Analysis
-
max time kernel
61s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:27
Static task
static1
Behavioral task
behavioral1
Sample
4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe
Resource
win10v2004-20230220-en
General
-
Target
4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe
-
Size
522KB
-
MD5
31e204e2386146d11f15cbe639914d75
-
SHA1
cf02b9e10840279dc4177fb221db025072de90b8
-
SHA256
4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd
-
SHA512
8e9d9f9c0381518fe23a1147e95f595605ebecb5e1fd02f073d08ed00702f51a2f8ad704cf1461ec249193f7b29de8b96acb50aceb38ee0cb4147d2e04b7da1f
-
SSDEEP
12288:QMrmy90AgS4/Atmeqqlasx2wgz8qB4BfzWGwYXvY+a9d5cd:myjgV/A0jYQWqqBqGiBcd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr531337.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr531337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr531337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr531337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr531337.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr531337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr531337.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2212-157-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-159-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-161-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-163-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-165-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-167-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-169-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-171-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-173-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-175-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-177-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-179-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-181-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-183-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-185-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-187-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-189-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-191-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-193-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-195-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-197-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-199-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-201-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-203-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-205-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-207-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-209-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-211-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-213-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-215-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-217-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-219-0x0000000002720000-0x000000000275F000-memory.dmp family_redline behavioral1/memory/2212-221-0x0000000002720000-0x000000000275F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zikD0389.exejr531337.exeku830996.exelr308043.exepid process 1128 zikD0389.exe 1220 jr531337.exe 2212 ku830996.exe 4716 lr308043.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr531337.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr531337.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zikD0389.exe4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zikD0389.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikD0389.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2688 2212 WerFault.exe ku830996.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr531337.exeku830996.exelr308043.exepid process 1220 jr531337.exe 1220 jr531337.exe 2212 ku830996.exe 2212 ku830996.exe 4716 lr308043.exe 4716 lr308043.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr531337.exeku830996.exelr308043.exedescription pid process Token: SeDebugPrivilege 1220 jr531337.exe Token: SeDebugPrivilege 2212 ku830996.exe Token: SeDebugPrivilege 4716 lr308043.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exezikD0389.exedescription pid process target process PID 316 wrote to memory of 1128 316 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe zikD0389.exe PID 316 wrote to memory of 1128 316 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe zikD0389.exe PID 316 wrote to memory of 1128 316 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe zikD0389.exe PID 1128 wrote to memory of 1220 1128 zikD0389.exe jr531337.exe PID 1128 wrote to memory of 1220 1128 zikD0389.exe jr531337.exe PID 1128 wrote to memory of 2212 1128 zikD0389.exe ku830996.exe PID 1128 wrote to memory of 2212 1128 zikD0389.exe ku830996.exe PID 1128 wrote to memory of 2212 1128 zikD0389.exe ku830996.exe PID 316 wrote to memory of 4716 316 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe lr308043.exe PID 316 wrote to memory of 4716 316 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe lr308043.exe PID 316 wrote to memory of 4716 316 4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe lr308043.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe"C:\Users\Admin\AppData\Local\Temp\4dc02827289898d7906400fc8d9a8ec2402cda45dd85841857cefb65386cbecd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikD0389.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikD0389.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr531337.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr531337.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku830996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku830996.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 13444⤵
- Program crash
PID:2688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr308043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr308043.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2212 -ip 22121⤵PID:3664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e414ca443b00c65e8e5e200c6ad353f7
SHA1884328edc9856573ecf7ad6f2836ec6675169e52
SHA2561d3e8ab4c8f73d87da39c2b542375986333a2a790bb394d90bd9e7dada641a24
SHA512b240bbd616cb9d62e0f52810ba1699e39c301768304131b5e044151613e674af37bc7e17727e08aa00749d477f046e6adb878515d3e5f7c3539113a5ebcefba7
-
Filesize
175KB
MD5e414ca443b00c65e8e5e200c6ad353f7
SHA1884328edc9856573ecf7ad6f2836ec6675169e52
SHA2561d3e8ab4c8f73d87da39c2b542375986333a2a790bb394d90bd9e7dada641a24
SHA512b240bbd616cb9d62e0f52810ba1699e39c301768304131b5e044151613e674af37bc7e17727e08aa00749d477f046e6adb878515d3e5f7c3539113a5ebcefba7
-
Filesize
380KB
MD566fcc1e641002484014a986f294efa9a
SHA1d892a4015bb217fe6ee61a6ba969981f84b2dd86
SHA256394a024e219c9b5e75e0a249a898ea48cc0c5ab8dd952ed9c0b1ae1285f0bc56
SHA512c2184b9f42ac5f26981d8465871bd85d410acbc31a68d02b0895bc5389820ed39fe0fb9b5b9448e9f7d65fafed5c4ac601d67343b78bf656d20daa995dabccc0
-
Filesize
380KB
MD566fcc1e641002484014a986f294efa9a
SHA1d892a4015bb217fe6ee61a6ba969981f84b2dd86
SHA256394a024e219c9b5e75e0a249a898ea48cc0c5ab8dd952ed9c0b1ae1285f0bc56
SHA512c2184b9f42ac5f26981d8465871bd85d410acbc31a68d02b0895bc5389820ed39fe0fb9b5b9448e9f7d65fafed5c4ac601d67343b78bf656d20daa995dabccc0
-
Filesize
15KB
MD55819359e121478795fba0e39c9b24ea5
SHA10c3fac9e5272b01bc6ca111205ec346ab7f47000
SHA25695ded5425aa208aa4498d121ea0a059bc01d06845ed8028d3fde4a73b3135617
SHA5126ab8957e6cdd675c4f85ea5437f786d90f961284ed7f00e4863fb4fdc8d418d3f145f7e4311ed34042eab433cab2978319798e7a491841f517717482c9e52231
-
Filesize
15KB
MD55819359e121478795fba0e39c9b24ea5
SHA10c3fac9e5272b01bc6ca111205ec346ab7f47000
SHA25695ded5425aa208aa4498d121ea0a059bc01d06845ed8028d3fde4a73b3135617
SHA5126ab8957e6cdd675c4f85ea5437f786d90f961284ed7f00e4863fb4fdc8d418d3f145f7e4311ed34042eab433cab2978319798e7a491841f517717482c9e52231
-
Filesize
294KB
MD59d18bdcb3cd21462956fe64c738e12f9
SHA11cda257782e7f2747fa53ce5d28eab5ee46a3c27
SHA256880a2756ba8589057cea9ffc46d12eb5025dc6e5eb2df2c4d1b594dd9ae7827d
SHA51214a579f79d40c72af8bfa34cbc8c9c90856d77d4a8ccbfa6d3ed90e9a2cbb682ea3a0051aa2fd4201c04fcbab0edeed56d52625787f4c428f5311510af773395
-
Filesize
294KB
MD59d18bdcb3cd21462956fe64c738e12f9
SHA11cda257782e7f2747fa53ce5d28eab5ee46a3c27
SHA256880a2756ba8589057cea9ffc46d12eb5025dc6e5eb2df2c4d1b594dd9ae7827d
SHA51214a579f79d40c72af8bfa34cbc8c9c90856d77d4a8ccbfa6d3ed90e9a2cbb682ea3a0051aa2fd4201c04fcbab0edeed56d52625787f4c428f5311510af773395