Analysis
-
max time kernel
73s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe
Resource
win10v2004-20230221-en
General
-
Target
1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe
-
Size
521KB
-
MD5
094b72230e7974393c2f890ddb9726c7
-
SHA1
6fa3bb6bd4b358cb9e19d59474f0c98896022f8b
-
SHA256
1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665
-
SHA512
8bff963ef58a9c5ed5673cb2d35a59b361af2333b62f59a494585d98978e219c3c4dba5c34f04e2a11beb1f03268d909372c245e92ffc1c030a8b599bb78c21e
-
SSDEEP
6144:KXy+bnr+zp0yN90QE4Bq6AycDcrw0pKLC29Tb4Abf661pngy+N0Jpil6mevvVXiQ:ZMr7y90ysxEMCdoC+gbKel6Pz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr721163.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr721163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr721163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr721163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr721163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr721163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr721163.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2708-157-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-160-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-158-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-162-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-164-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-166-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-168-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-170-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-172-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-174-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-176-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-178-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-182-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-185-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-187-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-191-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-189-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-193-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-195-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-197-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-199-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-201-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-203-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-205-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-207-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-209-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-211-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-213-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-215-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-217-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-219-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-221-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2708-1076-0x0000000004B30000-0x0000000004B40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziCH2238.exejr721163.exeku003860.exelr110456.exepid process 5012 ziCH2238.exe 4920 jr721163.exe 2708 ku003860.exe 5096 lr110456.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr721163.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr721163.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exeziCH2238.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziCH2238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCH2238.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5036 2708 WerFault.exe ku003860.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr721163.exeku003860.exelr110456.exepid process 4920 jr721163.exe 4920 jr721163.exe 2708 ku003860.exe 2708 ku003860.exe 5096 lr110456.exe 5096 lr110456.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr721163.exeku003860.exelr110456.exedescription pid process Token: SeDebugPrivilege 4920 jr721163.exe Token: SeDebugPrivilege 2708 ku003860.exe Token: SeDebugPrivilege 5096 lr110456.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exeziCH2238.exedescription pid process target process PID 4124 wrote to memory of 5012 4124 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe ziCH2238.exe PID 4124 wrote to memory of 5012 4124 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe ziCH2238.exe PID 4124 wrote to memory of 5012 4124 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe ziCH2238.exe PID 5012 wrote to memory of 4920 5012 ziCH2238.exe jr721163.exe PID 5012 wrote to memory of 4920 5012 ziCH2238.exe jr721163.exe PID 5012 wrote to memory of 2708 5012 ziCH2238.exe ku003860.exe PID 5012 wrote to memory of 2708 5012 ziCH2238.exe ku003860.exe PID 5012 wrote to memory of 2708 5012 ziCH2238.exe ku003860.exe PID 4124 wrote to memory of 5096 4124 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe lr110456.exe PID 4124 wrote to memory of 5096 4124 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe lr110456.exe PID 4124 wrote to memory of 5096 4124 1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe lr110456.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe"C:\Users\Admin\AppData\Local\Temp\1ec3fa6f7556cccde4508a39fc05c0b37cc05b85a359f4b8533b62d3e434c665.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCH2238.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCH2238.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr721163.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr721163.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku003860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku003860.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 15084⤵
- Program crash
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr110456.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr110456.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2708 -ip 27081⤵PID:4448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr110456.exeFilesize
175KB
MD56142e13cc58e7b1f975b6a5c85337c2b
SHA1bb526a95fd23276a2fa73f341332f03b5427d44c
SHA2564785a9966b3a2c38306bb165d30ae9c4ffdfdd8ffe2c34c5e9dacf5acbfc27f1
SHA51254294bcbc0da7cc73d82855ab32ebb6b1ff9d3f2a304d9cf3922ec5440cea941e847099725a386c3c9e9947ec39b7bd2db38f261a202ce2ed00fdb69cfb0cb1e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr110456.exeFilesize
175KB
MD56142e13cc58e7b1f975b6a5c85337c2b
SHA1bb526a95fd23276a2fa73f341332f03b5427d44c
SHA2564785a9966b3a2c38306bb165d30ae9c4ffdfdd8ffe2c34c5e9dacf5acbfc27f1
SHA51254294bcbc0da7cc73d82855ab32ebb6b1ff9d3f2a304d9cf3922ec5440cea941e847099725a386c3c9e9947ec39b7bd2db38f261a202ce2ed00fdb69cfb0cb1e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCH2238.exeFilesize
379KB
MD5d96684a2e45a469b9a27f228646b192d
SHA1bb0295b2166cd8f801e1f4c8d219bb36bc286cbc
SHA256431813ea017d75e7a08b6d288cb242bef5e3446305a61bcd937ad579ece474b0
SHA5124559ced5bb35a0da64abc722575818fbbaa1a883f52744273e57dcc4a472ab468a5756a865e40fca69fc8016120566bf06940fe7bf7405e08144289915ada1b0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCH2238.exeFilesize
379KB
MD5d96684a2e45a469b9a27f228646b192d
SHA1bb0295b2166cd8f801e1f4c8d219bb36bc286cbc
SHA256431813ea017d75e7a08b6d288cb242bef5e3446305a61bcd937ad579ece474b0
SHA5124559ced5bb35a0da64abc722575818fbbaa1a883f52744273e57dcc4a472ab468a5756a865e40fca69fc8016120566bf06940fe7bf7405e08144289915ada1b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr721163.exeFilesize
11KB
MD5d770c7bc8f671371883dd453989735a3
SHA10fe95fb8a56747d639b67e03cf1ceed9aaab8af1
SHA25624d702a270e77a14f0a3889f4183286536edf9956f222f0a9c39d7a4676d7d68
SHA5125fe34286075540ab526529c5e5b79e20ace3f21b265094bee2b8be50bc3189b750f1117a851fe8fa6d660fc5186e29fa8966d5d236ca436c7cb565eee43b5a8d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr721163.exeFilesize
11KB
MD5d770c7bc8f671371883dd453989735a3
SHA10fe95fb8a56747d639b67e03cf1ceed9aaab8af1
SHA25624d702a270e77a14f0a3889f4183286536edf9956f222f0a9c39d7a4676d7d68
SHA5125fe34286075540ab526529c5e5b79e20ace3f21b265094bee2b8be50bc3189b750f1117a851fe8fa6d660fc5186e29fa8966d5d236ca436c7cb565eee43b5a8d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku003860.exeFilesize
294KB
MD5d2cdad96791a9ae3a5c4d1d493da4bf1
SHA1330210fd17c2ac37169c89a68c4ce0d8172834f9
SHA2562a267c377566941b84205966b6509593bd19a1249d7fc4b0c54259a2c16e11c2
SHA5126f702c99ace73b8e976adc566cacd71647c6bd4807f7e1a4355ff7a7990206e3c201547c5bddb7444dd1c6c8030ef263a618a07c4306476fe42c40a34892299e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku003860.exeFilesize
294KB
MD5d2cdad96791a9ae3a5c4d1d493da4bf1
SHA1330210fd17c2ac37169c89a68c4ce0d8172834f9
SHA2562a267c377566941b84205966b6509593bd19a1249d7fc4b0c54259a2c16e11c2
SHA5126f702c99ace73b8e976adc566cacd71647c6bd4807f7e1a4355ff7a7990206e3c201547c5bddb7444dd1c6c8030ef263a618a07c4306476fe42c40a34892299e
-
memory/2708-197-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-207-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-157-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-160-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-158-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-162-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-164-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-166-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-168-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-170-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-172-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-174-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-176-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-178-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-179-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-183-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-181-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-182-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-185-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-187-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-191-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-189-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-193-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-195-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-155-0x0000000000770000-0x00000000007BB000-memory.dmpFilesize
300KB
-
memory/2708-199-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-201-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-203-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-205-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-156-0x0000000004B40000-0x00000000050E4000-memory.dmpFilesize
5.6MB
-
memory/2708-209-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-211-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-213-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-215-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-217-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-219-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-221-0x0000000004AD0000-0x0000000004B0F000-memory.dmpFilesize
252KB
-
memory/2708-1066-0x0000000005230000-0x0000000005848000-memory.dmpFilesize
6.1MB
-
memory/2708-1067-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/2708-1068-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/2708-1069-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-1070-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/2708-1072-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/2708-1073-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/2708-1074-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-1075-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-1076-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-1077-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/2708-1078-0x0000000006620000-0x0000000006670000-memory.dmpFilesize
320KB
-
memory/2708-1079-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/2708-1080-0x0000000006810000-0x00000000069D2000-memory.dmpFilesize
1.8MB
-
memory/2708-1081-0x00000000069E0000-0x0000000006F0C000-memory.dmpFilesize
5.2MB
-
memory/4920-147-0x0000000000BB0000-0x0000000000BBA000-memory.dmpFilesize
40KB
-
memory/4920-148-0x000000001B6D0000-0x000000001B81E000-memory.dmpFilesize
1.3MB
-
memory/4920-150-0x000000001B6D0000-0x000000001B81E000-memory.dmpFilesize
1.3MB
-
memory/5096-1087-0x0000000000320000-0x0000000000352000-memory.dmpFilesize
200KB
-
memory/5096-1088-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB