Analysis
-
max time kernel
67s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:19
Static task
static1
Behavioral task
behavioral1
Sample
a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe
Resource
win10v2004-20230220-en
General
-
Target
a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe
-
Size
522KB
-
MD5
d04b55cef45bc4b5ef12eb221d4b5ef5
-
SHA1
78a5146d58dbdae415b211c1698460db22e986d7
-
SHA256
a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e
-
SHA512
aa7e81c75ea2c70f6cb2f01e9bfb3936bd9a22b6f54641b2941f05a33ee5b4ada78b82a0ddb31ed02e916f22045b88049d1a59645efeaf8b3abee8a3b8c9c42a
-
SSDEEP
12288:yMrHy90dVR1o7V+2s/2rnhxL3u42580J4vuzWKXRVoTPbQLmAO6l5F:1ySRH/CnhxLym0iv3KXHwgmAO6l/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr154906.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr154906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr154906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr154906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr154906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr154906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr154906.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-158-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-159-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-161-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-163-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-165-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-167-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-169-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-171-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-173-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-175-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-177-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-179-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-181-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-183-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-185-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-187-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-189-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-191-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-193-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-195-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-197-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-199-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-201-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-205-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-203-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-207-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-211-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-209-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-213-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-215-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-217-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-219-0x0000000002710000-0x000000000274F000-memory.dmp family_redline behavioral1/memory/2032-221-0x0000000002710000-0x000000000274F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zidp9411.exejr154906.exeku607860.exelr755074.exepid process 4280 zidp9411.exe 5064 jr154906.exe 2032 ku607860.exe 1432 lr755074.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr154906.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr154906.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exezidp9411.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidp9411.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidp9411.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4460 2032 WerFault.exe ku607860.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr154906.exeku607860.exelr755074.exepid process 5064 jr154906.exe 5064 jr154906.exe 2032 ku607860.exe 2032 ku607860.exe 1432 lr755074.exe 1432 lr755074.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr154906.exeku607860.exelr755074.exedescription pid process Token: SeDebugPrivilege 5064 jr154906.exe Token: SeDebugPrivilege 2032 ku607860.exe Token: SeDebugPrivilege 1432 lr755074.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exezidp9411.exedescription pid process target process PID 4604 wrote to memory of 4280 4604 a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe zidp9411.exe PID 4604 wrote to memory of 4280 4604 a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe zidp9411.exe PID 4604 wrote to memory of 4280 4604 a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe zidp9411.exe PID 4280 wrote to memory of 5064 4280 zidp9411.exe jr154906.exe PID 4280 wrote to memory of 5064 4280 zidp9411.exe jr154906.exe PID 4280 wrote to memory of 2032 4280 zidp9411.exe ku607860.exe PID 4280 wrote to memory of 2032 4280 zidp9411.exe ku607860.exe PID 4280 wrote to memory of 2032 4280 zidp9411.exe ku607860.exe PID 4604 wrote to memory of 1432 4604 a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe lr755074.exe PID 4604 wrote to memory of 1432 4604 a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe lr755074.exe PID 4604 wrote to memory of 1432 4604 a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe lr755074.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe"C:\Users\Admin\AppData\Local\Temp\a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 11884⤵
- Program crash
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 20321⤵PID:5076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exeFilesize
175KB
MD5f7dfc1585d672c13d2fea260ae2dd7b8
SHA18bef6f86658638b62d54a23956091475e84be4e3
SHA256a150b1dedcdae78bfca009d3e90997dd7f6566a9341b8a5d1a24d5bf711a1bb4
SHA5121dd20517f4cc03c85dcdf64869f7e9cdcb70d6e2dcdd07befc027d663a6c0de3c081f31f383460eb67cae1cac1e94f9638644c18a88c35e3102af45456098b2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exeFilesize
175KB
MD5f7dfc1585d672c13d2fea260ae2dd7b8
SHA18bef6f86658638b62d54a23956091475e84be4e3
SHA256a150b1dedcdae78bfca009d3e90997dd7f6566a9341b8a5d1a24d5bf711a1bb4
SHA5121dd20517f4cc03c85dcdf64869f7e9cdcb70d6e2dcdd07befc027d663a6c0de3c081f31f383460eb67cae1cac1e94f9638644c18a88c35e3102af45456098b2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exeFilesize
380KB
MD53f26bdf903bc5314d0b8827fb3e5b157
SHA1d34f67cbebfa5f2b132f4ce791de14b00a1bcb6d
SHA2560cd0331eb4ce4a489bd2a01d2e2aa2e8a4789f1e8fe3daecdadddfc1a22d9149
SHA512e49f3f81cf50126730f583059fc70a5f3fee6ba0b9c34f710f5003983b461012c47f10c3a1f7beed508044fa3d48fad8cda65142b758faa87a497297be780bc3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exeFilesize
380KB
MD53f26bdf903bc5314d0b8827fb3e5b157
SHA1d34f67cbebfa5f2b132f4ce791de14b00a1bcb6d
SHA2560cd0331eb4ce4a489bd2a01d2e2aa2e8a4789f1e8fe3daecdadddfc1a22d9149
SHA512e49f3f81cf50126730f583059fc70a5f3fee6ba0b9c34f710f5003983b461012c47f10c3a1f7beed508044fa3d48fad8cda65142b758faa87a497297be780bc3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exeFilesize
15KB
MD54407e1d17211acaad2d2a8b61e1264a8
SHA1aa8358eee2e07efe413de945f377ce699d59644a
SHA2568016303b93b73aaaed18163625667407d22378be0c207a58f15cd24f1afdd02c
SHA5125a4d1fcda4b7b12b7d65b97ccbca75a7fc3aa225fb317f2f6c4ffb0ed7dd751de6fb9ce00fb8dce9f1cb6151f0b4edb92ed35548095a4b5949c7d9ee21fd3e59
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exeFilesize
15KB
MD54407e1d17211acaad2d2a8b61e1264a8
SHA1aa8358eee2e07efe413de945f377ce699d59644a
SHA2568016303b93b73aaaed18163625667407d22378be0c207a58f15cd24f1afdd02c
SHA5125a4d1fcda4b7b12b7d65b97ccbca75a7fc3aa225fb317f2f6c4ffb0ed7dd751de6fb9ce00fb8dce9f1cb6151f0b4edb92ed35548095a4b5949c7d9ee21fd3e59
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exeFilesize
294KB
MD5c2b40967dd2ae5c38f3afe05a5fa5776
SHA16df7d5f92d2d2bc713c788a5ccbde63db17f2160
SHA256cadcc7b3fe6b43e9c12020ed4db05299dd135c91d76121a37915402c8403edf7
SHA512537b67d8acaca3c964c61128f9c1f4684a9b591b84c21d19dc8cbc90e806d60717cafc1dc1a47054e7f450b645935137915a50f0bda271f7c3cdaa680e22271e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exeFilesize
294KB
MD5c2b40967dd2ae5c38f3afe05a5fa5776
SHA16df7d5f92d2d2bc713c788a5ccbde63db17f2160
SHA256cadcc7b3fe6b43e9c12020ed4db05299dd135c91d76121a37915402c8403edf7
SHA512537b67d8acaca3c964c61128f9c1f4684a9b591b84c21d19dc8cbc90e806d60717cafc1dc1a47054e7f450b645935137915a50f0bda271f7c3cdaa680e22271e
-
memory/1432-1085-0x0000000000900000-0x0000000000932000-memory.dmpFilesize
200KB
-
memory/1432-1086-0x0000000005300000-0x0000000005310000-memory.dmpFilesize
64KB
-
memory/2032-191-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-201-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-155-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-156-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-157-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-158-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-159-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-161-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-163-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-165-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-167-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-169-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-171-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-173-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-175-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-177-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-179-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-181-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-183-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-185-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-187-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-189-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-153-0x0000000004B20000-0x00000000050C4000-memory.dmpFilesize
5.6MB
-
memory/2032-193-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-195-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-197-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-199-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-154-0x0000000002050000-0x000000000209B000-memory.dmpFilesize
300KB
-
memory/2032-205-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-203-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-207-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-211-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-209-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-213-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-215-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-217-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-219-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-221-0x0000000002710000-0x000000000274F000-memory.dmpFilesize
252KB
-
memory/2032-1064-0x00000000050D0000-0x00000000056E8000-memory.dmpFilesize
6.1MB
-
memory/2032-1065-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/2032-1066-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/2032-1067-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/2032-1068-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-1070-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/2032-1071-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/2032-1072-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-1073-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-1074-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/2032-1075-0x00000000065B0000-0x0000000006772000-memory.dmpFilesize
1.8MB
-
memory/2032-1076-0x0000000006790000-0x0000000006CBC000-memory.dmpFilesize
5.2MB
-
memory/2032-1077-0x0000000006E10000-0x0000000006E86000-memory.dmpFilesize
472KB
-
memory/2032-1078-0x0000000006E90000-0x0000000006EE0000-memory.dmpFilesize
320KB
-
memory/2032-1079-0x00000000027B0000-0x00000000027C0000-memory.dmpFilesize
64KB
-
memory/5064-147-0x0000000000CC0000-0x0000000000CCA000-memory.dmpFilesize
40KB