Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe
Resource
win10v2004-20230221-en
General
-
Target
2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe
-
Size
537KB
-
MD5
47203462b8f1f56f7e1de6abcd22d0e7
-
SHA1
b1cc46124a83e0879f7e6a0ce262135ad8adab71
-
SHA256
2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46
-
SHA512
1c312d7e1bc48c8142fb630d22268815cbfaf89b01cd79d17b64d8117501361e0ad0d9aa8c8bc2adb9d82a254d77ff5a0ebef2c3181e7ac1fc49398aa4a7e9b9
-
SSDEEP
12288:9MrEy90S6YtL2yFaMxNBZQDYeePU2VH+wF35EgJNnd:Nyv24aukZePRewDdd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr281794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr281794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr281794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr281794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr281794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr281794.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1796-158-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-159-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-161-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-163-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-165-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-167-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-169-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-171-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-173-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-175-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-177-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-179-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-181-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-183-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-185-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-187-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-189-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-191-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-193-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-195-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-197-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-199-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-201-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-203-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-205-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-207-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-209-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-211-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-213-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-215-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-217-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-219-0x0000000002960000-0x000000000299F000-memory.dmp family_redline behavioral1/memory/1796-221-0x0000000002960000-0x000000000299F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4612 zigr9343.exe 2776 jr281794.exe 1796 ku787004.exe 2096 lr960713.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr281794.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zigr9343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigr9343.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4784 1796 WerFault.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2776 jr281794.exe 2776 jr281794.exe 1796 ku787004.exe 1796 ku787004.exe 2096 lr960713.exe 2096 lr960713.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2776 jr281794.exe Token: SeDebugPrivilege 1796 ku787004.exe Token: SeDebugPrivilege 2096 lr960713.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4612 4824 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe 76 PID 4824 wrote to memory of 4612 4824 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe 76 PID 4824 wrote to memory of 4612 4824 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe 76 PID 4612 wrote to memory of 2776 4612 zigr9343.exe 77 PID 4612 wrote to memory of 2776 4612 zigr9343.exe 77 PID 4612 wrote to memory of 1796 4612 zigr9343.exe 78 PID 4612 wrote to memory of 1796 4612 zigr9343.exe 78 PID 4612 wrote to memory of 1796 4612 zigr9343.exe 78 PID 4824 wrote to memory of 2096 4824 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe 84 PID 4824 wrote to memory of 2096 4824 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe 84 PID 4824 wrote to memory of 2096 4824 2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe"C:\Users\Admin\AppData\Local\Temp\2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigr9343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigr9343.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr281794.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr281794.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787004.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787004.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 17404⤵
- Program crash
PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr960713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr960713.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1796 -ip 17961⤵PID:2196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56741a6a51eac401261d32a57b274d999
SHA126cdbb55f4d38334649c787a4c19840b934ab1da
SHA25673f7acb8687a2a29ca070b0c6e85a43668898629ce55c6b2688c31795a17e416
SHA512e5ef170a063da017163e230dd0b3cf1d5c80bd5c96a0b4e9d44c07c4172678ca34f0934542ca0c6ce13321d2545c69b5b9dd88464acf4106657f7725f920dc68
-
Filesize
176KB
MD56741a6a51eac401261d32a57b274d999
SHA126cdbb55f4d38334649c787a4c19840b934ab1da
SHA25673f7acb8687a2a29ca070b0c6e85a43668898629ce55c6b2688c31795a17e416
SHA512e5ef170a063da017163e230dd0b3cf1d5c80bd5c96a0b4e9d44c07c4172678ca34f0934542ca0c6ce13321d2545c69b5b9dd88464acf4106657f7725f920dc68
-
Filesize
395KB
MD5d9165300c3647e0ffb4170de4a52f522
SHA1e5c793ad95e2d44fb239758c8e721f1aa4ad87b6
SHA256ce1359bd77566ff70f7bb85cc946b9c26ba633238813f5db3a8abdc721f1aff0
SHA51225f93ac11a04ebf956e8fde946db191862fe7821981a7390482ac4a8c38a3c61883a1b29f8046d345cb10ef4e71ef252d4e6a21e7b277d2b5ca73eab116edd77
-
Filesize
395KB
MD5d9165300c3647e0ffb4170de4a52f522
SHA1e5c793ad95e2d44fb239758c8e721f1aa4ad87b6
SHA256ce1359bd77566ff70f7bb85cc946b9c26ba633238813f5db3a8abdc721f1aff0
SHA51225f93ac11a04ebf956e8fde946db191862fe7821981a7390482ac4a8c38a3c61883a1b29f8046d345cb10ef4e71ef252d4e6a21e7b277d2b5ca73eab116edd77
-
Filesize
14KB
MD50004a80a16bd499e3515dcf3313f809c
SHA1cc78c81de536c8212c2d3ec5ff831b374d658ace
SHA256b2199beff7de2e0aeca84d7e8168ed6ff6d109530961998e2fd0c845e03764b7
SHA512ac0b56972e159bf50c57371e3576bb76e037929ff62594f3982c000924f9545adfcb041347f3aba3d477a37cfcc7440d27a88866da4eec940c1ca5f212b22adc
-
Filesize
14KB
MD50004a80a16bd499e3515dcf3313f809c
SHA1cc78c81de536c8212c2d3ec5ff831b374d658ace
SHA256b2199beff7de2e0aeca84d7e8168ed6ff6d109530961998e2fd0c845e03764b7
SHA512ac0b56972e159bf50c57371e3576bb76e037929ff62594f3982c000924f9545adfcb041347f3aba3d477a37cfcc7440d27a88866da4eec940c1ca5f212b22adc
-
Filesize
352KB
MD5478f8c27d209f5b2e97625b95e8d25a0
SHA1f8b3be90c1894d206d3269b625f81cdf5703cfb3
SHA256b9adb8c4da2bca9d251bd4efd7c5cd0eb5229415b0a4d2d6d03560b92f95a2a5
SHA51263904d45b657ca5dea9ea7f4f9387a39fe678df2ac3045d8e9a57f8bc0ded97f506fd9c84f5da1a3212a9ebff487106b73b52b2ee31a53f0e523c38cad9f4718
-
Filesize
352KB
MD5478f8c27d209f5b2e97625b95e8d25a0
SHA1f8b3be90c1894d206d3269b625f81cdf5703cfb3
SHA256b9adb8c4da2bca9d251bd4efd7c5cd0eb5229415b0a4d2d6d03560b92f95a2a5
SHA51263904d45b657ca5dea9ea7f4f9387a39fe678df2ac3045d8e9a57f8bc0ded97f506fd9c84f5da1a3212a9ebff487106b73b52b2ee31a53f0e523c38cad9f4718