Analysis
-
max time kernel
108s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe
Resource
win10v2004-20230220-en
General
-
Target
2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe
-
Size
522KB
-
MD5
53fbc2751e6611d18efded55ac3c3804
-
SHA1
62367f6fed66f0adb97ca18619ccf43076aa3678
-
SHA256
2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1
-
SHA512
1f9d2535a79c80be610a8b8221a3c85e1cef7a1df723c7212afb550ef8f03922393c4dd28b86047cd643607955b0b2b479714cbd886257230516c9f79f035673
-
SSDEEP
12288:zMrly90suGKRC+YP51+zTU686qAemEO1SYGC:2yaGXh1+z386qAe3ObV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr975757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr975757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr975757.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr975757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr975757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr975757.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1192-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-159-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-161-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-169-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-167-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-171-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-165-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-179-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-177-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-175-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-163-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-183-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1192-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1728 ziZN1564.exe 2292 jr975757.exe 1192 ku298058.exe 960 lr881833.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr975757.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZN1564.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziZN1564.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4032 1192 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2292 jr975757.exe 2292 jr975757.exe 1192 ku298058.exe 1192 ku298058.exe 960 lr881833.exe 960 lr881833.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2292 jr975757.exe Token: SeDebugPrivilege 1192 ku298058.exe Token: SeDebugPrivilege 960 lr881833.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1728 1504 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe 84 PID 1504 wrote to memory of 1728 1504 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe 84 PID 1504 wrote to memory of 1728 1504 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe 84 PID 1728 wrote to memory of 2292 1728 ziZN1564.exe 85 PID 1728 wrote to memory of 2292 1728 ziZN1564.exe 85 PID 1728 wrote to memory of 1192 1728 ziZN1564.exe 92 PID 1728 wrote to memory of 1192 1728 ziZN1564.exe 92 PID 1728 wrote to memory of 1192 1728 ziZN1564.exe 92 PID 1504 wrote to memory of 960 1504 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe 97 PID 1504 wrote to memory of 960 1504 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe 97 PID 1504 wrote to memory of 960 1504 2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe"C:\Users\Admin\AppData\Local\Temp\2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1564.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr975757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr975757.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku298058.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku298058.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 13684⤵
- Program crash
PID:4032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr881833.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr881833.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1192 -ip 11921⤵PID:1736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5b5e6b5915cd0bde5f0f9f7e8438c9eba
SHA15192e8d7887cfcf67d76199badf2934bf1ab8a66
SHA2563d4c4fece928de6813d9674194f908349a6e85b52c111f81b2c82f632b402a9b
SHA512e20c3f8de21a156a746ce9c5988c3895fbab0c6e5f741587d2654c290ac6324a7ede00cd70a30a2ee1142f5af64c8fe5a38c65a63597f0dbc261c3d9ae34119b
-
Filesize
176KB
MD5b5e6b5915cd0bde5f0f9f7e8438c9eba
SHA15192e8d7887cfcf67d76199badf2934bf1ab8a66
SHA2563d4c4fece928de6813d9674194f908349a6e85b52c111f81b2c82f632b402a9b
SHA512e20c3f8de21a156a746ce9c5988c3895fbab0c6e5f741587d2654c290ac6324a7ede00cd70a30a2ee1142f5af64c8fe5a38c65a63597f0dbc261c3d9ae34119b
-
Filesize
380KB
MD5006fda800a82929d349b0a484fc5a455
SHA1578c31dc78fe0d9d06170cf50dce0f509b772b7d
SHA256d98ca56a4cda669a9fc7ea328f9b062ba23f46ad23f19d3c4bd1ce2e4d1ab1a9
SHA51200d761a32db258b76c633f8f8d723995baf1eb8eb8b2195ae0b9ea41740ecb2e0899188b9d4efba89ac6ee329b0dfae5f31af0da895e8bc5dcf7c8e124e29536
-
Filesize
380KB
MD5006fda800a82929d349b0a484fc5a455
SHA1578c31dc78fe0d9d06170cf50dce0f509b772b7d
SHA256d98ca56a4cda669a9fc7ea328f9b062ba23f46ad23f19d3c4bd1ce2e4d1ab1a9
SHA51200d761a32db258b76c633f8f8d723995baf1eb8eb8b2195ae0b9ea41740ecb2e0899188b9d4efba89ac6ee329b0dfae5f31af0da895e8bc5dcf7c8e124e29536
-
Filesize
14KB
MD58a0e91f881d7915ea828c39d8523b105
SHA1a8bdaba5103fbc9e592d9d30d490c67691040533
SHA256fe752edba0ea1b68d746d9d751d1bfb2c4838f389ab4d9076b469f1226785a7a
SHA51260a156e0dc7ddb2941c83ef28cb752390dd5ddd9a9be8c43184bb7ae15e7bafe21d74f4bd909088d2cbd952422ab54d31918f975c996de5a1028ab2ea42f3e14
-
Filesize
14KB
MD58a0e91f881d7915ea828c39d8523b105
SHA1a8bdaba5103fbc9e592d9d30d490c67691040533
SHA256fe752edba0ea1b68d746d9d751d1bfb2c4838f389ab4d9076b469f1226785a7a
SHA51260a156e0dc7ddb2941c83ef28cb752390dd5ddd9a9be8c43184bb7ae15e7bafe21d74f4bd909088d2cbd952422ab54d31918f975c996de5a1028ab2ea42f3e14
-
Filesize
295KB
MD5124a1083fec32b6a3849cd58f6b49f7a
SHA112c89b3eefc6905f09a64535ec920ec3f1567923
SHA25616322a5f77a33606cfb2b96c8dc7bf4de4d9f73a3e4d16ab3894d478d0ee4e02
SHA512d843d53a1fb02a3ae0f230325a10081024bc0d978e246c5da77a6784623307b94265fed90a34843690e23c5fa699fd5429de5a8513ea42872abbdf7ecd941273
-
Filesize
295KB
MD5124a1083fec32b6a3849cd58f6b49f7a
SHA112c89b3eefc6905f09a64535ec920ec3f1567923
SHA25616322a5f77a33606cfb2b96c8dc7bf4de4d9f73a3e4d16ab3894d478d0ee4e02
SHA512d843d53a1fb02a3ae0f230325a10081024bc0d978e246c5da77a6784623307b94265fed90a34843690e23c5fa699fd5429de5a8513ea42872abbdf7ecd941273