Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe
Resource
win10v2004-20230220-en
General
-
Target
2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe
-
Size
522KB
-
MD5
9cc1547a3d632f9d401a9af912e5d165
-
SHA1
f493131418dc87f3d2fdd4552a8ba21da9a35945
-
SHA256
2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19
-
SHA512
379a893ad9655c0066b7e0e6c677829ec616608d0c11e1fc7dfbf33953acc3eaf5734e83d1244aa076f4a1061b4d6104bebf946615f425db9b7d1fcbba8ef3ea
-
SSDEEP
6144:KTy+bnr+7p0yN90QEdvLK7/6DHoKyn9p/6iLv1Ham7J5Fim5wbyqygvSkt0etzHh:VMrLy90bvCgoXZ6m3weUtV1cH10ukZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr302732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr302732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr302732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr302732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr302732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr302732.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/2672-155-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-156-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-158-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-160-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-162-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-166-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-164-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-168-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-170-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-172-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-174-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-176-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-178-0x0000000004CC0000-0x0000000004CD0000-memory.dmp family_redline behavioral1/memory/2672-180-0x0000000004CC0000-0x0000000004CD0000-memory.dmp family_redline behavioral1/memory/2672-179-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-182-0x0000000004CC0000-0x0000000004CD0000-memory.dmp family_redline behavioral1/memory/2672-183-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-185-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-187-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-189-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-191-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-193-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-195-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-197-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-199-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-201-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-203-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-205-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-207-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-209-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-211-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-213-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-215-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-217-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-219-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/2672-221-0x0000000002500000-0x000000000253F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3196 ziEf1716.exe 1156 jr302732.exe 2672 ku046494.exe 4396 lr893517.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr302732.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEf1716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEf1716.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2636 2672 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1156 jr302732.exe 1156 jr302732.exe 2672 ku046494.exe 2672 ku046494.exe 4396 lr893517.exe 4396 lr893517.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1156 jr302732.exe Token: SeDebugPrivilege 2672 ku046494.exe Token: SeDebugPrivilege 4396 lr893517.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3820 wrote to memory of 3196 3820 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe 79 PID 3820 wrote to memory of 3196 3820 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe 79 PID 3820 wrote to memory of 3196 3820 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe 79 PID 3196 wrote to memory of 1156 3196 ziEf1716.exe 80 PID 3196 wrote to memory of 1156 3196 ziEf1716.exe 80 PID 3196 wrote to memory of 2672 3196 ziEf1716.exe 89 PID 3196 wrote to memory of 2672 3196 ziEf1716.exe 89 PID 3196 wrote to memory of 2672 3196 ziEf1716.exe 89 PID 3820 wrote to memory of 4396 3820 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe 95 PID 3820 wrote to memory of 4396 3820 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe 95 PID 3820 wrote to memory of 4396 3820 2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe"C:\Users\Admin\AppData\Local\Temp\2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf1716.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf1716.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr302732.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr302732.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046494.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 13524⤵
- Program crash
PID:2636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr893517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr893517.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2672 -ip 26721⤵PID:1360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56baad8d5c4059a2aca4d8553352ca2d4
SHA1bcd1e6ef1e0ddb110769dcafae855eb2d61140da
SHA2567b2b7dcbac8c053cd7af9c1999f5736f4671e33cca8ddff7eee018970ffec3cf
SHA512f07c2a4dbaad419521dad527ea78759eebb3cd2852dbca9bd48c3bc11b03cb5080f5e600020f170276696bd66b71992033f39a6c533512ca52929637f127f901
-
Filesize
176KB
MD56baad8d5c4059a2aca4d8553352ca2d4
SHA1bcd1e6ef1e0ddb110769dcafae855eb2d61140da
SHA2567b2b7dcbac8c053cd7af9c1999f5736f4671e33cca8ddff7eee018970ffec3cf
SHA512f07c2a4dbaad419521dad527ea78759eebb3cd2852dbca9bd48c3bc11b03cb5080f5e600020f170276696bd66b71992033f39a6c533512ca52929637f127f901
-
Filesize
380KB
MD533094dbe87a9a9884333081e2574b034
SHA1b323ffc1087ffe320c9119d3512d6f07c0e5f178
SHA25690c35ba7f4087536d650b8e1eeec73c3c32b29ef46ec219765fd820008b96636
SHA5127fe1fd06872e90c77a7048aabdf499a66dcfd294bc602c77469cdb7f0a1121c1c5b702868b75d5dce613b7ae0ae5ff7b1bfc1b290c4ff1633ba3513c8edc1611
-
Filesize
380KB
MD533094dbe87a9a9884333081e2574b034
SHA1b323ffc1087ffe320c9119d3512d6f07c0e5f178
SHA25690c35ba7f4087536d650b8e1eeec73c3c32b29ef46ec219765fd820008b96636
SHA5127fe1fd06872e90c77a7048aabdf499a66dcfd294bc602c77469cdb7f0a1121c1c5b702868b75d5dce613b7ae0ae5ff7b1bfc1b290c4ff1633ba3513c8edc1611
-
Filesize
14KB
MD56f7ba4ee8a7658cd039ce1c05c055b09
SHA1a3cb06ee1ebf66ee2e597a3720a0b1c6b3f91579
SHA25679c7d2049222ad8bef394f9762ef8cbb237ca8f99354807926e1335f5bec37d5
SHA5128872e4754fbfe514d8e659a7923b03e9060d390216bd203df45e71d777169b8fd085239645b6efc45b2b3425cc3054b98cb971244037881e6533354bb95b8f8a
-
Filesize
14KB
MD56f7ba4ee8a7658cd039ce1c05c055b09
SHA1a3cb06ee1ebf66ee2e597a3720a0b1c6b3f91579
SHA25679c7d2049222ad8bef394f9762ef8cbb237ca8f99354807926e1335f5bec37d5
SHA5128872e4754fbfe514d8e659a7923b03e9060d390216bd203df45e71d777169b8fd085239645b6efc45b2b3425cc3054b98cb971244037881e6533354bb95b8f8a
-
Filesize
295KB
MD532695ae256c9e7be0fc90c739ee561f3
SHA1538e5cb42ac4b338bd55f2667324a54a7b24a19f
SHA2564ac42498e4d1797a357630d642eb2036f67a730e37a99b05ae8a1ff50469e734
SHA512c0f1686472e598f8023f25379012cba630da9abbe8e690a328125eaa4714f14c161ede765352b82c6fdfad50e14c3fcbb7d85ee4f66f5430ba161c23b67c70dd
-
Filesize
295KB
MD532695ae256c9e7be0fc90c739ee561f3
SHA1538e5cb42ac4b338bd55f2667324a54a7b24a19f
SHA2564ac42498e4d1797a357630d642eb2036f67a730e37a99b05ae8a1ff50469e734
SHA512c0f1686472e598f8023f25379012cba630da9abbe8e690a328125eaa4714f14c161ede765352b82c6fdfad50e14c3fcbb7d85ee4f66f5430ba161c23b67c70dd