Analysis
-
max time kernel
104s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:03
Static task
static1
Behavioral task
behavioral1
Sample
d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe
Resource
win10v2004-20230220-en
General
-
Target
d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe
-
Size
521KB
-
MD5
3fa79f8ab0208cf3ff5d5248c4e31fb2
-
SHA1
d7b96f78bf2c6c1914cdff318b8e3eacfce9877e
-
SHA256
d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc
-
SHA512
fff7ee9f7cf888e88e3b62c048355d804540711029b290b673baf5368c2cb733704ddbca01a309e3811735e5c0fd047c9c41189a2dfa96528c041c8a750300d9
-
SSDEEP
12288:hMrIy90nOBC5A7F+2iz7pgP9RJCHWHIQ:9yAd73IRIkr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr094513.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr094513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr094513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr094513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr094513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr094513.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr094513.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/216-155-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-156-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-159-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-163-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-165-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-167-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-169-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-171-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-173-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-175-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-177-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-179-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-181-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-185-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-183-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-187-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-189-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-193-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-197-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-213-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-215-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-219-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/216-221-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziDO4510.exejr094513.exeku699023.exelr849974.exepid process 1428 ziDO4510.exe 4236 jr094513.exe 216 ku699023.exe 3916 lr849974.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr094513.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr094513.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exeziDO4510.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDO4510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDO4510.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4532 216 WerFault.exe ku699023.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr094513.exeku699023.exelr849974.exepid process 4236 jr094513.exe 4236 jr094513.exe 216 ku699023.exe 216 ku699023.exe 3916 lr849974.exe 3916 lr849974.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr094513.exeku699023.exelr849974.exedescription pid process Token: SeDebugPrivilege 4236 jr094513.exe Token: SeDebugPrivilege 216 ku699023.exe Token: SeDebugPrivilege 3916 lr849974.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exeziDO4510.exedescription pid process target process PID 3656 wrote to memory of 1428 3656 d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe ziDO4510.exe PID 3656 wrote to memory of 1428 3656 d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe ziDO4510.exe PID 3656 wrote to memory of 1428 3656 d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe ziDO4510.exe PID 1428 wrote to memory of 4236 1428 ziDO4510.exe jr094513.exe PID 1428 wrote to memory of 4236 1428 ziDO4510.exe jr094513.exe PID 1428 wrote to memory of 216 1428 ziDO4510.exe ku699023.exe PID 1428 wrote to memory of 216 1428 ziDO4510.exe ku699023.exe PID 1428 wrote to memory of 216 1428 ziDO4510.exe ku699023.exe PID 3656 wrote to memory of 3916 3656 d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe lr849974.exe PID 3656 wrote to memory of 3916 3656 d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe lr849974.exe PID 3656 wrote to memory of 3916 3656 d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe lr849974.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe"C:\Users\Admin\AppData\Local\Temp\d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 216 -ip 2161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exeFilesize
175KB
MD5822a9d0bc06867e689fada55a1c628a2
SHA15ffe634acd550b8c65b9c979306a928d4d1fa7cf
SHA256009fba38b924ad5fa99ba3b7858fedb0d574030c1ae205145bf90478e3f5404b
SHA5129af86c4149d9bd868ed1ae6244b8db85e3c3c77549dc66cd5750543e3013f07b25d62ce3766c650084fba1c9b3c986b1dab9008ee18637c7a95eb715209f141d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exeFilesize
175KB
MD5822a9d0bc06867e689fada55a1c628a2
SHA15ffe634acd550b8c65b9c979306a928d4d1fa7cf
SHA256009fba38b924ad5fa99ba3b7858fedb0d574030c1ae205145bf90478e3f5404b
SHA5129af86c4149d9bd868ed1ae6244b8db85e3c3c77549dc66cd5750543e3013f07b25d62ce3766c650084fba1c9b3c986b1dab9008ee18637c7a95eb715209f141d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exeFilesize
379KB
MD52fb979922db37d4c461e3ae6a9dc53e2
SHA16ec97bfcb558427a56fc1d97b7c02ab2a749b50d
SHA256219d401f8781d49f667c7a646f23c255b87cdfbff9adc6642c928021cb9f349e
SHA512c3ac1cc245a508c14c0f2983e7f4fc103fe2c313490181896798fc5e88b7a4cba62184d103d56d8a2d170e595ed24cc1798f767c871c5c6e6fd20772fc91ee6f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exeFilesize
379KB
MD52fb979922db37d4c461e3ae6a9dc53e2
SHA16ec97bfcb558427a56fc1d97b7c02ab2a749b50d
SHA256219d401f8781d49f667c7a646f23c255b87cdfbff9adc6642c928021cb9f349e
SHA512c3ac1cc245a508c14c0f2983e7f4fc103fe2c313490181896798fc5e88b7a4cba62184d103d56d8a2d170e595ed24cc1798f767c871c5c6e6fd20772fc91ee6f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exeFilesize
11KB
MD54e4f55b1289a76e35a501f79c9202d30
SHA10f097b8bf3124bc9fc5a79490a2f375d12befb0c
SHA256a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4
SHA5126a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exeFilesize
11KB
MD54e4f55b1289a76e35a501f79c9202d30
SHA10f097b8bf3124bc9fc5a79490a2f375d12befb0c
SHA256a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4
SHA5126a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exeFilesize
294KB
MD580f3b7080f82c11c23da9a9969fdc97d
SHA1e9cd738f5576411c75e181ff90267dc9d9d7357b
SHA256fe534eec3c370a6191661d508792ab67a3ca9efd4c8e7c2f41518c1ab012a2f4
SHA512931385b928f8bbd787186d3485993546ca89ec8ae861768e0f741d5cf00e06e5a32d47ef4e681b7635976de3a8f8c12b06b60adc457181e6ee39648da93297c2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exeFilesize
294KB
MD580f3b7080f82c11c23da9a9969fdc97d
SHA1e9cd738f5576411c75e181ff90267dc9d9d7357b
SHA256fe534eec3c370a6191661d508792ab67a3ca9efd4c8e7c2f41518c1ab012a2f4
SHA512931385b928f8bbd787186d3485993546ca89ec8ae861768e0f741d5cf00e06e5a32d47ef4e681b7635976de3a8f8c12b06b60adc457181e6ee39648da93297c2
-
memory/216-153-0x0000000002010000-0x000000000205B000-memory.dmpFilesize
300KB
-
memory/216-154-0x0000000004C80000-0x0000000005224000-memory.dmpFilesize
5.6MB
-
memory/216-155-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-156-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-158-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-160-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-159-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-162-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-163-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-165-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-167-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-169-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-171-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-173-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-175-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-177-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-179-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-181-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-185-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-183-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-187-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-189-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-191-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-193-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-195-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-197-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-199-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-201-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-203-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-205-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-207-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-209-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-211-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-213-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-215-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-217-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-219-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-221-0x0000000004A90000-0x0000000004ACF000-memory.dmpFilesize
252KB
-
memory/216-1064-0x0000000005230000-0x0000000005848000-memory.dmpFilesize
6.1MB
-
memory/216-1065-0x0000000005850000-0x000000000595A000-memory.dmpFilesize
1.0MB
-
memory/216-1066-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/216-1067-0x0000000004BD0000-0x0000000004C0C000-memory.dmpFilesize
240KB
-
memory/216-1068-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-1070-0x0000000002010000-0x000000000205B000-memory.dmpFilesize
300KB
-
memory/216-1071-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/216-1072-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/216-1073-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-1074-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-1075-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-1076-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/216-1077-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/216-1078-0x0000000004C70000-0x0000000004C80000-memory.dmpFilesize
64KB
-
memory/216-1079-0x00000000066B0000-0x0000000006872000-memory.dmpFilesize
1.8MB
-
memory/216-1080-0x0000000006880000-0x0000000006DAC000-memory.dmpFilesize
5.2MB
-
memory/3916-1086-0x0000000000070000-0x00000000000A2000-memory.dmpFilesize
200KB
-
memory/3916-1087-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/3916-1089-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/4236-147-0x0000000000750000-0x000000000075A000-memory.dmpFilesize
40KB