Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:07
Static task
static1
Behavioral task
behavioral1
Sample
d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe
Resource
win10v2004-20230220-en
General
-
Target
d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe
-
Size
521KB
-
MD5
5dce6c45cc4e87d660780f1430793b5b
-
SHA1
2d353744b1e8ec8ed5c4aa3f27c4901572388f18
-
SHA256
d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6
-
SHA512
2a3a6b3a0ae35aafc2fbb85d38798348d0f89f194adbd27406495f0af7efacb13917692635625477e8edf99691d4a43514c0aab69beb2d7bff2deb9400851407
-
SSDEEP
12288:XMrly90WprVNdvXilN8Eo4iIzWKv98ZGt:iyhprxvBEhiBKv4Gt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr903615.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr903615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr903615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr903615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr903615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr903615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr903615.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/464-158-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-161-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-159-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-163-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-165-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-167-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-169-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-171-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-173-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-175-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-177-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-179-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-181-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-183-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-185-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-187-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-189-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-191-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-193-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-195-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-197-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-199-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-201-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-203-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-205-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-207-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-209-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-211-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-213-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-215-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-217-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-219-0x0000000005050000-0x000000000508F000-memory.dmp family_redline behavioral1/memory/464-221-0x0000000005050000-0x000000000508F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziPx8218.exejr903615.exeku029872.exelr122049.exepid process 2420 ziPx8218.exe 1436 jr903615.exe 464 ku029872.exe 4760 lr122049.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr903615.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr903615.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exeziPx8218.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPx8218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPx8218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3600 464 WerFault.exe ku029872.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr903615.exeku029872.exelr122049.exepid process 1436 jr903615.exe 1436 jr903615.exe 464 ku029872.exe 464 ku029872.exe 4760 lr122049.exe 4760 lr122049.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr903615.exeku029872.exelr122049.exedescription pid process Token: SeDebugPrivilege 1436 jr903615.exe Token: SeDebugPrivilege 464 ku029872.exe Token: SeDebugPrivilege 4760 lr122049.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exeziPx8218.exedescription pid process target process PID 3948 wrote to memory of 2420 3948 d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe ziPx8218.exe PID 3948 wrote to memory of 2420 3948 d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe ziPx8218.exe PID 3948 wrote to memory of 2420 3948 d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe ziPx8218.exe PID 2420 wrote to memory of 1436 2420 ziPx8218.exe jr903615.exe PID 2420 wrote to memory of 1436 2420 ziPx8218.exe jr903615.exe PID 2420 wrote to memory of 464 2420 ziPx8218.exe ku029872.exe PID 2420 wrote to memory of 464 2420 ziPx8218.exe ku029872.exe PID 2420 wrote to memory of 464 2420 ziPx8218.exe ku029872.exe PID 3948 wrote to memory of 4760 3948 d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe lr122049.exe PID 3948 wrote to memory of 4760 3948 d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe lr122049.exe PID 3948 wrote to memory of 4760 3948 d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe lr122049.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe"C:\Users\Admin\AppData\Local\Temp\d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 13524⤵
- Program crash
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 464 -ip 4641⤵PID:2368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exeFilesize
175KB
MD53e9f12a1470bf968deed40f10827a7dd
SHA1012ad323ba6a599ac231f515a49086c5c1d4756e
SHA25690b153ca1cabcefc57375bc0e869ced1836c5945f66c2a0fd3ae032f2b2429ac
SHA5127bca41fd0ed6cf18d1a53f3de6cba0ddb8263fd6032477f22cbce1a2235928e9b40d9d66c77818b705e2e9dba66f55b1d8dff5e2d9736f125246c3140fe034a1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exeFilesize
175KB
MD53e9f12a1470bf968deed40f10827a7dd
SHA1012ad323ba6a599ac231f515a49086c5c1d4756e
SHA25690b153ca1cabcefc57375bc0e869ced1836c5945f66c2a0fd3ae032f2b2429ac
SHA5127bca41fd0ed6cf18d1a53f3de6cba0ddb8263fd6032477f22cbce1a2235928e9b40d9d66c77818b705e2e9dba66f55b1d8dff5e2d9736f125246c3140fe034a1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exeFilesize
379KB
MD57fffe8b78e412bb44916c0ec218d92d8
SHA1b8f3b2b810b9012e8339484a3b37d06090698e11
SHA256203545e99184f8d56602b0b78d55ed7350f3fbdcbeb9313945d4729340e71cd8
SHA51261ea112277ba5161eac7b294bb9189de55f2c4942f6cbce126d0807dae7fa595f73c51c349ac5931eebae21518e05f0305583f5373798fc5291dcd9d5ec06283
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exeFilesize
379KB
MD57fffe8b78e412bb44916c0ec218d92d8
SHA1b8f3b2b810b9012e8339484a3b37d06090698e11
SHA256203545e99184f8d56602b0b78d55ed7350f3fbdcbeb9313945d4729340e71cd8
SHA51261ea112277ba5161eac7b294bb9189de55f2c4942f6cbce126d0807dae7fa595f73c51c349ac5931eebae21518e05f0305583f5373798fc5291dcd9d5ec06283
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exeFilesize
15KB
MD5c656580f327ab19204df7dc6ac7d9dba
SHA12bf957c9c4d39af5dda2d8510ef4bfa9275b49a6
SHA25698add833621f9b73452c76cddb3a7b7e5415748f00c34d73bbd3c87d71d4fcd0
SHA5125fc2884034b82209447b0c404a6ea1e17f542defe59501905ee8f4fa2b9d7c3671a51246cac1c4ec6cd22d0e4100ae0804b770e811748122b159fdf990a19e0d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exeFilesize
15KB
MD5c656580f327ab19204df7dc6ac7d9dba
SHA12bf957c9c4d39af5dda2d8510ef4bfa9275b49a6
SHA25698add833621f9b73452c76cddb3a7b7e5415748f00c34d73bbd3c87d71d4fcd0
SHA5125fc2884034b82209447b0c404a6ea1e17f542defe59501905ee8f4fa2b9d7c3671a51246cac1c4ec6cd22d0e4100ae0804b770e811748122b159fdf990a19e0d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exeFilesize
294KB
MD5a0bacd141de22a587f52c564119757be
SHA1330c7c1885a6de80ed59572ff45818615bf73605
SHA25665a9ada7b0ae699f22a4bd00deab58ffdddb5707ae5a8a2e1025f2c84da29248
SHA512e99c404c8f836a608bcae779d1e3eee5fcfe0c86c3369209ddcb3af2593936303f31f4d62779033826f4b040d19890e1d9e8135d0020d13440eda35850acb209
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exeFilesize
294KB
MD5a0bacd141de22a587f52c564119757be
SHA1330c7c1885a6de80ed59572ff45818615bf73605
SHA25665a9ada7b0ae699f22a4bd00deab58ffdddb5707ae5a8a2e1025f2c84da29248
SHA512e99c404c8f836a608bcae779d1e3eee5fcfe0c86c3369209ddcb3af2593936303f31f4d62779033826f4b040d19890e1d9e8135d0020d13440eda35850acb209
-
memory/464-153-0x0000000000820000-0x000000000086B000-memory.dmpFilesize
300KB
-
memory/464-154-0x0000000004AA0000-0x0000000005044000-memory.dmpFilesize
5.6MB
-
memory/464-155-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-156-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-157-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-158-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-161-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-159-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-163-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-165-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-167-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-169-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-171-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-173-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-175-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-177-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-179-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-181-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-183-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-185-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-187-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-189-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-191-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-193-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-195-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-197-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-199-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-201-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-203-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-205-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-207-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-209-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-211-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-213-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-215-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-217-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-219-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-221-0x0000000005050000-0x000000000508F000-memory.dmpFilesize
252KB
-
memory/464-1064-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/464-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/464-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/464-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/464-1068-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-1070-0x0000000000820000-0x000000000086B000-memory.dmpFilesize
300KB
-
memory/464-1071-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/464-1072-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/464-1073-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-1074-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-1075-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/464-1076-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/464-1077-0x0000000006620000-0x0000000006670000-memory.dmpFilesize
320KB
-
memory/464-1078-0x00000000066A0000-0x0000000006862000-memory.dmpFilesize
1.8MB
-
memory/464-1079-0x0000000006880000-0x0000000006DAC000-memory.dmpFilesize
5.2MB
-
memory/464-1080-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/1436-147-0x00000000006F0000-0x00000000006FA000-memory.dmpFilesize
40KB
-
memory/4760-1087-0x0000000000D70000-0x0000000000DA2000-memory.dmpFilesize
200KB
-
memory/4760-1088-0x0000000005670000-0x0000000005680000-memory.dmpFilesize
64KB
-
memory/4760-1089-0x0000000005670000-0x0000000005680000-memory.dmpFilesize
64KB