0x0000000004E10000-0x0000000004E20000-memory.dmpFilesize
64KB
-
memory/4796-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-156-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-157-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-158-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/4796-159-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-160-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-162-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-164-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-166-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-168-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-172-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-170-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-174-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-176-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-180-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-178-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-182-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-184-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-186-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-188-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-154-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-155-0x0000000004BA0000-0x0000000005144000-memory.dmpFilesize
5.6MB
-
memory/4796-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4796-1065-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/4796-1066-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-1067-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-1068-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-1069-0x0000000005250000-0x0000000005868000-memory.dmpFilesize
6.1MB
-
memory/4796-1071-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4796-1072-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4796-1073-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4796-1074-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-1076-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4796-1077-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4796-1078-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4796-153-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/4796-1081-0x00000000065F0000-0x00000000067B2000-memory.dmpFilesize
1.8MB
-
memory/4796-1082-0x00000000067D0000-0x0000000006CFC000-memory.dmpFilesize
5.2MB
-
memory/4796-1083-0x0000000006F40000-0x0000000006FB6000-memory.dmpFilesize
472KB
-
memory/4796-1084-0x0000000006FD0000-0x0000000007020000-memory.dmpFilesize
320KB
-
memory/5048-147-0x0000000000310000-0x000000000031A000-memory.dmpFilesize
40KB