Analysis
-
max time kernel
64s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe
Resource
win10v2004-20230220-en
General
-
Target
dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe
-
Size
522KB
-
MD5
d87d95a95c56d34059e92f5f74bc36c7
-
SHA1
cdcd89fa898f468c648415a00e059fd0666e3397
-
SHA256
dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3
-
SHA512
5347d153f8f431e728e7450b3ca3440d0f59a4be1664ecf24adadd883ea043e229e2b4d7c6d3ef6a1934e8cf6adb625c2ba1bae5bbf770bed2fddebb0f1cf552
-
SSDEEP
12288:QMrly90IMiIv1nyZ2M4KLnmBbugl6c2rWFR:ly5MJyZ7mBhsiFR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr435420.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr435420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr435420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr435420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr435420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr435420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr435420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4024-158-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-159-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-161-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-163-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-165-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-167-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-169-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-171-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-173-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-175-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-177-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-179-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-181-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-183-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-185-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-187-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-189-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-191-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-193-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-195-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-197-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-199-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-201-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-203-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-205-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-207-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-209-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-211-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-213-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-215-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-217-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-219-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline behavioral1/memory/4024-221-0x0000000002590000-0x00000000025CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziaD0887.exejr435420.exeku448437.exelr507636.exepid process 4792 ziaD0887.exe 2528 jr435420.exe 4024 ku448437.exe 4600 lr507636.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr435420.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr435420.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exeziaD0887.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziaD0887.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziaD0887.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4592 4024 WerFault.exe ku448437.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr435420.exeku448437.exelr507636.exepid process 2528 jr435420.exe 2528 jr435420.exe 4024 ku448437.exe 4024 ku448437.exe 4600 lr507636.exe 4600 lr507636.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr435420.exeku448437.exelr507636.exedescription pid process Token: SeDebugPrivilege 2528 jr435420.exe Token: SeDebugPrivilege 4024 ku448437.exe Token: SeDebugPrivilege 4600 lr507636.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exeziaD0887.exedescription pid process target process PID 4296 wrote to memory of 4792 4296 dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe ziaD0887.exe PID 4296 wrote to memory of 4792 4296 dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe ziaD0887.exe PID 4296 wrote to memory of 4792 4296 dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe ziaD0887.exe PID 4792 wrote to memory of 2528 4792 ziaD0887.exe jr435420.exe PID 4792 wrote to memory of 2528 4792 ziaD0887.exe jr435420.exe PID 4792 wrote to memory of 4024 4792 ziaD0887.exe ku448437.exe PID 4792 wrote to memory of 4024 4792 ziaD0887.exe ku448437.exe PID 4792 wrote to memory of 4024 4792 ziaD0887.exe ku448437.exe PID 4296 wrote to memory of 4600 4296 dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe lr507636.exe PID 4296 wrote to memory of 4600 4296 dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe lr507636.exe PID 4296 wrote to memory of 4600 4296 dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe lr507636.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe"C:\Users\Admin\AppData\Local\Temp\dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 18604⤵
- Program crash
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4024 -ip 40241⤵PID:5080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exeFilesize
175KB
MD538ffc81e84dbd3d92ee4626f71e70878
SHA1aa4b757b380a46e3c0eb9bfa1a4b113e5891f898
SHA2566d3a9b7a45765082d7bf1591563c6e1afeabe1d673eb2c358b577d6600b06d12
SHA512dc4d922896140fd7d5ac0c104397adbde54a554f79ea38c3c111a4bfee43d23778d9d623338cb6d7a401c0f9003116049caf73431319417ffc7bd8ee8bb27612
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exeFilesize
175KB
MD538ffc81e84dbd3d92ee4626f71e70878
SHA1aa4b757b380a46e3c0eb9bfa1a4b113e5891f898
SHA2566d3a9b7a45765082d7bf1591563c6e1afeabe1d673eb2c358b577d6600b06d12
SHA512dc4d922896140fd7d5ac0c104397adbde54a554f79ea38c3c111a4bfee43d23778d9d623338cb6d7a401c0f9003116049caf73431319417ffc7bd8ee8bb27612
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exeFilesize
379KB
MD5d33bdcb6e291240ad6c8b4c619f37055
SHA129ff196d83fe93faa93aa2ffb0388f245f9c5263
SHA256b7bf5fe39ffea94c918ae84c69a726ebaaa040590f8b2a1ca12a641887153c6d
SHA512ffaa74314e9b5e582ad9c2d0e2ee4d07cff447f6e0b95f61ba9ebd0052a95614001c9ef133b44c450504eb6da86ae9fe307c63048622f54bacec7e04a9fcce64
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exeFilesize
379KB
MD5d33bdcb6e291240ad6c8b4c619f37055
SHA129ff196d83fe93faa93aa2ffb0388f245f9c5263
SHA256b7bf5fe39ffea94c918ae84c69a726ebaaa040590f8b2a1ca12a641887153c6d
SHA512ffaa74314e9b5e582ad9c2d0e2ee4d07cff447f6e0b95f61ba9ebd0052a95614001c9ef133b44c450504eb6da86ae9fe307c63048622f54bacec7e04a9fcce64
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exeFilesize
11KB
MD54d71ecf8aade0e6f8b129593ac3ad598
SHA1e2a8053e910c4a6a0f33f1e192b0089782716212
SHA2562948fd08e50a6641950acb3f99f2214bdd51ed1048a30b8db46674c487fea607
SHA51255bbafb3ca1f4df88dde30aed7deda763c9a83dfaaabb13329da44642d6d8210996092caacb6add997fc1b01026679a6b327f67805a0141e87fa92405d28ce8c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exeFilesize
11KB
MD54d71ecf8aade0e6f8b129593ac3ad598
SHA1e2a8053e910c4a6a0f33f1e192b0089782716212
SHA2562948fd08e50a6641950acb3f99f2214bdd51ed1048a30b8db46674c487fea607
SHA51255bbafb3ca1f4df88dde30aed7deda763c9a83dfaaabb13329da44642d6d8210996092caacb6add997fc1b01026679a6b327f67805a0141e87fa92405d28ce8c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exeFilesize
294KB
MD50b19b8de64aab6e4a99392679f83bb82
SHA1fe226c6527be7e3efabe8d8cbd3a9e0aa68ea608
SHA2567ff9fa1ef9a71f2ee665a79030d5d5b7573794842245fae5f4d43f731dbf7ef5
SHA51242e43dabf49e8be5c11039e04885107f9f6fec9861eaa15a66b45f09dd6d7e29d7c63b1f13696eee5df0b2645bf8507963f63d6f34d51ef2a005518223fead5d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exeFilesize
294KB
MD50b19b8de64aab6e4a99392679f83bb82
SHA1fe226c6527be7e3efabe8d8cbd3a9e0aa68ea608
SHA2567ff9fa1ef9a71f2ee665a79030d5d5b7573794842245fae5f4d43f731dbf7ef5
SHA51242e43dabf49e8be5c11039e04885107f9f6fec9861eaa15a66b45f09dd6d7e29d7c63b1f13696eee5df0b2645bf8507963f63d6f34d51ef2a005518223fead5d
-
memory/2528-147-0x00000000000F0000-0x00000000000FA000-memory.dmpFilesize
40KB
-
memory/4024-153-0x0000000004CD0000-0x0000000005274000-memory.dmpFilesize
5.6MB
-
memory/4024-154-0x0000000000760000-0x00000000007AB000-memory.dmpFilesize
300KB
-
memory/4024-155-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4024-156-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4024-157-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4024-158-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-159-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-161-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-163-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-165-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-167-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-169-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-171-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-173-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-175-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-177-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-179-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-181-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-183-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-185-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-187-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-189-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-191-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-193-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-195-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-197-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-199-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-201-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-203-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-205-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-207-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-209-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-211-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-213-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-215-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-217-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-219-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-221-0x0000000002590000-0x00000000025CF000-memory.dmpFilesize
252KB
-
memory/4024-1064-0x0000000005280000-0x0000000005898000-memory.dmpFilesize
6.1MB
-
memory/4024-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4024-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4024-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4024-1068-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4024-1070-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4024-1071-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4024-1072-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4024-1073-0x00000000063C0000-0x0000000006452000-memory.dmpFilesize
584KB
-
memory/4024-1074-0x0000000006480000-0x00000000064F6000-memory.dmpFilesize
472KB
-
memory/4024-1075-0x0000000006520000-0x0000000006570000-memory.dmpFilesize
320KB
-
memory/4024-1076-0x0000000006690000-0x0000000006852000-memory.dmpFilesize
1.8MB
-
memory/4024-1077-0x0000000006870000-0x0000000006D9C000-memory.dmpFilesize
5.2MB
-
memory/4024-1078-0x0000000002280000-0x0000000002290000-memory.dmpFilesize
64KB
-
memory/4600-1084-0x0000000000010000-0x0000000000042000-memory.dmpFilesize
200KB
-
memory/4600-1085-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB