Analysis
-
max time kernel
82s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 17:40
Static task
static1
Behavioral task
behavioral1
Sample
10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe
Resource
win10v2004-20230220-en
General
-
Target
10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe
-
Size
521KB
-
MD5
44ad8eec8ddc15462e92a623367e2dee
-
SHA1
fbed49512d7d50100ab90ea5629314a515843b6c
-
SHA256
10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d
-
SHA512
2b456aa73c798d7a9b45ac0313e9e75f7bdb54b08340da96d4a7d4862bdb8554e50d91938daa0b69050ef2c436f34e52c734d2f409230d696886c475cd6a61f0
-
SSDEEP
12288:MMrsy90+hUcDMhAZ20oj3A+sFrLij1q6+ZhP:gyvQAZvY3tsF6pIXP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr595616.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr595616.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr595616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr595616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr595616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr595616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr595616.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/4488-155-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-158-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-156-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-161-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-159-0x0000000004BA0000-0x0000000004BB0000-memory.dmp family_redline behavioral1/memory/4488-164-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-166-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-168-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-170-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-172-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-174-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-176-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-178-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-180-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-182-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-184-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-186-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-188-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-190-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-192-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-194-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-196-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-198-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-200-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-202-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-204-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-206-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-208-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-212-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-214-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-210-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-216-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-218-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4488-220-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziOp1748.exejr595616.exeku971327.exelr355565.exepid process 680 ziOp1748.exe 3872 jr595616.exe 4488 ku971327.exe 4152 lr355565.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr595616.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr595616.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exeziOp1748.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOp1748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOp1748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1064 4488 WerFault.exe ku971327.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr595616.exeku971327.exelr355565.exepid process 3872 jr595616.exe 3872 jr595616.exe 4488 ku971327.exe 4488 ku971327.exe 4152 lr355565.exe 4152 lr355565.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr595616.exeku971327.exelr355565.exedescription pid process Token: SeDebugPrivilege 3872 jr595616.exe Token: SeDebugPrivilege 4488 ku971327.exe Token: SeDebugPrivilege 4152 lr355565.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exeziOp1748.exedescription pid process target process PID 1604 wrote to memory of 680 1604 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe ziOp1748.exe PID 1604 wrote to memory of 680 1604 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe ziOp1748.exe PID 1604 wrote to memory of 680 1604 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe ziOp1748.exe PID 680 wrote to memory of 3872 680 ziOp1748.exe jr595616.exe PID 680 wrote to memory of 3872 680 ziOp1748.exe jr595616.exe PID 680 wrote to memory of 4488 680 ziOp1748.exe ku971327.exe PID 680 wrote to memory of 4488 680 ziOp1748.exe ku971327.exe PID 680 wrote to memory of 4488 680 ziOp1748.exe ku971327.exe PID 1604 wrote to memory of 4152 1604 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe lr355565.exe PID 1604 wrote to memory of 4152 1604 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe lr355565.exe PID 1604 wrote to memory of 4152 1604 10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe lr355565.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe"C:\Users\Admin\AppData\Local\Temp\10700dbab751e8b6b5356ac6cd123861b097fbb78024b0eace606e90bf59dc1d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOp1748.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOp1748.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr595616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr595616.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku971327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku971327.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 18564⤵
- Program crash
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355565.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355565.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4488 -ip 44881⤵PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355565.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355565.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOp1748.exeFilesize
379KB
MD5623cb7a88c21e6a4070f7ff36848f8d7
SHA1bab57fe748bdba58346428fe3c90e8c41cc244e1
SHA25623169b71a45a61be1e0eaaa1511f160f52a300f6f42fc315fc53971cbab9d4de
SHA51203fc2ce0d05b14c3ad3631c3a2a8ef12f0045c351a8ca9606893361f9d6ff18fc5bd7fd842549055840828e70781290232d3dd6e2b0beb7259dedcf6aabc842c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOp1748.exeFilesize
379KB
MD5623cb7a88c21e6a4070f7ff36848f8d7
SHA1bab57fe748bdba58346428fe3c90e8c41cc244e1
SHA25623169b71a45a61be1e0eaaa1511f160f52a300f6f42fc315fc53971cbab9d4de
SHA51203fc2ce0d05b14c3ad3631c3a2a8ef12f0045c351a8ca9606893361f9d6ff18fc5bd7fd842549055840828e70781290232d3dd6e2b0beb7259dedcf6aabc842c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr595616.exeFilesize
15KB
MD55d350daf879a6183266924ff5b22d1a7
SHA178614be3980eaff090bcd4d3dcc95b6a4d95eb2a
SHA256d185992f02f19bd0ce3f92560cccc0ab7bc36a8a34c420c8a4bcdbb20a66a8ad
SHA512e148b3006d42e3459c101db7d75e727d1bf9a785ac8511e5a63e6fe28ad0fe881c59cb74817503d2f6f604657a2271f3d784b406d84e3df46f75c65c7f501e6d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr595616.exeFilesize
15KB
MD55d350daf879a6183266924ff5b22d1a7
SHA178614be3980eaff090bcd4d3dcc95b6a4d95eb2a
SHA256d185992f02f19bd0ce3f92560cccc0ab7bc36a8a34c420c8a4bcdbb20a66a8ad
SHA512e148b3006d42e3459c101db7d75e727d1bf9a785ac8511e5a63e6fe28ad0fe881c59cb74817503d2f6f604657a2271f3d784b406d84e3df46f75c65c7f501e6d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku971327.exeFilesize
295KB
MD5da8664fd5e5c19603edeb583f7c9647d
SHA1ce6030ae6a22166860f79489c04ef6e6c0ff8f0c
SHA25683c031add51e17a94ad20e581eafc31c7d684598e378987e78f6616e36de9678
SHA51253d858aeed740513ea535f6ba1d9c0582a4b62045e92076fcf09e731fa1c76ac385930367192b078a56f66907555d0b9656773078dc65a913f06059ea5b806eb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku971327.exeFilesize
295KB
MD5da8664fd5e5c19603edeb583f7c9647d
SHA1ce6030ae6a22166860f79489c04ef6e6c0ff8f0c
SHA25683c031add51e17a94ad20e581eafc31c7d684598e378987e78f6616e36de9678
SHA51253d858aeed740513ea535f6ba1d9c0582a4b62045e92076fcf09e731fa1c76ac385930367192b078a56f66907555d0b9656773078dc65a913f06059ea5b806eb
-
memory/3872-147-0x0000000000300000-0x000000000030A000-memory.dmpFilesize
40KB
-
memory/4152-1083-0x0000000000FE0000-0x0000000001012000-memory.dmpFilesize
200KB
-
memory/4152-1084-0x0000000005870000-0x0000000005880000-memory.dmpFilesize
64KB
-
memory/4488-188-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-200-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-158-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-156-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-162-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4488-161-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-159-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4488-164-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-166-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-168-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-170-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-172-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-174-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-176-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-178-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-180-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-182-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-184-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-186-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-154-0x0000000004BB0000-0x0000000005154000-memory.dmpFilesize
5.6MB
-
memory/4488-190-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-192-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-194-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-196-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-198-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-155-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-202-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-204-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-206-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-208-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-212-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-214-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-210-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-216-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-218-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-220-0x0000000002580000-0x00000000025BF000-memory.dmpFilesize
252KB
-
memory/4488-1063-0x0000000005160000-0x0000000005778000-memory.dmpFilesize
6.1MB
-
memory/4488-1064-0x0000000005780000-0x000000000588A000-memory.dmpFilesize
1.0MB
-
memory/4488-1065-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/4488-1066-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/4488-1067-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4488-1069-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4488-1070-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4488-1071-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/4488-1072-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/4488-1073-0x0000000006370000-0x0000000006532000-memory.dmpFilesize
1.8MB
-
memory/4488-1074-0x0000000006550000-0x0000000006A7C000-memory.dmpFilesize
5.2MB
-
memory/4488-153-0x0000000000610000-0x000000000065B000-memory.dmpFilesize
300KB
-
memory/4488-1075-0x0000000004BA0000-0x0000000004BB0000-memory.dmpFilesize
64KB
-
memory/4488-1076-0x0000000004620000-0x0000000004696000-memory.dmpFilesize
472KB
-
memory/4488-1077-0x0000000007F80000-0x0000000007FD0000-memory.dmpFilesize
320KB