Analysis
-
max time kernel
60s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:34
Static task
static1
Behavioral task
behavioral1
Sample
73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe
Resource
win10v2004-20230221-en
General
-
Target
73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe
-
Size
521KB
-
MD5
c8ac2ce7183437fb6c04d600b1d09640
-
SHA1
6fe3f68cd20ea3c54205f4ad0bf70e0c0fcbeef8
-
SHA256
73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3
-
SHA512
a86ae10d286901002ed78ac24da36990e4b48ad70ec6d403045f55f01ece58c686beb5f801565405cd44195b7e4df76cb650b918f43d67da4e688d99c38aad80
-
SSDEEP
12288:+Mrxy90f++6L1oQIm3X/nzeLs3bSSl6sYgPcN:fy+++6hoe3PAs3nsIw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr821198.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr821198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr821198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr821198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr821198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr821198.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr821198.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1300-158-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-159-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-161-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-163-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-165-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-167-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-169-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-171-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-173-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-175-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-177-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-179-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-181-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-183-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-185-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-187-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-189-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-191-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-193-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-195-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-197-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-199-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-201-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-203-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-205-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-207-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-209-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-211-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-213-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-215-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-217-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-219-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline behavioral1/memory/1300-221-0x00000000051C0000-0x00000000051FF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziyj3867.exejr821198.exeku102330.exelr678721.exepid process 808 ziyj3867.exe 1432 jr821198.exe 1300 ku102330.exe 4980 lr678721.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr821198.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr821198.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exeziyj3867.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziyj3867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyj3867.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4480 1300 WerFault.exe ku102330.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr821198.exeku102330.exelr678721.exepid process 1432 jr821198.exe 1432 jr821198.exe 1300 ku102330.exe 1300 ku102330.exe 4980 lr678721.exe 4980 lr678721.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr821198.exeku102330.exelr678721.exedescription pid process Token: SeDebugPrivilege 1432 jr821198.exe Token: SeDebugPrivilege 1300 ku102330.exe Token: SeDebugPrivilege 4980 lr678721.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exeziyj3867.exedescription pid process target process PID 2064 wrote to memory of 808 2064 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe ziyj3867.exe PID 2064 wrote to memory of 808 2064 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe ziyj3867.exe PID 2064 wrote to memory of 808 2064 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe ziyj3867.exe PID 808 wrote to memory of 1432 808 ziyj3867.exe jr821198.exe PID 808 wrote to memory of 1432 808 ziyj3867.exe jr821198.exe PID 808 wrote to memory of 1300 808 ziyj3867.exe ku102330.exe PID 808 wrote to memory of 1300 808 ziyj3867.exe ku102330.exe PID 808 wrote to memory of 1300 808 ziyj3867.exe ku102330.exe PID 2064 wrote to memory of 4980 2064 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe lr678721.exe PID 2064 wrote to memory of 4980 2064 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe lr678721.exe PID 2064 wrote to memory of 4980 2064 73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe lr678721.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe"C:\Users\Admin\AppData\Local\Temp\73b7eca13d0d2f5449952abbd007b1e03dbdc4a582d7544486dfe749a7b65fb3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyj3867.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyj3867.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr821198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr821198.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku102330.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku102330.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 15604⤵
- Program crash
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr678721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr678721.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1300 -ip 13001⤵PID:1784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59a28f128841d40c47f2758096bf08616
SHA18a05bd73e4be707c21fcbe32d00db8efdb1db0b4
SHA2566afe0077b28941c38dd33e3e9f065033baf214452c30a8ab1c22d5d471706c88
SHA512c3b8fe116166e7903e4c944163c981df6403bba1831a8ac870c25c79d30bcfc0ad6dcc62070731a317f41ca5b65f6504273cbfa47f2d955458ccc18d16982f46
-
Filesize
175KB
MD59a28f128841d40c47f2758096bf08616
SHA18a05bd73e4be707c21fcbe32d00db8efdb1db0b4
SHA2566afe0077b28941c38dd33e3e9f065033baf214452c30a8ab1c22d5d471706c88
SHA512c3b8fe116166e7903e4c944163c981df6403bba1831a8ac870c25c79d30bcfc0ad6dcc62070731a317f41ca5b65f6504273cbfa47f2d955458ccc18d16982f46
-
Filesize
379KB
MD50db4d740998cd996596a78e7b1fe2181
SHA18809d418c017ac28f4f26d74e9f620c20a40cada
SHA256b74cce96274cc533beebe8f475a0be2c228ed4f70d0aadd1878014ca172f235b
SHA512d574b9b048d3ec52b589677a27bb3b4409499dac09f76be334000d755dd2a81769e84816c49f0e8127fb4f16a290baa23e15f99d6aa09fb8e660888dc159c2ba
-
Filesize
379KB
MD50db4d740998cd996596a78e7b1fe2181
SHA18809d418c017ac28f4f26d74e9f620c20a40cada
SHA256b74cce96274cc533beebe8f475a0be2c228ed4f70d0aadd1878014ca172f235b
SHA512d574b9b048d3ec52b589677a27bb3b4409499dac09f76be334000d755dd2a81769e84816c49f0e8127fb4f16a290baa23e15f99d6aa09fb8e660888dc159c2ba
-
Filesize
11KB
MD5dc60f0c6c3c7a8ac4f2a4f95a36f94bc
SHA15daba85b1a40c2ca8e34ff00612e8070cd426768
SHA256338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4
SHA512f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd
-
Filesize
11KB
MD5dc60f0c6c3c7a8ac4f2a4f95a36f94bc
SHA15daba85b1a40c2ca8e34ff00612e8070cd426768
SHA256338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4
SHA512f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd
-
Filesize
294KB
MD59772fdb8af0d88e285bc69173a7b990e
SHA1758cfadbc9fb3bbc9689577dd6f6612aa7801f9c
SHA256d4ca491003766175317125bb9e077a6897c3cbe25c66ca3eeed2bd27f8125f2e
SHA512c95247f4ac92755141dd8aa605f30286059604b2d352ab66b7688ed652b30c064e63c7c66393e57232fc5fef199d0d93351d44d4708073cd63c905952f333bd3
-
Filesize
294KB
MD59772fdb8af0d88e285bc69173a7b990e
SHA1758cfadbc9fb3bbc9689577dd6f6612aa7801f9c
SHA256d4ca491003766175317125bb9e077a6897c3cbe25c66ca3eeed2bd27f8125f2e
SHA512c95247f4ac92755141dd8aa605f30286059604b2d352ab66b7688ed652b30c064e63c7c66393e57232fc5fef199d0d93351d44d4708073cd63c905952f333bd3