Analysis
-
max time kernel
75s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:11
Static task
static1
Behavioral task
behavioral1
Sample
dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe
Resource
win10v2004-20230221-en
General
-
Target
dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe
-
Size
522KB
-
MD5
b61b7ef066e96fda858e2f7ddd381126
-
SHA1
ef8b203c617707ce3a6a6ea2334d4dbf8ae32afa
-
SHA256
dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e
-
SHA512
d37eda12ca81552c911e7c030dc27af730da8d3cd062af5db1db4dd9ee59557b1d39bfb8c34b47b7b112b4b37980a8c45d2a4eb98e9f51953a082d27a516821f
-
SSDEEP
12288:FMr9y90aRnDDK7DLRYwwJ558QxbVul6+JYhFn:8ydRDDKqw7QxAsN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr787011.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr787011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr787011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr787011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr787011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr787011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr787011.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1016-157-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-158-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-160-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-162-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-164-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-166-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-168-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-170-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-172-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-174-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-176-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-178-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-180-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-182-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-184-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-186-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-188-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-190-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-192-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-194-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-196-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-198-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-202-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-200-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-204-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-206-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-208-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-210-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-212-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-214-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-216-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-218-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline behavioral1/memory/1016-220-0x00000000025F0000-0x000000000262F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zisp1467.exejr787011.exeku467800.exelr912476.exepid process 4504 zisp1467.exe 2720 jr787011.exe 1016 ku467800.exe 628 lr912476.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr787011.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr787011.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exezisp1467.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisp1467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisp1467.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2932 1016 WerFault.exe ku467800.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr787011.exeku467800.exelr912476.exepid process 2720 jr787011.exe 2720 jr787011.exe 1016 ku467800.exe 1016 ku467800.exe 628 lr912476.exe 628 lr912476.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr787011.exeku467800.exelr912476.exedescription pid process Token: SeDebugPrivilege 2720 jr787011.exe Token: SeDebugPrivilege 1016 ku467800.exe Token: SeDebugPrivilege 628 lr912476.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exezisp1467.exedescription pid process target process PID 4772 wrote to memory of 4504 4772 dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe zisp1467.exe PID 4772 wrote to memory of 4504 4772 dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe zisp1467.exe PID 4772 wrote to memory of 4504 4772 dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe zisp1467.exe PID 4504 wrote to memory of 2720 4504 zisp1467.exe jr787011.exe PID 4504 wrote to memory of 2720 4504 zisp1467.exe jr787011.exe PID 4504 wrote to memory of 1016 4504 zisp1467.exe ku467800.exe PID 4504 wrote to memory of 1016 4504 zisp1467.exe ku467800.exe PID 4504 wrote to memory of 1016 4504 zisp1467.exe ku467800.exe PID 4772 wrote to memory of 628 4772 dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe lr912476.exe PID 4772 wrote to memory of 628 4772 dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe lr912476.exe PID 4772 wrote to memory of 628 4772 dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe lr912476.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe"C:\Users\Admin\AppData\Local\Temp\dd33f65cbe1ab734d3bc2f391997262c74c3075047fe748d89e403dafeda229e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp1467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp1467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr787011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr787011.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku467800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku467800.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912476.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1016 -ip 10161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912476.exeFilesize
175KB
MD5ae044cc414e3075857a4fd718e1525f2
SHA191c181fdd5e57626e38fd0de3f57bffbeec2433e
SHA25671403213cd6ea2691d43f221fb93d86720310ccf11f01d28349c7ad6faa6fb96
SHA512d363b5777d1ef95ad356bc41dd4014de810b931a6d7c2be4679f20e0eccafd6649af8af1ffdb2e676bcbd15ba3f8edfb17ad52ac4f94c3da8e700b2b0d3381e4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912476.exeFilesize
175KB
MD5ae044cc414e3075857a4fd718e1525f2
SHA191c181fdd5e57626e38fd0de3f57bffbeec2433e
SHA25671403213cd6ea2691d43f221fb93d86720310ccf11f01d28349c7ad6faa6fb96
SHA512d363b5777d1ef95ad356bc41dd4014de810b931a6d7c2be4679f20e0eccafd6649af8af1ffdb2e676bcbd15ba3f8edfb17ad52ac4f94c3da8e700b2b0d3381e4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp1467.exeFilesize
379KB
MD57b95c2684ef0d91e651bf2550963528e
SHA1c7de07f196f96bd8fac5ab4682505d7c62a63f14
SHA25689a5422c55810bb1bedda70186abd6e990e6faad5e15062820c2b010be0b4a88
SHA512c73ac87749ccbfb79194c9e1dacbb94f66894480005f38ebb6f462fb0a0d5365affe3f29bf969d14442645da2186d3e3bb57978e69a94438ce87ad66f5696303
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp1467.exeFilesize
379KB
MD57b95c2684ef0d91e651bf2550963528e
SHA1c7de07f196f96bd8fac5ab4682505d7c62a63f14
SHA25689a5422c55810bb1bedda70186abd6e990e6faad5e15062820c2b010be0b4a88
SHA512c73ac87749ccbfb79194c9e1dacbb94f66894480005f38ebb6f462fb0a0d5365affe3f29bf969d14442645da2186d3e3bb57978e69a94438ce87ad66f5696303
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr787011.exeFilesize
11KB
MD55a0c85f1383b99af7d4d3d9a14677347
SHA178dc7e98ee4033e361e0e70ddd2975b1b5a99c09
SHA25673e11eb7e0e883bf410ced56dcde31392b943d45474740d2a92b0effdf286d58
SHA5121b973c47813216225cb62435fff465890a0a4788a5d26ae2d628c021dd2ba27908f9fa1fc391e6eb7e9eb5c46692334190e9c365fad1e8ef518a510ac219c348
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr787011.exeFilesize
11KB
MD55a0c85f1383b99af7d4d3d9a14677347
SHA178dc7e98ee4033e361e0e70ddd2975b1b5a99c09
SHA25673e11eb7e0e883bf410ced56dcde31392b943d45474740d2a92b0effdf286d58
SHA5121b973c47813216225cb62435fff465890a0a4788a5d26ae2d628c021dd2ba27908f9fa1fc391e6eb7e9eb5c46692334190e9c365fad1e8ef518a510ac219c348
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku467800.exeFilesize
294KB
MD5a0b4c4a675d5c726406aa1d2ca1681d4
SHA188552059205a4d9e405bea5936acac31c0b33707
SHA256eae3baebfd65da143adf0f65c8ab1ad9ad786fe264009be79f29dd9a25f09bb5
SHA5122412696f65fd008bafc168309b339a3ef87b43cdc318442906a80decbed964a5a17ac1ea8b4d562a841bf096c88116c36ae0f8fe1fae12f1d3593fb0edbb15a1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku467800.exeFilesize
294KB
MD5a0b4c4a675d5c726406aa1d2ca1681d4
SHA188552059205a4d9e405bea5936acac31c0b33707
SHA256eae3baebfd65da143adf0f65c8ab1ad9ad786fe264009be79f29dd9a25f09bb5
SHA5122412696f65fd008bafc168309b339a3ef87b43cdc318442906a80decbed964a5a17ac1ea8b4d562a841bf096c88116c36ae0f8fe1fae12f1d3593fb0edbb15a1
-
memory/628-1084-0x0000000000DE0000-0x0000000000E12000-memory.dmpFilesize
200KB
-
memory/628-1085-0x0000000005960000-0x0000000005970000-memory.dmpFilesize
64KB
-
memory/628-1086-0x0000000005960000-0x0000000005970000-memory.dmpFilesize
64KB
-
memory/1016-192-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-204-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-156-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-157-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-158-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-160-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-162-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-164-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-166-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-168-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-170-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-172-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-174-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-176-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-178-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-180-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-182-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-184-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-186-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-188-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-190-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-154-0x0000000004B20000-0x00000000050C4000-memory.dmpFilesize
5.6MB
-
memory/1016-194-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-196-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-198-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-202-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-200-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-155-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-206-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-208-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-210-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-212-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-214-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-216-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-218-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-220-0x00000000025F0000-0x000000000262F000-memory.dmpFilesize
252KB
-
memory/1016-1063-0x0000000005210000-0x0000000005828000-memory.dmpFilesize
6.1MB
-
memory/1016-1064-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/1016-1065-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/1016-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/1016-1069-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/1016-1070-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/1016-1071-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-1072-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-1073-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-1074-0x00000000065B0000-0x0000000006772000-memory.dmpFilesize
1.8MB
-
memory/1016-153-0x0000000000560000-0x00000000005AB000-memory.dmpFilesize
300KB
-
memory/1016-1075-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/1016-1076-0x0000000002300000-0x0000000002310000-memory.dmpFilesize
64KB
-
memory/1016-1077-0x0000000008420000-0x0000000008496000-memory.dmpFilesize
472KB
-
memory/1016-1078-0x00000000084B0000-0x0000000008500000-memory.dmpFilesize
320KB
-
memory/2720-147-0x0000000000C60000-0x0000000000C6A000-memory.dmpFilesize
40KB