Analysis
-
max time kernel
65s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:50
Static task
static1
Behavioral task
behavioral1
Sample
a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe
Resource
win10v2004-20230220-en
General
-
Target
a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe
-
Size
522KB
-
MD5
437f9f372385aa7b3f093f643c66a6c7
-
SHA1
cb1bb95c9307af44af0a06cb93b6ed92f09f04ba
-
SHA256
a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8
-
SHA512
5af137b660faa10e8178cd2ba5db867c602031f084a620b926340267e397826b0e5114af3d2841ade57994181463f5cee44166b03ddf420b5dfacb7aed4ea1e7
-
SSDEEP
12288:/Mruy90LCICjbOm1NTCYcSZ81G4vpzWKH64q6xXpo:Vy4m1hCYcb1vvsKa4qaX2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr487954.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr487954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr487954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr487954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr487954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr487954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr487954.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/336-158-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-159-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-161-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-163-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-165-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-167-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-169-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-171-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-173-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-175-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-177-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-179-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-181-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-183-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-185-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-187-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-189-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-191-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-193-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-195-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-197-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-199-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-201-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-205-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-203-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-207-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-209-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-211-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-213-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-215-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-217-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-219-0x0000000002400000-0x000000000243F000-memory.dmp family_redline behavioral1/memory/336-221-0x0000000002400000-0x000000000243F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziAl7715.exejr487954.exeku478932.exelr891094.exepid process 732 ziAl7715.exe 3896 jr487954.exe 336 ku478932.exe 2872 lr891094.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr487954.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr487954.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exeziAl7715.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAl7715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAl7715.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4236 336 WerFault.exe ku478932.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr487954.exeku478932.exelr891094.exepid process 3896 jr487954.exe 3896 jr487954.exe 336 ku478932.exe 336 ku478932.exe 2872 lr891094.exe 2872 lr891094.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr487954.exeku478932.exelr891094.exedescription pid process Token: SeDebugPrivilege 3896 jr487954.exe Token: SeDebugPrivilege 336 ku478932.exe Token: SeDebugPrivilege 2872 lr891094.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exeziAl7715.exedescription pid process target process PID 3888 wrote to memory of 732 3888 a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe ziAl7715.exe PID 3888 wrote to memory of 732 3888 a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe ziAl7715.exe PID 3888 wrote to memory of 732 3888 a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe ziAl7715.exe PID 732 wrote to memory of 3896 732 ziAl7715.exe jr487954.exe PID 732 wrote to memory of 3896 732 ziAl7715.exe jr487954.exe PID 732 wrote to memory of 336 732 ziAl7715.exe ku478932.exe PID 732 wrote to memory of 336 732 ziAl7715.exe ku478932.exe PID 732 wrote to memory of 336 732 ziAl7715.exe ku478932.exe PID 3888 wrote to memory of 2872 3888 a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe lr891094.exe PID 3888 wrote to memory of 2872 3888 a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe lr891094.exe PID 3888 wrote to memory of 2872 3888 a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe lr891094.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe"C:\Users\Admin\AppData\Local\Temp\a24db565569f81a1b0f22235d779aa025691f7f2a5173b09432baae34c286ee8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAl7715.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAl7715.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487954.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478932.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 16684⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr891094.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr891094.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 336 -ip 3361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr891094.exeFilesize
175KB
MD50acf1c7d0ff7e4e828d86a7f1ef6ceba
SHA1024b084cb5623653f5405c98722fcb1c4f510377
SHA256c587fd77a93d7638ff072dcf404b6a62040abafaad2a4c84dece14cda6a52f87
SHA51272fc2994386102fc9d0e8ac6545012c80615f4524a83103a83117a7bcb3dc1334b095f1e278d67c226fa97f1072b5d1e09f3695ff793bbf7b7f33f352dd4f921
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr891094.exeFilesize
175KB
MD50acf1c7d0ff7e4e828d86a7f1ef6ceba
SHA1024b084cb5623653f5405c98722fcb1c4f510377
SHA256c587fd77a93d7638ff072dcf404b6a62040abafaad2a4c84dece14cda6a52f87
SHA51272fc2994386102fc9d0e8ac6545012c80615f4524a83103a83117a7bcb3dc1334b095f1e278d67c226fa97f1072b5d1e09f3695ff793bbf7b7f33f352dd4f921
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAl7715.exeFilesize
380KB
MD5c35a9a2ac0c0d6fee149bde95ce3e71f
SHA1aa387ca6e9131ae5b446d17b983b40d34679a488
SHA256c9900391b34cd5d684bcaff14cd977337fc37bee071d19842890500ce422fd9c
SHA512e5ccb79e543029f29ffbdb343a3b0bdada42055e0246cc96735c5eda616f6922d183e3b5a02a33c86c6b1962eefd48f64e22794c630541192bd413f2967f65d9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAl7715.exeFilesize
380KB
MD5c35a9a2ac0c0d6fee149bde95ce3e71f
SHA1aa387ca6e9131ae5b446d17b983b40d34679a488
SHA256c9900391b34cd5d684bcaff14cd977337fc37bee071d19842890500ce422fd9c
SHA512e5ccb79e543029f29ffbdb343a3b0bdada42055e0246cc96735c5eda616f6922d183e3b5a02a33c86c6b1962eefd48f64e22794c630541192bd413f2967f65d9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487954.exeFilesize
11KB
MD5f972a7ac085e6c32b6c52bd0cd379c57
SHA1acc5aa28ded5e648f4693b0ce1ebcf7795fd21ec
SHA256410bed8f20fedc3e27a5e6b6364d33a45a5d39792c5893af1087afdf9a975a87
SHA5127fabfaf45072558fb6fab2630c78b05c9bc893a1962c4ddc1822cc65e2550336d7732acc97735399b61e2a783d8fdc451690c90a4c2186e914b155f88ba4b2cf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487954.exeFilesize
11KB
MD5f972a7ac085e6c32b6c52bd0cd379c57
SHA1acc5aa28ded5e648f4693b0ce1ebcf7795fd21ec
SHA256410bed8f20fedc3e27a5e6b6364d33a45a5d39792c5893af1087afdf9a975a87
SHA5127fabfaf45072558fb6fab2630c78b05c9bc893a1962c4ddc1822cc65e2550336d7732acc97735399b61e2a783d8fdc451690c90a4c2186e914b155f88ba4b2cf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478932.exeFilesize
294KB
MD568cf4624791e6790bd8762afb3e8a06b
SHA16497ceb1677438be3553c757691967eb434229fa
SHA256390527a6d049b0d50441015069f5e3df399a732a25f30c3789e378d5ad315505
SHA512badb9055c83372dd6f8745f4976a18ae00d826b15b1222b8ecd883988a8a075d002e62fa62acf36426ef86de8c1889da0401c58f036130bf20cb101ca6735a3e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478932.exeFilesize
294KB
MD568cf4624791e6790bd8762afb3e8a06b
SHA16497ceb1677438be3553c757691967eb434229fa
SHA256390527a6d049b0d50441015069f5e3df399a732a25f30c3789e378d5ad315505
SHA512badb9055c83372dd6f8745f4976a18ae00d826b15b1222b8ecd883988a8a075d002e62fa62acf36426ef86de8c1889da0401c58f036130bf20cb101ca6735a3e
-
memory/336-153-0x0000000004D30000-0x00000000052D4000-memory.dmpFilesize
5.6MB
-
memory/336-154-0x0000000002040000-0x000000000208B000-memory.dmpFilesize
300KB
-
memory/336-155-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-156-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-157-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-158-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-159-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-161-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-163-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-165-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-167-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-169-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-171-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-173-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-175-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-177-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-179-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-181-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-183-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-185-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-187-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-189-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-191-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-193-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-195-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-197-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-199-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-201-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-205-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-203-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-207-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-209-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-211-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-213-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-215-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-217-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-219-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-221-0x0000000002400000-0x000000000243F000-memory.dmpFilesize
252KB
-
memory/336-1064-0x00000000052E0000-0x00000000058F8000-memory.dmpFilesize
6.1MB
-
memory/336-1065-0x0000000005900000-0x0000000005A0A000-memory.dmpFilesize
1.0MB
-
memory/336-1066-0x0000000002760000-0x0000000002772000-memory.dmpFilesize
72KB
-
memory/336-1067-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-1068-0x0000000002780000-0x00000000027BC000-memory.dmpFilesize
240KB
-
memory/336-1070-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-1071-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-1072-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/336-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/336-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/336-1075-0x0000000006450000-0x00000000064C6000-memory.dmpFilesize
472KB
-
memory/336-1076-0x00000000064E0000-0x0000000006530000-memory.dmpFilesize
320KB
-
memory/336-1077-0x00000000066A0000-0x0000000006862000-memory.dmpFilesize
1.8MB
-
memory/336-1078-0x0000000006880000-0x0000000006DAC000-memory.dmpFilesize
5.2MB
-
memory/336-1079-0x0000000002440000-0x0000000002450000-memory.dmpFilesize
64KB
-
memory/2872-1085-0x0000000000060000-0x0000000000092000-memory.dmpFilesize
200KB
-
memory/2872-1086-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/2872-1087-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/3896-147-0x0000000000C20000-0x0000000000C2A000-memory.dmpFilesize
40KB