Analysis
-
max time kernel
57s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe
Resource
win10v2004-20230221-en
General
-
Target
4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe
-
Size
521KB
-
MD5
9bd6a6327ac1d577bc95444e228d67e4
-
SHA1
27ef4578fed1b5cb0ab39867908cd0022ec6034a
-
SHA256
4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f
-
SHA512
74b9980e719813a10ca341ffe0abdf9b8d298c7253ef05e4043567e58859d87d44f3945d1194a423e898d1342cafed74968307bf00f20e69e3c647d17756f4ea
-
SSDEEP
6144:KYy+bnr+3p0yN90QEUvTMIyCr0IzMc0uPkzzf9LUKg74qbfa61LpWJoSD5YV3Sce:EMrfy90ObdF1sffNVg0+S8Y2V3Sce
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr391924.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr391924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr391924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr391924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr391924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr391924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr391924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-158-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-159-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-163-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-161-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-165-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-167-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-169-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-171-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-173-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-175-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-177-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-213-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-215-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-217-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/1700-221-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziWC6048.exejr391924.exeku695490.exelr098024.exepid process 492 ziWC6048.exe 4480 jr391924.exe 1700 ku695490.exe 3748 lr098024.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr391924.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr391924.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exeziWC6048.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWC6048.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWC6048.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4252 1700 WerFault.exe ku695490.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr391924.exeku695490.exelr098024.exepid process 4480 jr391924.exe 4480 jr391924.exe 1700 ku695490.exe 1700 ku695490.exe 3748 lr098024.exe 3748 lr098024.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr391924.exeku695490.exelr098024.exedescription pid process Token: SeDebugPrivilege 4480 jr391924.exe Token: SeDebugPrivilege 1700 ku695490.exe Token: SeDebugPrivilege 3748 lr098024.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exeziWC6048.exedescription pid process target process PID 4700 wrote to memory of 492 4700 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe ziWC6048.exe PID 4700 wrote to memory of 492 4700 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe ziWC6048.exe PID 4700 wrote to memory of 492 4700 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe ziWC6048.exe PID 492 wrote to memory of 4480 492 ziWC6048.exe jr391924.exe PID 492 wrote to memory of 4480 492 ziWC6048.exe jr391924.exe PID 492 wrote to memory of 1700 492 ziWC6048.exe ku695490.exe PID 492 wrote to memory of 1700 492 ziWC6048.exe ku695490.exe PID 492 wrote to memory of 1700 492 ziWC6048.exe ku695490.exe PID 4700 wrote to memory of 3748 4700 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe lr098024.exe PID 4700 wrote to memory of 3748 4700 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe lr098024.exe PID 4700 wrote to memory of 3748 4700 4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe lr098024.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe"C:\Users\Admin\AppData\Local\Temp\4b7fea60fef73a7d0a2bd3aeabf7e018cb44cb1d007dd59a10313b20edfafd1f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWC6048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWC6048.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391924.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku695490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku695490.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 18844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098024.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1700 -ip 17001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098024.exeFilesize
175KB
MD502d17381cbab5ba8b6ae67250ef79cad
SHA103fe0c983124b7de0973fc0a208e525608627c5c
SHA2569fe082d773e51a2451a812a82bbbbf16aa54d10acf20d4ff54f637bf7cdcbbc2
SHA51225e0ddddc92a89bb90022428088de94ac5db1198a92bd26bde0f14bf586c62f3cdb0bb0688aa37e933edd2a784d1961e1609b1fe0678abde114a900d9d04adbf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr098024.exeFilesize
175KB
MD502d17381cbab5ba8b6ae67250ef79cad
SHA103fe0c983124b7de0973fc0a208e525608627c5c
SHA2569fe082d773e51a2451a812a82bbbbf16aa54d10acf20d4ff54f637bf7cdcbbc2
SHA51225e0ddddc92a89bb90022428088de94ac5db1198a92bd26bde0f14bf586c62f3cdb0bb0688aa37e933edd2a784d1961e1609b1fe0678abde114a900d9d04adbf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWC6048.exeFilesize
379KB
MD5e1c4c34bb8c641041da49558f22d9008
SHA133550df2f42cc58e802231e9938eabdc190790ee
SHA256212536a2f10ef5a34fd9d0b525b5bf4e7787a808faa7b3cab9d6a0544c6ab785
SHA5129622389fe6a1268acc967330b2bfbc243382ee6d7ff111cc536865313c3c4bfcc042242edc04b5a9e5b765a360bff242f78129b53062607f2020f3dc4510437e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWC6048.exeFilesize
379KB
MD5e1c4c34bb8c641041da49558f22d9008
SHA133550df2f42cc58e802231e9938eabdc190790ee
SHA256212536a2f10ef5a34fd9d0b525b5bf4e7787a808faa7b3cab9d6a0544c6ab785
SHA5129622389fe6a1268acc967330b2bfbc243382ee6d7ff111cc536865313c3c4bfcc042242edc04b5a9e5b765a360bff242f78129b53062607f2020f3dc4510437e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391924.exeFilesize
11KB
MD57903482e671fd0fa9e7988969e33b792
SHA1d169fcb774f6f51944ab00d1a16bd8c55ebe2a21
SHA256ba327c7deda8f226212dc0d9758100a3a97b98f5e1f14971fe5ac7c84cc10f06
SHA5123caa54d54d71af0a462613135cbdb742c83622b22e4d1c6f3d090774dc898dd44280365900f35f79048034e379daf9e67c931b0148de6a7bd14fd7b11fa584c7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391924.exeFilesize
11KB
MD57903482e671fd0fa9e7988969e33b792
SHA1d169fcb774f6f51944ab00d1a16bd8c55ebe2a21
SHA256ba327c7deda8f226212dc0d9758100a3a97b98f5e1f14971fe5ac7c84cc10f06
SHA5123caa54d54d71af0a462613135cbdb742c83622b22e4d1c6f3d090774dc898dd44280365900f35f79048034e379daf9e67c931b0148de6a7bd14fd7b11fa584c7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku695490.exeFilesize
294KB
MD580576c24bc472fbaad57dcac0eec1cfc
SHA1db743b7aa8107ed10451b3c4ef1f6a19151206bf
SHA256c08650d972b1d2c5c976cd956d2fd8a6f4d5cecf3e847d537fbfe9fae7b7d676
SHA512366815d63206b340bc0f0feecc7d3962a3f619dcb4ceb11c35143a25f539d273695e288b6cdfc096f67e2f7ffda24b64f5bd854d3243ae728bf35f18882c5a61
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku695490.exeFilesize
294KB
MD580576c24bc472fbaad57dcac0eec1cfc
SHA1db743b7aa8107ed10451b3c4ef1f6a19151206bf
SHA256c08650d972b1d2c5c976cd956d2fd8a6f4d5cecf3e847d537fbfe9fae7b7d676
SHA512366815d63206b340bc0f0feecc7d3962a3f619dcb4ceb11c35143a25f539d273695e288b6cdfc096f67e2f7ffda24b64f5bd854d3243ae728bf35f18882c5a61
-
memory/1700-153-0x0000000004C00000-0x00000000051A4000-memory.dmpFilesize
5.6MB
-
memory/1700-154-0x0000000000620000-0x000000000066B000-memory.dmpFilesize
300KB
-
memory/1700-155-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-156-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-157-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-158-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-159-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-163-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-161-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-165-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-167-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-169-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-171-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-173-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-175-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-177-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-179-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-181-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-183-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-185-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-187-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-189-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-191-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-193-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-195-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-197-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-199-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-201-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-203-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-205-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-207-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-209-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-211-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-213-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-215-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-219-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-217-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-221-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/1700-1064-0x00000000052B0000-0x00000000058C8000-memory.dmpFilesize
6.1MB
-
memory/1700-1065-0x00000000058D0000-0x00000000059DA000-memory.dmpFilesize
1.0MB
-
memory/1700-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/1700-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/1700-1068-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/1700-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/1700-1072-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-1073-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-1074-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-1075-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/1700-1076-0x0000000006630000-0x0000000006680000-memory.dmpFilesize
320KB
-
memory/1700-1077-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/1700-1078-0x0000000007950000-0x0000000007B12000-memory.dmpFilesize
1.8MB
-
memory/1700-1079-0x0000000007B20000-0x000000000804C000-memory.dmpFilesize
5.2MB
-
memory/3748-1085-0x0000000000040000-0x0000000000072000-memory.dmpFilesize
200KB
-
memory/3748-1086-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/3748-1087-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/4480-147-0x00000000009E0000-0x00000000009EA000-memory.dmpFilesize
40KB