Analysis
-
max time kernel
105s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 09:42
Static task
static1
Behavioral task
behavioral1
Sample
e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe
Resource
win10v2004-20230220-en
General
-
Target
e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe
-
Size
522KB
-
MD5
3a64990d749114d9363810375ba63b4a
-
SHA1
41fb719d82365ddeab6836d5d8eab153d24bd7bd
-
SHA256
e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75
-
SHA512
c4c5cb98ab4362d89bae392294ef5ab320ed91bcc1992d0e0540302dbce9edefe3f7061d3e444edf4d00a38a318c0c26639e95f2bdcc290a909be5c862b72e56
-
SSDEEP
12288:BMroy90od6Q8Az8rq0Jz9utn324QLRMIHUtTKd/pUnH:ZyJoQX8vOtn324QL+LFKpK
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr527997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr527997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr527997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr527997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr527997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr527997.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2596-158-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-159-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-161-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-163-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-165-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-167-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-169-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-171-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-173-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-175-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-177-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-179-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-181-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-183-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-185-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-187-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-189-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-191-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-193-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-195-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-197-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-199-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-201-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-203-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-205-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-207-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-209-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-211-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-213-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-215-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-217-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-219-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/2596-221-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1540 ziBd3928.exe 4064 jr527997.exe 2596 ku311044.exe 4760 lr126613.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr527997.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziBd3928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBd3928.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4480 2596 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4064 jr527997.exe 4064 jr527997.exe 2596 ku311044.exe 2596 ku311044.exe 4760 lr126613.exe 4760 lr126613.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4064 jr527997.exe Token: SeDebugPrivilege 2596 ku311044.exe Token: SeDebugPrivilege 4760 lr126613.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1540 4176 e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe 90 PID 4176 wrote to memory of 1540 4176 e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe 90 PID 4176 wrote to memory of 1540 4176 e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe 90 PID 1540 wrote to memory of 4064 1540 ziBd3928.exe 91 PID 1540 wrote to memory of 4064 1540 ziBd3928.exe 91 PID 1540 wrote to memory of 2596 1540 ziBd3928.exe 97 PID 1540 wrote to memory of 2596 1540 ziBd3928.exe 97 PID 1540 wrote to memory of 2596 1540 ziBd3928.exe 97 PID 4176 wrote to memory of 4760 4176 e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe 103 PID 4176 wrote to memory of 4760 4176 e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe 103 PID 4176 wrote to memory of 4760 4176 e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe"C:\Users\Admin\AppData\Local\Temp\e75ffd8413836527845c06202713356c8f9c6ae1b21aea3e8f8806cba6435a75.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBd3928.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBd3928.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr527997.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr527997.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku311044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku311044.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 20124⤵
- Program crash
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr126613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr126613.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2596 -ip 25961⤵PID:1440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD59f46b7ff77ba94347cc27efd5177a3e8
SHA13334d4d82a0294744a1c7968723155f3207bfaa7
SHA25663caf04d7e6854b803b9f6b47f2843472634c0cc488f0ba99826537fb95939a0
SHA5129fec70b32609b19b3da4ab24fd775412a3afed540aa909db7f56384a909fe070e6d28408ad59ae258d224be8fc152322f3f694be94ed4648a7debb646c72de97
-
Filesize
176KB
MD59f46b7ff77ba94347cc27efd5177a3e8
SHA13334d4d82a0294744a1c7968723155f3207bfaa7
SHA25663caf04d7e6854b803b9f6b47f2843472634c0cc488f0ba99826537fb95939a0
SHA5129fec70b32609b19b3da4ab24fd775412a3afed540aa909db7f56384a909fe070e6d28408ad59ae258d224be8fc152322f3f694be94ed4648a7debb646c72de97
-
Filesize
380KB
MD55865adea70503da38aa3f1f3b14238ea
SHA17a34dcdf8c63a12a7e14f06812eb876113620edd
SHA256a05cc348a9aa904bf0bb28b91c35b001575b9ed59d5959f0d62274a70f02d10c
SHA51246e418d07bf1ada4bc1b2cc5871da1c7258dbd8b101cef04257878ca7b33ce7ae4974da7f1116ee5202f50bbf88c8c23934b02df119d017cae5300cb6275c76a
-
Filesize
380KB
MD55865adea70503da38aa3f1f3b14238ea
SHA17a34dcdf8c63a12a7e14f06812eb876113620edd
SHA256a05cc348a9aa904bf0bb28b91c35b001575b9ed59d5959f0d62274a70f02d10c
SHA51246e418d07bf1ada4bc1b2cc5871da1c7258dbd8b101cef04257878ca7b33ce7ae4974da7f1116ee5202f50bbf88c8c23934b02df119d017cae5300cb6275c76a
-
Filesize
14KB
MD5a541e5bc810bd5dd2a93edf97f08d4d2
SHA142bdfb09207009ebf7bf2d4cc5e15c51035dc001
SHA25680920071ae1e89a5f14035fb691adb5a5a0baae8d234901687eb31f8cc5c4846
SHA51223a4ab8a71fe0824adcc3f8ba4b28a8b0382095834fe5c909037ffca46822ac574735e79ff4023772f6951931db7bdf92076238b5115e802931fd997025be9f5
-
Filesize
14KB
MD5a541e5bc810bd5dd2a93edf97f08d4d2
SHA142bdfb09207009ebf7bf2d4cc5e15c51035dc001
SHA25680920071ae1e89a5f14035fb691adb5a5a0baae8d234901687eb31f8cc5c4846
SHA51223a4ab8a71fe0824adcc3f8ba4b28a8b0382095834fe5c909037ffca46822ac574735e79ff4023772f6951931db7bdf92076238b5115e802931fd997025be9f5
-
Filesize
295KB
MD5975708c5bbcf818b58220bdeb84491a1
SHA1b117b027470e9528887f49a84a088486af30dfd9
SHA256434622e305d19b629d4668644f824260cc95953dece9b5869c432aba78c3fbde
SHA512bd6e48a6f4883fdfeae4904dce6fe5657953f6de52121c81bbb3d39133e36d73b80e72100c1ff8e546295e614f5eab45994a7e341e8bcbac7f22a7b26fc7593d
-
Filesize
295KB
MD5975708c5bbcf818b58220bdeb84491a1
SHA1b117b027470e9528887f49a84a088486af30dfd9
SHA256434622e305d19b629d4668644f824260cc95953dece9b5869c432aba78c3fbde
SHA512bd6e48a6f4883fdfeae4904dce6fe5657953f6de52121c81bbb3d39133e36d73b80e72100c1ff8e546295e614f5eab45994a7e341e8bcbac7f22a7b26fc7593d