Analysis
-
max time kernel
86s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:12
Static task
static1
Behavioral task
behavioral1
Sample
86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe
Resource
win10v2004-20230220-en
General
-
Target
86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe
-
Size
521KB
-
MD5
c5e87a011447485ba7232e2951770a84
-
SHA1
9004a0cae963829b10feca3bd38950821c6fee3f
-
SHA256
86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba
-
SHA512
6db66d65d86f851b35be64ebd17cba5bc12ded4ec32b34612a3474222abe4fd019fe15f60d090fab958f7db1f6076267bc76297d2d4a79c4a154582586f81cab
-
SSDEEP
12288:IMrTy9015gXMpAkfbdWTRR4nT0TEbyAwNiO:byEnbdWTf4nowiNiO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr962292.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr962292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr962292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr962292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr962292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr962292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr962292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1108-155-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-156-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-158-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-160-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-164-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-167-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-169-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-171-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-173-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-175-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-177-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-179-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-181-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-183-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-185-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-187-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-189-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-191-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-193-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-195-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-197-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-199-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-201-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-203-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-205-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-207-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-209-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-211-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-213-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-215-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-217-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-219-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/1108-221-0x0000000002530000-0x000000000256F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziiF4784.exejr962292.exeku791315.exelr950578.exepid process 4692 ziiF4784.exe 3000 jr962292.exe 1108 ku791315.exe 32 lr950578.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr962292.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr962292.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziiF4784.exe86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiF4784.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiF4784.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4544 1108 WerFault.exe ku791315.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr962292.exeku791315.exelr950578.exepid process 3000 jr962292.exe 3000 jr962292.exe 1108 ku791315.exe 1108 ku791315.exe 32 lr950578.exe 32 lr950578.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr962292.exeku791315.exelr950578.exedescription pid process Token: SeDebugPrivilege 3000 jr962292.exe Token: SeDebugPrivilege 1108 ku791315.exe Token: SeDebugPrivilege 32 lr950578.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exeziiF4784.exedescription pid process target process PID 4624 wrote to memory of 4692 4624 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe ziiF4784.exe PID 4624 wrote to memory of 4692 4624 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe ziiF4784.exe PID 4624 wrote to memory of 4692 4624 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe ziiF4784.exe PID 4692 wrote to memory of 3000 4692 ziiF4784.exe jr962292.exe PID 4692 wrote to memory of 3000 4692 ziiF4784.exe jr962292.exe PID 4692 wrote to memory of 1108 4692 ziiF4784.exe ku791315.exe PID 4692 wrote to memory of 1108 4692 ziiF4784.exe ku791315.exe PID 4692 wrote to memory of 1108 4692 ziiF4784.exe ku791315.exe PID 4624 wrote to memory of 32 4624 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe lr950578.exe PID 4624 wrote to memory of 32 4624 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe lr950578.exe PID 4624 wrote to memory of 32 4624 86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe lr950578.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe"C:\Users\Admin\AppData\Local\Temp\86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF4784.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF4784.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr962292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr962292.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku791315.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku791315.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 13564⤵
- Program crash
PID:4544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr950578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr950578.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1108 -ip 11081⤵PID:2660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f28bc25dbd7c56d4bdf43e666764d765
SHA1c4f17d783adf3c2a157ecfa9eb828d7150301708
SHA2560cea477a3bda6d5b4c5db83759bc65ce73d5d18040e68a1d5ae2cad6d15816da
SHA5127307161fa7f6a21718f0d97323b79d12d81fc3b922749256a28e0d3288625c7ac1bef461644d97be9915e46104ed841998bd087e0f9e45309ebc56c643b2542d
-
Filesize
175KB
MD5f28bc25dbd7c56d4bdf43e666764d765
SHA1c4f17d783adf3c2a157ecfa9eb828d7150301708
SHA2560cea477a3bda6d5b4c5db83759bc65ce73d5d18040e68a1d5ae2cad6d15816da
SHA5127307161fa7f6a21718f0d97323b79d12d81fc3b922749256a28e0d3288625c7ac1bef461644d97be9915e46104ed841998bd087e0f9e45309ebc56c643b2542d
-
Filesize
379KB
MD58ac74c7653ddacdf2462921d57dde43f
SHA1f656f76edaf72eb7e359dcc6cac319c8bc13b794
SHA256147ac5fa1a2bc29477edb36233e08bfb706e3dc38475b192f258e02c0d610272
SHA5127382166f1f7071ebc40b3ba5c3821225e896f02b06c7f44854376b9f2b89f9416517f89303d44f1da0515bdf2870f8d3214723b6ba85903f157da9830b404452
-
Filesize
379KB
MD58ac74c7653ddacdf2462921d57dde43f
SHA1f656f76edaf72eb7e359dcc6cac319c8bc13b794
SHA256147ac5fa1a2bc29477edb36233e08bfb706e3dc38475b192f258e02c0d610272
SHA5127382166f1f7071ebc40b3ba5c3821225e896f02b06c7f44854376b9f2b89f9416517f89303d44f1da0515bdf2870f8d3214723b6ba85903f157da9830b404452
-
Filesize
11KB
MD502190ecc301498fde7c82cfa27ce9a80
SHA1175e9d0b30f85c710407a1bab8445f01bd50ed5b
SHA2563c95028e3b8c3bee4014f7a88e71ff40a5d46574f740bfef16a67fe7c1ddafc6
SHA512842bf8abd9c9d5c1644a3cfb1d81f7d2302277082da7dc8f00fd0c5c6408f325d81a71496c153c0e3b0e1cbb0a95778269149fe8b0f5daec211fabee25613832
-
Filesize
11KB
MD502190ecc301498fde7c82cfa27ce9a80
SHA1175e9d0b30f85c710407a1bab8445f01bd50ed5b
SHA2563c95028e3b8c3bee4014f7a88e71ff40a5d46574f740bfef16a67fe7c1ddafc6
SHA512842bf8abd9c9d5c1644a3cfb1d81f7d2302277082da7dc8f00fd0c5c6408f325d81a71496c153c0e3b0e1cbb0a95778269149fe8b0f5daec211fabee25613832
-
Filesize
294KB
MD5af89de233b50c5c3a1cf73ab255a078b
SHA160a12b22249804ee8e50bfe3046b3111ecf587d1
SHA256d2e965b84c534f66c94ed0c40f341c145dfc0a31f45dc505be699b94d635066b
SHA512b92940b7ddf2f1bca7e5362671602fae28aedd3df46132979c3d0f7dc299f21f42c5ca4a64cbd69d090a0e03347ad86476efa96d892151cf6df981f209a1f484
-
Filesize
294KB
MD5af89de233b50c5c3a1cf73ab255a078b
SHA160a12b22249804ee8e50bfe3046b3111ecf587d1
SHA256d2e965b84c534f66c94ed0c40f341c145dfc0a31f45dc505be699b94d635066b
SHA512b92940b7ddf2f1bca7e5362671602fae28aedd3df46132979c3d0f7dc299f21f42c5ca4a64cbd69d090a0e03347ad86476efa96d892151cf6df981f209a1f484