Analysis
-
max time kernel
96s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:30
Static task
static1
Behavioral task
behavioral1
Sample
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe
Resource
win10v2004-20230221-en
General
-
Target
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe
-
Size
522KB
-
MD5
01dc49dd13f3d6f575794972d0a03f65
-
SHA1
cba7c2b575766c5320a1c2bbf155c4dbc0ea3384
-
SHA256
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901
-
SHA512
d97b8b0ae3f2b086ea5bb6b8411e417964c7b84ea987213ffea229505641cf892b5de281f2475c9ac99765cb9d3e65f61581f1c38aea6e1cd15881bd92f85cde
-
SSDEEP
12288:PMrZy903EO/AGuxUHYoksH8av42XzWKH2uv+TH9:SyKEOvaaw2SKG79
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr747600.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr747600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr747600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr747600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr747600.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr747600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr747600.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-155-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-156-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-158-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-160-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-162-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-164-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-166-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-168-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-170-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-172-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-179-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-177-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-181-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-183-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-185-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-187-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-189-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-191-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-195-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-193-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-197-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-199-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-201-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-203-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-205-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-207-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-209-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-211-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-213-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-215-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-217-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-219-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/2112-221-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zisU5521.exejr747600.exeku314540.exelr555743.exepid process 1792 zisU5521.exe 2116 jr747600.exe 2112 ku314540.exe 4736 lr555743.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr747600.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr747600.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zisU5521.exee628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisU5521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisU5521.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1328 2112 WerFault.exe ku314540.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr747600.exeku314540.exelr555743.exepid process 2116 jr747600.exe 2116 jr747600.exe 2112 ku314540.exe 2112 ku314540.exe 4736 lr555743.exe 4736 lr555743.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr747600.exeku314540.exelr555743.exedescription pid process Token: SeDebugPrivilege 2116 jr747600.exe Token: SeDebugPrivilege 2112 ku314540.exe Token: SeDebugPrivilege 4736 lr555743.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exezisU5521.exedescription pid process target process PID 3100 wrote to memory of 1792 3100 e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe zisU5521.exe PID 3100 wrote to memory of 1792 3100 e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe zisU5521.exe PID 3100 wrote to memory of 1792 3100 e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe zisU5521.exe PID 1792 wrote to memory of 2116 1792 zisU5521.exe jr747600.exe PID 1792 wrote to memory of 2116 1792 zisU5521.exe jr747600.exe PID 1792 wrote to memory of 2112 1792 zisU5521.exe ku314540.exe PID 1792 wrote to memory of 2112 1792 zisU5521.exe ku314540.exe PID 1792 wrote to memory of 2112 1792 zisU5521.exe ku314540.exe PID 3100 wrote to memory of 4736 3100 e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe lr555743.exe PID 3100 wrote to memory of 4736 3100 e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe lr555743.exe PID 3100 wrote to memory of 4736 3100 e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe lr555743.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe"C:\Users\Admin\AppData\Local\Temp\e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisU5521.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisU5521.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747600.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747600.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku314540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku314540.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 18004⤵
- Program crash
PID:1328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555743.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2112 -ip 21121⤵PID:3712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efbf7da03d06329828ccf65bdc4489cd
SHA117efa0a4b0a5c6afffd49b87f7c15c4490d842d4
SHA256495eb3a655bef6f503be029e0348050d9dddff1f03adcfda54f0a10b3379df0d
SHA51298509d9432fe4cb8c5bf93f667ba54b95a3e6d31a8f756f2f5c7a92232a5fc9367d411686bc8b662e12431fecda47defc61031b3bfcf3947a60cf105c59cce4d
-
Filesize
175KB
MD5efbf7da03d06329828ccf65bdc4489cd
SHA117efa0a4b0a5c6afffd49b87f7c15c4490d842d4
SHA256495eb3a655bef6f503be029e0348050d9dddff1f03adcfda54f0a10b3379df0d
SHA51298509d9432fe4cb8c5bf93f667ba54b95a3e6d31a8f756f2f5c7a92232a5fc9367d411686bc8b662e12431fecda47defc61031b3bfcf3947a60cf105c59cce4d
-
Filesize
380KB
MD5eddea4559a30764c1b41016aa197ff87
SHA12d1de509c3c5b8a1e4fca8b9b5ddc4b3aa2c330e
SHA25680a6612177ceb4340f4406601f1777b0a0895e6f6786db5453f7e5ed1a66f446
SHA512c184b38ed7ca50514ba9143e856842397e63109e8092d2220af2dbc42dcb427f50d4ef525cb0b03cd6d33039c465108d975ff74def9f4fac2e1bb1949c9d9ccd
-
Filesize
380KB
MD5eddea4559a30764c1b41016aa197ff87
SHA12d1de509c3c5b8a1e4fca8b9b5ddc4b3aa2c330e
SHA25680a6612177ceb4340f4406601f1777b0a0895e6f6786db5453f7e5ed1a66f446
SHA512c184b38ed7ca50514ba9143e856842397e63109e8092d2220af2dbc42dcb427f50d4ef525cb0b03cd6d33039c465108d975ff74def9f4fac2e1bb1949c9d9ccd
-
Filesize
11KB
MD5d4d85643b7fac92d62acadf7b6f62310
SHA149f17fec10ce02b6f26635e1366661e5d92cdf4e
SHA256bb9ded5e3e79f1ba1c44e9f7f2a802a0fbad93c867b83aaae439578efd65ece1
SHA512364b640f8221fde7ab0865053406d468893b017f3ca5af54d2d9b08c4fecae5f9d1c53a9117baa392b02079727a30b3c251c41026d970198a918dc3c45c98f4f
-
Filesize
11KB
MD5d4d85643b7fac92d62acadf7b6f62310
SHA149f17fec10ce02b6f26635e1366661e5d92cdf4e
SHA256bb9ded5e3e79f1ba1c44e9f7f2a802a0fbad93c867b83aaae439578efd65ece1
SHA512364b640f8221fde7ab0865053406d468893b017f3ca5af54d2d9b08c4fecae5f9d1c53a9117baa392b02079727a30b3c251c41026d970198a918dc3c45c98f4f
-
Filesize
294KB
MD5d3e7b49b3e084595f11b08bad4ab8542
SHA1b349ecc1261a1fada04e9a2994e69dafd3cb113e
SHA256e000219006d35e56cf56f8d1576f2e11e817b96b946be114966fd30eacdb0d34
SHA512f49ba6c452cc6f7fcfa6a518510df7e619f8c3007bbd852fdf2294bb3652c1f7b0b3171c5c37c9013b8dfbdb932c27c800c097dc9e6390b88fd9102b8a35320e
-
Filesize
294KB
MD5d3e7b49b3e084595f11b08bad4ab8542
SHA1b349ecc1261a1fada04e9a2994e69dafd3cb113e
SHA256e000219006d35e56cf56f8d1576f2e11e817b96b946be114966fd30eacdb0d34
SHA512f49ba6c452cc6f7fcfa6a518510df7e619f8c3007bbd852fdf2294bb3652c1f7b0b3171c5c37c9013b8dfbdb932c27c800c097dc9e6390b88fd9102b8a35320e