Analysis
-
max time kernel
97s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:26
Static task
static1
Behavioral task
behavioral1
Sample
c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe
Resource
win10v2004-20230220-en
General
-
Target
c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe
-
Size
522KB
-
MD5
394a0a07c50a7ccba77bebb57895f6b7
-
SHA1
fdbd3069d3201f53c3da338d704a0924bf0c60c2
-
SHA256
c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593
-
SHA512
35175fadf7c038ea276d7c431eb257620370b8376797b8181bccb888815359a0be69628654a24e8366b451642246fb834a35c9bdc0815bff8fc4a5bb1f8d38c5
-
SSDEEP
12288:JMrry90puFQwjoy6TLlpqAIjbeql6u2txeZ:ayVQuoyehIjzsuaQZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr129791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr129791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr129791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr129791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr129791.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr129791.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4108-155-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-156-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-158-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-160-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-162-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-164-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-166-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-168-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-170-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-172-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-175-0x0000000002440000-0x0000000002450000-memory.dmp family_redline behavioral1/memory/4108-174-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-179-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-181-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-183-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-185-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-187-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-189-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-191-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-193-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-195-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-197-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-199-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-201-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-203-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-205-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-207-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-209-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-211-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-213-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-215-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-217-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-219-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/4108-221-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3924 ziQn4566.exe 3468 jr129791.exe 4108 ku930139.exe 3004 lr295173.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr129791.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQn4566.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQn4566.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2876 4108 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3468 jr129791.exe 3468 jr129791.exe 4108 ku930139.exe 4108 ku930139.exe 3004 lr295173.exe 3004 lr295173.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3468 jr129791.exe Token: SeDebugPrivilege 4108 ku930139.exe Token: SeDebugPrivilege 3004 lr295173.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3924 2264 c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe 84 PID 2264 wrote to memory of 3924 2264 c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe 84 PID 2264 wrote to memory of 3924 2264 c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe 84 PID 3924 wrote to memory of 3468 3924 ziQn4566.exe 85 PID 3924 wrote to memory of 3468 3924 ziQn4566.exe 85 PID 3924 wrote to memory of 4108 3924 ziQn4566.exe 91 PID 3924 wrote to memory of 4108 3924 ziQn4566.exe 91 PID 3924 wrote to memory of 4108 3924 ziQn4566.exe 91 PID 2264 wrote to memory of 3004 2264 c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe 97 PID 2264 wrote to memory of 3004 2264 c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe 97 PID 2264 wrote to memory of 3004 2264 c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe"C:\Users\Admin\AppData\Local\Temp\c822a6e25de82cddd30fd3cb0b8d151cf0d0575410a2489c0008f717e9064593.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQn4566.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQn4566.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr129791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr129791.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku930139.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku930139.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 15284⤵
- Program crash
PID:2876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr295173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr295173.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4108 -ip 41081⤵PID:1904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5121b92617462c469186747ad10d8d81a
SHA1e78046245a9588deaffb8b740a3e80b83b279c18
SHA2563fe4ddb7b3bfc1414cb1a1e82c63240cda4cb9ccb98d243140ec94edec521137
SHA512d960d69583265823cd16c41c976b187df6d13aef49bdad567b4dd392c4519f8df6ab147d88428e89e5aaf0ee8e083213bfac76820de8dcd963b65c00d2c7051e
-
Filesize
175KB
MD5121b92617462c469186747ad10d8d81a
SHA1e78046245a9588deaffb8b740a3e80b83b279c18
SHA2563fe4ddb7b3bfc1414cb1a1e82c63240cda4cb9ccb98d243140ec94edec521137
SHA512d960d69583265823cd16c41c976b187df6d13aef49bdad567b4dd392c4519f8df6ab147d88428e89e5aaf0ee8e083213bfac76820de8dcd963b65c00d2c7051e
-
Filesize
379KB
MD523a56ff39b373263a484103c453b7142
SHA1f2faa63d4532a06e64c542456caa8a36a0ae4054
SHA256c8057623586a8533abf105f81ef66dd90c4acd7c9974038baf308a107dbdb751
SHA512544557d7d46d03a4701f761116cf6a9feff87255ecbaa56f98e6a50e164760babf9472429c526be6e91ca1e144bd3aa98267c8b32a36504c00dcc96f4c97730e
-
Filesize
379KB
MD523a56ff39b373263a484103c453b7142
SHA1f2faa63d4532a06e64c542456caa8a36a0ae4054
SHA256c8057623586a8533abf105f81ef66dd90c4acd7c9974038baf308a107dbdb751
SHA512544557d7d46d03a4701f761116cf6a9feff87255ecbaa56f98e6a50e164760babf9472429c526be6e91ca1e144bd3aa98267c8b32a36504c00dcc96f4c97730e
-
Filesize
11KB
MD58a218172360fc67288ee893727ba20c0
SHA1f5c67ef1f36664bf9ffd895110b3533a7475f7a1
SHA256b68c7f3c88249ba27bdba10392426e28705a9217d48970dddc384cad684c766c
SHA5129acb449a84e08477b3652ec54e6f708c89455d45c41795de78232de238d0b25d08dbb281f273e2e1f3191f4408cb700de883fec9105adbce7b60e163f841a05b
-
Filesize
11KB
MD58a218172360fc67288ee893727ba20c0
SHA1f5c67ef1f36664bf9ffd895110b3533a7475f7a1
SHA256b68c7f3c88249ba27bdba10392426e28705a9217d48970dddc384cad684c766c
SHA5129acb449a84e08477b3652ec54e6f708c89455d45c41795de78232de238d0b25d08dbb281f273e2e1f3191f4408cb700de883fec9105adbce7b60e163f841a05b
-
Filesize
294KB
MD567f86af5cddfe28a488fb021c84eb642
SHA1764ed39386cc962dfd880be17a9af2df6d6e7617
SHA2569924a7cff465efe21783ccce2d2c6875c52ff7c19a1fb2669c1d6e0cea3ee048
SHA51205b09117c1453bb128491dcaef4a388e7c58380ed75cc6d1654e211f343f5d0ccf5f09fd71f553ed20649d6a7a88a932519c73b966ae3d2589fdc566f4141acf
-
Filesize
294KB
MD567f86af5cddfe28a488fb021c84eb642
SHA1764ed39386cc962dfd880be17a9af2df6d6e7617
SHA2569924a7cff465efe21783ccce2d2c6875c52ff7c19a1fb2669c1d6e0cea3ee048
SHA51205b09117c1453bb128491dcaef4a388e7c58380ed75cc6d1654e211f343f5d0ccf5f09fd71f553ed20649d6a7a88a932519c73b966ae3d2589fdc566f4141acf