Analysis
-
max time kernel
99s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:24
Static task
static1
Behavioral task
behavioral1
Sample
384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe
Resource
win10v2004-20230220-en
General
-
Target
384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe
-
Size
522KB
-
MD5
59e5946df8723d28ef834cd104826579
-
SHA1
ba88b5ff513422d8d2e60ec30c1e0fede7d38baf
-
SHA256
384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601
-
SHA512
4593f564c2c4c62bafef07832b3784d1ec34e81a77e7164ec6764965095a94caae833af8e8e4eaa5aef8f00ad1391f7b329e0f12de8e732efdbfe32c978b292d
-
SSDEEP
12288:IMrWy90pOvbDVhEN2ExbrRsvebSKb/Hl63dUqsu0r:uyrHA4+tsqSKzs3dU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr777320.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr777320.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr777320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr777320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr777320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr777320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr777320.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/2552-155-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-158-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-160-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-156-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-162-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-164-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-166-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-168-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-170-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-174-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-177-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-179-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-181-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-183-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-185-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-187-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-189-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-193-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-195-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-197-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp family_redline behavioral1/memory/2552-1073-0x0000000004AC0000-0x0000000004AD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziMs0771.exejr777320.exeku706196.exelr751923.exepid process 392 ziMs0771.exe 3116 jr777320.exe 2552 ku706196.exe 1608 lr751923.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr777320.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr777320.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziMs0771.exe384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMs0771.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziMs0771.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5092 2552 WerFault.exe ku706196.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
jr777320.exeku706196.exepid process 3116 jr777320.exe 3116 jr777320.exe 2552 ku706196.exe 2552 ku706196.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr777320.exeku706196.exedescription pid process Token: SeDebugPrivilege 3116 jr777320.exe Token: SeDebugPrivilege 2552 ku706196.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exeziMs0771.exedescription pid process target process PID 1520 wrote to memory of 392 1520 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe ziMs0771.exe PID 1520 wrote to memory of 392 1520 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe ziMs0771.exe PID 1520 wrote to memory of 392 1520 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe ziMs0771.exe PID 392 wrote to memory of 3116 392 ziMs0771.exe jr777320.exe PID 392 wrote to memory of 3116 392 ziMs0771.exe jr777320.exe PID 392 wrote to memory of 2552 392 ziMs0771.exe ku706196.exe PID 392 wrote to memory of 2552 392 ziMs0771.exe ku706196.exe PID 392 wrote to memory of 2552 392 ziMs0771.exe ku706196.exe PID 1520 wrote to memory of 1608 1520 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe lr751923.exe PID 1520 wrote to memory of 1608 1520 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe lr751923.exe PID 1520 wrote to memory of 1608 1520 384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe lr751923.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe"C:\Users\Admin\AppData\Local\Temp\384478f9d2595829cf30c069d86b2c7ed2ef0bdff6205cb70fa1bbe5ce0b2601.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMs0771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMs0771.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr777320.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr777320.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706196.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 15444⤵
- Program crash
PID:5092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr751923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr751923.exe2⤵
- Executes dropped EXE
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2552 -ip 25521⤵PID:1052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD594c9e04b9e1144aac31ba0444e5a8a3f
SHA10eadd922f3b7ff67ffacc9ec39106c5b7c039f4b
SHA2569bb5bc5db558c6767cb2d9607c793f6f5aa99fab49d0c277c388aa5a709b4439
SHA512c0dd7d0fd2364d27dd68287cf6051b35c13f68ab6bb3f4381befd73d0994a302719651b72145af2518855dd845d3bcd97de5cb88ffeec81d4924e4a780886766
-
Filesize
379KB
MD59244210a4a522c3487c46f0a7092ad02
SHA198f2ff7af46ff70272243ea59c4ad9fea9b72797
SHA2566211c5c9fb581a3c90a6c7fcbb4de1c0c2adcd5a60ef7877e9762b91b477ca7d
SHA512f27611282261680e90a61b354d484764d65cc330faec14feb8bf8e5917791f02611c2972f0f2ec1f5f5e2202837700eab0b8db925ef6040e9d3159bb7811f4b6
-
Filesize
379KB
MD59244210a4a522c3487c46f0a7092ad02
SHA198f2ff7af46ff70272243ea59c4ad9fea9b72797
SHA2566211c5c9fb581a3c90a6c7fcbb4de1c0c2adcd5a60ef7877e9762b91b477ca7d
SHA512f27611282261680e90a61b354d484764d65cc330faec14feb8bf8e5917791f02611c2972f0f2ec1f5f5e2202837700eab0b8db925ef6040e9d3159bb7811f4b6
-
Filesize
11KB
MD5615810407dc112e860fea1ea461d0374
SHA149c57e14e4ae44e69f3d9324b982df3de4aea2ba
SHA2567bc5a078b412273d275ff9280228e3dc1379b8a6880f2cf2aa8ba1e4da2ffb31
SHA5125f4c1db527cbeb4b846677202f0cb014909bb9919025777c949e9658771c2ea0f37a4d6251e393db8964f994580003ce8bcca5fe4adb4be8b67d23982b9f2790
-
Filesize
11KB
MD5615810407dc112e860fea1ea461d0374
SHA149c57e14e4ae44e69f3d9324b982df3de4aea2ba
SHA2567bc5a078b412273d275ff9280228e3dc1379b8a6880f2cf2aa8ba1e4da2ffb31
SHA5125f4c1db527cbeb4b846677202f0cb014909bb9919025777c949e9658771c2ea0f37a4d6251e393db8964f994580003ce8bcca5fe4adb4be8b67d23982b9f2790
-
Filesize
294KB
MD51f54df50bf5edf34226112127f5b3499
SHA171ea2c906a078552d896f43da8e0a49e89221649
SHA2568927f3e5221573b08575f93fb3b831754749ce7868670be2c24daad8149bd67e
SHA51287d2d7f2e6a5ecdff19eeb9ec6da8fae0ed293a132109a60c4ab644cdbded09886bb0046ab28fc032a277d175f7f6f8b237952fc237fde552f26f2eb1ab653f7
-
Filesize
294KB
MD51f54df50bf5edf34226112127f5b3499
SHA171ea2c906a078552d896f43da8e0a49e89221649
SHA2568927f3e5221573b08575f93fb3b831754749ce7868670be2c24daad8149bd67e
SHA51287d2d7f2e6a5ecdff19eeb9ec6da8fae0ed293a132109a60c4ab644cdbded09886bb0046ab28fc032a277d175f7f6f8b237952fc237fde552f26f2eb1ab653f7