Analysis
-
max time kernel
62s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:20
Static task
static1
Behavioral task
behavioral1
Sample
e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe
Resource
win10v2004-20230220-en
General
-
Target
e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe
-
Size
521KB
-
MD5
8f1965f93893ad77d7ac0589441d9f38
-
SHA1
7a71f29302f12a9ed83361e6aac85b1b4eb9ea3b
-
SHA256
e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41
-
SHA512
479d3898a7487f2dacc8789c3733791c248babd4f9cd9ce559e5a09c972c9e422b8d4a80f317dba7211f24ee81840a1add10dfe2ccd50b2b514a4c1ecc15faf9
-
SSDEEP
12288:AMrjy90r6cTFW1z9OATUFyp1Mmp8BOm4r:zyQ68W1zZp1Mk8wm4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr743099.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr743099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr743099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr743099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr743099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr743099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr743099.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/4704-155-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-157-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-163-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-160-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-165-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-167-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-169-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-171-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-173-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-175-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-177-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-179-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-181-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-183-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-185-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-187-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-189-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-191-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-193-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-195-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-197-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-199-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-201-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-203-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-205-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-207-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-209-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-211-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-213-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-215-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-217-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-219-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-221-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/4704-1072-0x0000000004C10000-0x0000000004C20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziEp6955.exejr743099.exeku596150.exelr838841.exepid process 704 ziEp6955.exe 4124 jr743099.exe 4704 ku596150.exe 2028 lr838841.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr743099.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr743099.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziEp6955.exee93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEp6955.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEp6955.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3708 4704 WerFault.exe ku596150.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr743099.exeku596150.exelr838841.exepid process 4124 jr743099.exe 4124 jr743099.exe 4704 ku596150.exe 4704 ku596150.exe 2028 lr838841.exe 2028 lr838841.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr743099.exeku596150.exelr838841.exedescription pid process Token: SeDebugPrivilege 4124 jr743099.exe Token: SeDebugPrivilege 4704 ku596150.exe Token: SeDebugPrivilege 2028 lr838841.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exeziEp6955.exedescription pid process target process PID 5076 wrote to memory of 704 5076 e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe ziEp6955.exe PID 5076 wrote to memory of 704 5076 e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe ziEp6955.exe PID 5076 wrote to memory of 704 5076 e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe ziEp6955.exe PID 704 wrote to memory of 4124 704 ziEp6955.exe jr743099.exe PID 704 wrote to memory of 4124 704 ziEp6955.exe jr743099.exe PID 704 wrote to memory of 4704 704 ziEp6955.exe ku596150.exe PID 704 wrote to memory of 4704 704 ziEp6955.exe ku596150.exe PID 704 wrote to memory of 4704 704 ziEp6955.exe ku596150.exe PID 5076 wrote to memory of 2028 5076 e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe lr838841.exe PID 5076 wrote to memory of 2028 5076 e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe lr838841.exe PID 5076 wrote to memory of 2028 5076 e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe lr838841.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe"C:\Users\Admin\AppData\Local\Temp\e93c6b4a8eac776191cbec33f29df37a25baf6f76f1d72ca56d3650cc4062c41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEp6955.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEp6955.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743099.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743099.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku596150.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku596150.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 17004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838841.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838841.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4704 -ip 47041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838841.exeFilesize
175KB
MD59ce6e7a6598f5cad4e81ae9dc2ae3808
SHA1c397c34dac382bcb8e99a4cc6c1fecb0514c418e
SHA2565da065f735ef019742807391911b3acfd7df7b25ad13c87c7f73462074a535c5
SHA5125ed400186e27ea9893bb958776cb8bde056e1a219eace5210c5479f8e3348c025938beaa2552bb92a1e03b5a430531e86b0a1b5e4bacf898f6029600013290fc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838841.exeFilesize
175KB
MD59ce6e7a6598f5cad4e81ae9dc2ae3808
SHA1c397c34dac382bcb8e99a4cc6c1fecb0514c418e
SHA2565da065f735ef019742807391911b3acfd7df7b25ad13c87c7f73462074a535c5
SHA5125ed400186e27ea9893bb958776cb8bde056e1a219eace5210c5479f8e3348c025938beaa2552bb92a1e03b5a430531e86b0a1b5e4bacf898f6029600013290fc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEp6955.exeFilesize
379KB
MD5b71b86f26740dc2ff08832cb103a01e9
SHA148f6c8e46e13773a376ec0e594de5eba1e1cb080
SHA2567f0dc5c5f2f1a0694937d8f0433d1393b72a297b2b5f403a9dfc40d546368077
SHA5124340ee5fb127b63ed5ae89c54a1c2ad0a85853c7ae595a94588f231a90c3677ee7cc5fb2a657664a8ce14cae214557ddf5511decd17d0af710a5d9832565580e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEp6955.exeFilesize
379KB
MD5b71b86f26740dc2ff08832cb103a01e9
SHA148f6c8e46e13773a376ec0e594de5eba1e1cb080
SHA2567f0dc5c5f2f1a0694937d8f0433d1393b72a297b2b5f403a9dfc40d546368077
SHA5124340ee5fb127b63ed5ae89c54a1c2ad0a85853c7ae595a94588f231a90c3677ee7cc5fb2a657664a8ce14cae214557ddf5511decd17d0af710a5d9832565580e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743099.exeFilesize
11KB
MD592940af9d74ed745450c22c8e1292ca0
SHA1630e9d23b801de382a627490054666353dc7a8b0
SHA2561753d0d89d6a0b4fc3711c0b111c3c6510f5aa1780bbbcbb21c9def2b2d8900e
SHA5125bc0d59e091be0636d8c94c33473af895a2fdb0674c455e608f550d6a0b021cc5e2369af7e049aee1caf2fa9fc7d2fc2fdea51617e3c4045dbd2b65a0ccabd0f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743099.exeFilesize
11KB
MD592940af9d74ed745450c22c8e1292ca0
SHA1630e9d23b801de382a627490054666353dc7a8b0
SHA2561753d0d89d6a0b4fc3711c0b111c3c6510f5aa1780bbbcbb21c9def2b2d8900e
SHA5125bc0d59e091be0636d8c94c33473af895a2fdb0674c455e608f550d6a0b021cc5e2369af7e049aee1caf2fa9fc7d2fc2fdea51617e3c4045dbd2b65a0ccabd0f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku596150.exeFilesize
294KB
MD5398f8a7412f54da280b4d4e20ebfb819
SHA110e9254fa5e048cdd36b8a78e19fd5c9b7ceae66
SHA256bca452162965f0e800e2ce23ba31f370e938ad1f621032c7ede43aef9b83e2b3
SHA5127cf96edbdc64b4e8a0e547d142ad6914dad2d1afe21c12b702874c003d220b343f6e01ad0713088eaef26d72e45ae392068643759fead6ababc5f66552539fc5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku596150.exeFilesize
294KB
MD5398f8a7412f54da280b4d4e20ebfb819
SHA110e9254fa5e048cdd36b8a78e19fd5c9b7ceae66
SHA256bca452162965f0e800e2ce23ba31f370e938ad1f621032c7ede43aef9b83e2b3
SHA5127cf96edbdc64b4e8a0e547d142ad6914dad2d1afe21c12b702874c003d220b343f6e01ad0713088eaef26d72e45ae392068643759fead6ababc5f66552539fc5
-
memory/2028-1085-0x0000000000CF0000-0x0000000000D22000-memory.dmpFilesize
200KB
-
memory/2028-1086-0x0000000005570000-0x0000000005580000-memory.dmpFilesize
64KB
-
memory/4124-147-0x0000000000520000-0x000000000052A000-memory.dmpFilesize
40KB
-
memory/4704-189-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-201-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-154-0x0000000000630000-0x000000000067B000-memory.dmpFilesize
300KB
-
memory/4704-157-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-158-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-156-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-161-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-163-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-160-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-165-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-167-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-169-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-171-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-173-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-175-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-177-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-179-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-181-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-183-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-185-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-187-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-153-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/4704-191-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-193-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-195-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-197-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-199-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-155-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-203-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-205-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-207-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-209-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-211-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-213-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-215-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-217-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-219-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-221-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/4704-1064-0x00000000052D0000-0x00000000058E8000-memory.dmpFilesize
6.1MB
-
memory/4704-1065-0x00000000058F0000-0x00000000059FA000-memory.dmpFilesize
1.0MB
-
memory/4704-1066-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/4704-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4704-1068-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-1070-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-1071-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-1072-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4704-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4704-1075-0x00000000064B0000-0x0000000006526000-memory.dmpFilesize
472KB
-
memory/4704-1076-0x0000000006530000-0x0000000006580000-memory.dmpFilesize
320KB
-
memory/4704-1077-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4704-1078-0x00000000066E0000-0x00000000068A2000-memory.dmpFilesize
1.8MB
-
memory/4704-1079-0x00000000068B0000-0x0000000006DDC000-memory.dmpFilesize
5.2MB