Analysis
-
max time kernel
82s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:15
Static task
static1
Behavioral task
behavioral1
Sample
e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe
Resource
win10v2004-20230220-en
General
-
Target
e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe
-
Size
521KB
-
MD5
54bbd7e1ddb745cf7bf4c9b6f9d6598f
-
SHA1
82cd0112f200c6babdd8162ad55353ee258d181a
-
SHA256
e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622
-
SHA512
2cfc4513667c775830e0fd86ea22721e00c28f563deab9f82669a6c11081b336145dc00ed5c1d97f8ef48af9e2b7eac638a30a2df1638828bf064f27571b3a50
-
SSDEEP
12288:CMrIy90tMEZafFLiaBtxOkbtJl6RizsjfOO:6yWjZafN7NOkXsPj2O
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr932731.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr932731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr932731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr932731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr932731.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr932731.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr932731.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/652-157-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-160-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-158-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-162-0x0000000004C80000-0x0000000004C90000-memory.dmp family_redline behavioral1/memory/652-164-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-166-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-168-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-170-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-172-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-174-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-176-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-178-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-180-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-182-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-184-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-186-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-188-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-190-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-192-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-194-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-196-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-198-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-200-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-202-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-204-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-206-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-208-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-210-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-214-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-212-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-216-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-218-0x0000000002500000-0x000000000253F000-memory.dmp family_redline behavioral1/memory/652-220-0x0000000002500000-0x000000000253F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zior3413.exejr932731.exeku920995.exelr184879.exepid process 2392 zior3413.exe 2000 jr932731.exe 652 ku920995.exe 2088 lr184879.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr932731.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr932731.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exezior3413.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zior3413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zior3413.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5036 652 WerFault.exe ku920995.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr932731.exeku920995.exelr184879.exepid process 2000 jr932731.exe 2000 jr932731.exe 652 ku920995.exe 652 ku920995.exe 2088 lr184879.exe 2088 lr184879.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr932731.exeku920995.exelr184879.exedescription pid process Token: SeDebugPrivilege 2000 jr932731.exe Token: SeDebugPrivilege 652 ku920995.exe Token: SeDebugPrivilege 2088 lr184879.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exezior3413.exedescription pid process target process PID 3700 wrote to memory of 2392 3700 e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe zior3413.exe PID 3700 wrote to memory of 2392 3700 e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe zior3413.exe PID 3700 wrote to memory of 2392 3700 e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe zior3413.exe PID 2392 wrote to memory of 2000 2392 zior3413.exe jr932731.exe PID 2392 wrote to memory of 2000 2392 zior3413.exe jr932731.exe PID 2392 wrote to memory of 652 2392 zior3413.exe ku920995.exe PID 2392 wrote to memory of 652 2392 zior3413.exe ku920995.exe PID 2392 wrote to memory of 652 2392 zior3413.exe ku920995.exe PID 3700 wrote to memory of 2088 3700 e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe lr184879.exe PID 3700 wrote to memory of 2088 3700 e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe lr184879.exe PID 3700 wrote to memory of 2088 3700 e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe lr184879.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe"C:\Users\Admin\AppData\Local\Temp\e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zior3413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zior3413.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932731.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932731.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920995.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920995.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 17724⤵
- Program crash
PID:5036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr184879.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr184879.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 652 -ip 6521⤵PID:4012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a00d3fc1e149d4154a1027a1b9c1715c
SHA1c5deb25c31e3ed147dcd724a1aa861e0c29d1529
SHA256a7b2bb2c16f597f2eeb653fa69aafca304fd3d814f791818c2e11485add10cea
SHA5126f40fdd46ac8dd2060de5db59fb9ca081bdfe309726e172f2ed0a1ced9a2ccc07f2dfdfc4cb671d7c456bf3557b6f595968375a61e2ded4c776045543801a79b
-
Filesize
175KB
MD5a00d3fc1e149d4154a1027a1b9c1715c
SHA1c5deb25c31e3ed147dcd724a1aa861e0c29d1529
SHA256a7b2bb2c16f597f2eeb653fa69aafca304fd3d814f791818c2e11485add10cea
SHA5126f40fdd46ac8dd2060de5db59fb9ca081bdfe309726e172f2ed0a1ced9a2ccc07f2dfdfc4cb671d7c456bf3557b6f595968375a61e2ded4c776045543801a79b
-
Filesize
379KB
MD5e93e4a6fb6c01d9e494d379ac0097cba
SHA1f6eb53d5729a835f09ca8b300faa7068161868b1
SHA25629712362b22ff83aaeacb29116e9c0a6f5b4331aaac1698530e2cb64a7b31937
SHA51247a01ee49bbb4af1083ad91c8fcc0b8498d5205d28d84a52e9eeef66094da89312051cee431710a3b37c5299333fab56e0a5bd7b81fd51ed3766bdea7202225c
-
Filesize
379KB
MD5e93e4a6fb6c01d9e494d379ac0097cba
SHA1f6eb53d5729a835f09ca8b300faa7068161868b1
SHA25629712362b22ff83aaeacb29116e9c0a6f5b4331aaac1698530e2cb64a7b31937
SHA51247a01ee49bbb4af1083ad91c8fcc0b8498d5205d28d84a52e9eeef66094da89312051cee431710a3b37c5299333fab56e0a5bd7b81fd51ed3766bdea7202225c
-
Filesize
11KB
MD5ce38d9d7ecc984decac9badc6b2b4b5f
SHA1ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403
SHA256bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6
SHA5120f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd
-
Filesize
11KB
MD5ce38d9d7ecc984decac9badc6b2b4b5f
SHA1ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403
SHA256bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6
SHA5120f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd
-
Filesize
294KB
MD561ab411da160854b1e14e26566100e0b
SHA1e74d76f6f004e47c1b5992f321c955119b4b1dee
SHA25652bfd364e7c94bae6cb26125197c6b67221b8bf32fe177b03e88b4673717597c
SHA512317f364611b1645e44cfaed93e049fdf9d9b32d33db9b77e329b979bf95f321615e8e18de64f171d79d31533a95b7ab8fdd7e9bea7b3760ea073b9614384aad5
-
Filesize
294KB
MD561ab411da160854b1e14e26566100e0b
SHA1e74d76f6f004e47c1b5992f321c955119b4b1dee
SHA25652bfd364e7c94bae6cb26125197c6b67221b8bf32fe177b03e88b4673717597c
SHA512317f364611b1645e44cfaed93e049fdf9d9b32d33db9b77e329b979bf95f321615e8e18de64f171d79d31533a95b7ab8fdd7e9bea7b3760ea073b9614384aad5