Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:45
Static task
static1
Behavioral task
behavioral1
Sample
f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe
Resource
win10v2004-20230220-en
General
-
Target
f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe
-
Size
522KB
-
MD5
f18f7621b71f3efe9c232ac7f12ccb18
-
SHA1
43cedd83b6d0a8e0af51b7855c21bf1c11e5623c
-
SHA256
f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342
-
SHA512
1a767ad53dfdf6b37554ed775d70000a2344f8275b4752103417a86e0c2615b73295cb79a3f602680bb7325392acdb72190e722d7efeb8bc73d1b3985d91a3cf
-
SSDEEP
12288:WMrxy90Yxm0iQ93dPfjZx+G1qr8KK4zfzWKk37F3O:Py5mU9rxBsgKrzqKaB3O
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr798151.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr798151.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr798151.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr798151.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr798151.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr798151.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr798151.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3764-158-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-159-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-161-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-163-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-165-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-167-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-169-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-171-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-173-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-175-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-177-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-179-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-181-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-183-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-185-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-187-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-189-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-191-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-193-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-197-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-199-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-201-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-203-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-205-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-207-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-209-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-211-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-213-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-215-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-217-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-219-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3764-221-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziJS2022.exejr798151.exeku590557.exelr604245.exepid process 2296 ziJS2022.exe 3816 jr798151.exe 3764 ku590557.exe 2204 lr604245.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr798151.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr798151.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exeziJS2022.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJS2022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJS2022.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1564 3764 WerFault.exe ku590557.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr798151.exeku590557.exelr604245.exepid process 3816 jr798151.exe 3816 jr798151.exe 3764 ku590557.exe 3764 ku590557.exe 2204 lr604245.exe 2204 lr604245.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr798151.exeku590557.exelr604245.exedescription pid process Token: SeDebugPrivilege 3816 jr798151.exe Token: SeDebugPrivilege 3764 ku590557.exe Token: SeDebugPrivilege 2204 lr604245.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exeziJS2022.exedescription pid process target process PID 1916 wrote to memory of 2296 1916 f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe ziJS2022.exe PID 1916 wrote to memory of 2296 1916 f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe ziJS2022.exe PID 1916 wrote to memory of 2296 1916 f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe ziJS2022.exe PID 2296 wrote to memory of 3816 2296 ziJS2022.exe jr798151.exe PID 2296 wrote to memory of 3816 2296 ziJS2022.exe jr798151.exe PID 2296 wrote to memory of 3764 2296 ziJS2022.exe ku590557.exe PID 2296 wrote to memory of 3764 2296 ziJS2022.exe ku590557.exe PID 2296 wrote to memory of 3764 2296 ziJS2022.exe ku590557.exe PID 1916 wrote to memory of 2204 1916 f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe lr604245.exe PID 1916 wrote to memory of 2204 1916 f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe lr604245.exe PID 1916 wrote to memory of 2204 1916 f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe lr604245.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe"C:\Users\Admin\AppData\Local\Temp\f3200f1fceb3c7875a3f851f6db47807a8f4bf2335dd74b898598772f20a1342.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJS2022.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJS2022.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr798151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr798151.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku590557.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku590557.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13724⤵
- Program crash
PID:1564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr604245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr604245.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3764 -ip 37641⤵PID:3948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD553b29bf6cd15a89725f155024d266ad5
SHA14c47fdf61f41d2067062f1c5b95534684c4213d7
SHA256264b42e06856ac6c4820deb9a6bdffb071a95927b2f55664c78c9c92655c7fbe
SHA512d25ab8c437d70d19947725cdbe7b883d9c6e610c9d3b3f61da9ac34648162942ed99bb8e1b93f02ca60eb120b640bde20b13e4c74edb0ed3a28d66858c7f52cf
-
Filesize
175KB
MD553b29bf6cd15a89725f155024d266ad5
SHA14c47fdf61f41d2067062f1c5b95534684c4213d7
SHA256264b42e06856ac6c4820deb9a6bdffb071a95927b2f55664c78c9c92655c7fbe
SHA512d25ab8c437d70d19947725cdbe7b883d9c6e610c9d3b3f61da9ac34648162942ed99bb8e1b93f02ca60eb120b640bde20b13e4c74edb0ed3a28d66858c7f52cf
-
Filesize
380KB
MD5f939f43160224737850f888f07a0b867
SHA164ebebf9dfa9ba97579077de72891c14b3995501
SHA2567dc780d4c46ddc759f5b90184a6e0b8cd1713b600e2e4b4c79ae0fb0b48fd865
SHA512d8717d2a179a9cf8a9111a27e64ad275a90fd5a980d6b02f16219c12f9ce1bee2109bd64637c2405cbe675a0366011ade3ccd4a3751b5282be4910f387917f1c
-
Filesize
380KB
MD5f939f43160224737850f888f07a0b867
SHA164ebebf9dfa9ba97579077de72891c14b3995501
SHA2567dc780d4c46ddc759f5b90184a6e0b8cd1713b600e2e4b4c79ae0fb0b48fd865
SHA512d8717d2a179a9cf8a9111a27e64ad275a90fd5a980d6b02f16219c12f9ce1bee2109bd64637c2405cbe675a0366011ade3ccd4a3751b5282be4910f387917f1c
-
Filesize
11KB
MD5fbf65b9904bf8833e09530f06f4fe032
SHA18c3f9e3e7aab0694931a6423de920deef2558e17
SHA25698dc95e8cb0a469932bbadf9a2ae7319533a331e85e5c862f9d06fada3255145
SHA512e1cf3cc6e5fc60533dc9afa48cbcbc394518c4cb2866be334dc7d215cbed2943dfc00ee859bb5159a706e6b9128ce6a93313a796dee1f6c17dc03d7df6dc1f5b
-
Filesize
11KB
MD5fbf65b9904bf8833e09530f06f4fe032
SHA18c3f9e3e7aab0694931a6423de920deef2558e17
SHA25698dc95e8cb0a469932bbadf9a2ae7319533a331e85e5c862f9d06fada3255145
SHA512e1cf3cc6e5fc60533dc9afa48cbcbc394518c4cb2866be334dc7d215cbed2943dfc00ee859bb5159a706e6b9128ce6a93313a796dee1f6c17dc03d7df6dc1f5b
-
Filesize
294KB
MD52ba0d851d5e3fa8248b40770ece9e45f
SHA1031b8741a3931643acf55c79adadd422cac377d9
SHA25643e97d9c703432e1a791d5c2fa572505610d3bf6415c89d37f1cd1a13869e447
SHA512a1a0d175a7d69a0ffa63949e71e259d1d489f4455ba2eb3e5dcd4cf3d5ec66a16eea3639dd4b1be73d6a4a1d27a48daa76dd8db987c29e03d59f2eef85625261
-
Filesize
294KB
MD52ba0d851d5e3fa8248b40770ece9e45f
SHA1031b8741a3931643acf55c79adadd422cac377d9
SHA25643e97d9c703432e1a791d5c2fa572505610d3bf6415c89d37f1cd1a13869e447
SHA512a1a0d175a7d69a0ffa63949e71e259d1d489f4455ba2eb3e5dcd4cf3d5ec66a16eea3639dd4b1be73d6a4a1d27a48daa76dd8db987c29e03d59f2eef85625261