Analysis
-
max time kernel
87s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:05
Static task
static1
Behavioral task
behavioral1
Sample
bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe
Resource
win10v2004-20230220-en
General
-
Target
bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe
-
Size
522KB
-
MD5
e5541070d7bf77a64ac134c982b7471d
-
SHA1
1e48198ce73b4eabe3369a1efd89952c57631f66
-
SHA256
bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8
-
SHA512
6b53a337bd2de6d47e4bcc984e10828f3e770434abaca6ec794502e37554a2c927d1d141742430ca485caaabb97f233f2da8a385392bd04d3ed83a7324df05fd
-
SSDEEP
12288:PMrRy90b+hQwNclmXVuTNmq+rCOqCy8nH4URzWKj0+Slu8WHpi:+yDvTUmq/On7nYUkKjfvs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr897748.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr897748.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr897748.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr897748.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr897748.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr897748.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr897748.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/928-155-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-158-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-156-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-160-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-162-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-164-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-166-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-168-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-170-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-172-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-175-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-178-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-181-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-183-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-185-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-187-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-189-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-191-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-193-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-195-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-197-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-199-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-201-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-203-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-205-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-207-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-209-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-211-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-213-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-215-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-217-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-219-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/928-221-0x0000000002610000-0x000000000264F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziSy2409.exejr897748.exeku341642.exelr029459.exepid process 396 ziSy2409.exe 2192 jr897748.exe 928 ku341642.exe 4440 lr029459.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr897748.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr897748.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exeziSy2409.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziSy2409.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziSy2409.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5032 928 WerFault.exe ku341642.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr897748.exeku341642.exelr029459.exepid process 2192 jr897748.exe 2192 jr897748.exe 928 ku341642.exe 928 ku341642.exe 4440 lr029459.exe 4440 lr029459.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr897748.exeku341642.exelr029459.exedescription pid process Token: SeDebugPrivilege 2192 jr897748.exe Token: SeDebugPrivilege 928 ku341642.exe Token: SeDebugPrivilege 4440 lr029459.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exeziSy2409.exedescription pid process target process PID 2340 wrote to memory of 396 2340 bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe ziSy2409.exe PID 2340 wrote to memory of 396 2340 bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe ziSy2409.exe PID 2340 wrote to memory of 396 2340 bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe ziSy2409.exe PID 396 wrote to memory of 2192 396 ziSy2409.exe jr897748.exe PID 396 wrote to memory of 2192 396 ziSy2409.exe jr897748.exe PID 396 wrote to memory of 928 396 ziSy2409.exe ku341642.exe PID 396 wrote to memory of 928 396 ziSy2409.exe ku341642.exe PID 396 wrote to memory of 928 396 ziSy2409.exe ku341642.exe PID 2340 wrote to memory of 4440 2340 bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe lr029459.exe PID 2340 wrote to memory of 4440 2340 bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe lr029459.exe PID 2340 wrote to memory of 4440 2340 bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe lr029459.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe"C:\Users\Admin\AppData\Local\Temp\bedd4eb67e22f86bb25330c96cc2471e7739f71180b227784bf7526895ecf4d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSy2409.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSy2409.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897748.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897748.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku341642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku341642.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 13484⤵
- Program crash
PID:5032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr029459.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr029459.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 928 -ip 9281⤵PID:1308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD597655622500547a20086f072e14f27b6
SHA1abb0192ad969d04a958c6285ec1dc38c9c039807
SHA256f8c27cb1745fd8069761f427097539bb3baedaf1a0524da589e70422f56b05a9
SHA5127b30eec3629c8c0fed39a911bc79df301f9c4161f23abe9fcdf2a0fcff1f7d469fb1d294bb44023d00d604efc73041f8f3bcb41fab8ce8523779fb627abcbacc
-
Filesize
175KB
MD597655622500547a20086f072e14f27b6
SHA1abb0192ad969d04a958c6285ec1dc38c9c039807
SHA256f8c27cb1745fd8069761f427097539bb3baedaf1a0524da589e70422f56b05a9
SHA5127b30eec3629c8c0fed39a911bc79df301f9c4161f23abe9fcdf2a0fcff1f7d469fb1d294bb44023d00d604efc73041f8f3bcb41fab8ce8523779fb627abcbacc
-
Filesize
380KB
MD58189323dfa32bdf62b575cb254bf026a
SHA15bba530b2fe5dfcd6a26d37a3e846d8b7aa2c6ca
SHA2561138bd01dffc7e59c7705e09b8bcfcb82b96a0a1b7617680961f9bf0b6d49527
SHA512867d773128929ccb2b6712a0bbd7ea13e7bc14e9d7024660c884be86e33a93b06266123ece8670185454f89197c6dd8eaca14afb588e4d994554e70160afbbcc
-
Filesize
380KB
MD58189323dfa32bdf62b575cb254bf026a
SHA15bba530b2fe5dfcd6a26d37a3e846d8b7aa2c6ca
SHA2561138bd01dffc7e59c7705e09b8bcfcb82b96a0a1b7617680961f9bf0b6d49527
SHA512867d773128929ccb2b6712a0bbd7ea13e7bc14e9d7024660c884be86e33a93b06266123ece8670185454f89197c6dd8eaca14afb588e4d994554e70160afbbcc
-
Filesize
11KB
MD5aa46d4bf4606952be17316b92da15b22
SHA10de9bdb78f8e9b41964e3dd8d2965ee06e205c55
SHA25606d36c25e3ab9c46c718ffe402580120e21bbe4a90ab3e3adf55c5e0fd12dfc7
SHA5120b443e72d6ea7c891995a190f2e475a7b69ddf506c54ee2feeb58c925451e6e16764295cef114b7ea524bb24afca0708db3ac06282f37be9fc22ae2a4b6e4aba
-
Filesize
11KB
MD5aa46d4bf4606952be17316b92da15b22
SHA10de9bdb78f8e9b41964e3dd8d2965ee06e205c55
SHA25606d36c25e3ab9c46c718ffe402580120e21bbe4a90ab3e3adf55c5e0fd12dfc7
SHA5120b443e72d6ea7c891995a190f2e475a7b69ddf506c54ee2feeb58c925451e6e16764295cef114b7ea524bb24afca0708db3ac06282f37be9fc22ae2a4b6e4aba
-
Filesize
294KB
MD5df92d8ba518c9623162117e1edfacf9f
SHA157137f1f08e5d85d661856f706d2ac4cde780950
SHA25654b1f775c7bbfaa12e246e508bd742a70e5d48aa5a521748542253543e42cf2e
SHA51272a05abc7a8585fd14d6588b914f747845fce51e5398b02dea2333bb656ffda5cad057a20a8ab02afc4cb4d0595453b665e5f135326cb69e271f0245cd3f5e55
-
Filesize
294KB
MD5df92d8ba518c9623162117e1edfacf9f
SHA157137f1f08e5d85d661856f706d2ac4cde780950
SHA25654b1f775c7bbfaa12e246e508bd742a70e5d48aa5a521748542253543e42cf2e
SHA51272a05abc7a8585fd14d6588b914f747845fce51e5398b02dea2333bb656ffda5cad057a20a8ab02afc4cb4d0595453b665e5f135326cb69e271f0245cd3f5e55