Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:10
Static task
static1
Behavioral task
behavioral1
Sample
17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe
Resource
win10v2004-20230220-en
General
-
Target
17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe
-
Size
522KB
-
MD5
1d4b06de21837c4bc37ee379e1360529
-
SHA1
8be9357037567a0c9524e13246d2e6d8a60b668f
-
SHA256
17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d
-
SHA512
53ab1635c932d6e2ee639422dc09f9bff839fbb225fa68f9a00b47b4e20f5cadd95ee073ea592a219319afd79a3ef348fe41173554663bf639fa3580794561a9
-
SSDEEP
12288:bMrvy90wbReKKcv0DfjXiOpf8kP4HrzWK6hWWM9THx8OhHND:4yBgcsr2OOkQHWK60THxvp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr471714.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr471714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr471714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr471714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr471714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr471714.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr471714.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/180-158-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-161-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-159-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-163-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-165-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-167-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-169-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-171-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-173-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-175-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-177-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-179-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-181-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-183-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-185-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-187-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-189-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-191-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-193-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-195-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-197-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-199-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-201-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-203-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-205-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-207-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-209-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-211-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-213-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-215-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-217-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-219-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/180-221-0x0000000002730000-0x000000000276F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zilR5067.exejr471714.exeku535770.exelr386931.exepid process 4596 zilR5067.exe 736 jr471714.exe 180 ku535770.exe 4100 lr386931.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr471714.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr471714.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zilR5067.exe17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zilR5067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zilR5067.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3536 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 552 180 WerFault.exe ku535770.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr471714.exeku535770.exelr386931.exepid process 736 jr471714.exe 736 jr471714.exe 180 ku535770.exe 180 ku535770.exe 4100 lr386931.exe 4100 lr386931.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr471714.exeku535770.exelr386931.exedescription pid process Token: SeDebugPrivilege 736 jr471714.exe Token: SeDebugPrivilege 180 ku535770.exe Token: SeDebugPrivilege 4100 lr386931.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exezilR5067.exedescription pid process target process PID 3504 wrote to memory of 4596 3504 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe zilR5067.exe PID 3504 wrote to memory of 4596 3504 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe zilR5067.exe PID 3504 wrote to memory of 4596 3504 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe zilR5067.exe PID 4596 wrote to memory of 736 4596 zilR5067.exe jr471714.exe PID 4596 wrote to memory of 736 4596 zilR5067.exe jr471714.exe PID 4596 wrote to memory of 180 4596 zilR5067.exe ku535770.exe PID 4596 wrote to memory of 180 4596 zilR5067.exe ku535770.exe PID 4596 wrote to memory of 180 4596 zilR5067.exe ku535770.exe PID 3504 wrote to memory of 4100 3504 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe lr386931.exe PID 3504 wrote to memory of 4100 3504 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe lr386931.exe PID 3504 wrote to memory of 4100 3504 17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe lr386931.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe"C:\Users\Admin\AppData\Local\Temp\17669aebf7908470beaf891b026faefc60be64ddeca822a10a62697357a8f95d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilR5067.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilR5067.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr471714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr471714.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku535770.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku535770.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 180 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386931.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386931.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 180 -ip 1801⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386931.exeFilesize
175KB
MD580dcff3c2cdfebcf3c02f2009ad15cf4
SHA1172947bbfeda33439952a4adc2f8eda8ea67fbf3
SHA256235ff838d82d603ccbb07b65d3fe7dcc6313a7b41b1b88235d0a38edcddaab06
SHA5126aff27bf35e63a6dfbf732f621a5a4e827d45090358715cb431d148b5fed92d46b9c336e6ebd4f4860653ff9a1cf39353df6d0ae32615243d1650ea4941b84b7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386931.exeFilesize
175KB
MD580dcff3c2cdfebcf3c02f2009ad15cf4
SHA1172947bbfeda33439952a4adc2f8eda8ea67fbf3
SHA256235ff838d82d603ccbb07b65d3fe7dcc6313a7b41b1b88235d0a38edcddaab06
SHA5126aff27bf35e63a6dfbf732f621a5a4e827d45090358715cb431d148b5fed92d46b9c336e6ebd4f4860653ff9a1cf39353df6d0ae32615243d1650ea4941b84b7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilR5067.exeFilesize
380KB
MD56f88100bec14917d26dce61265de4c64
SHA164f9287220ab15e994c22c0ac3eac757d7abe0c9
SHA256d400777599d8bead11f7b02240a499c1ad0aa539cbb06bf48db81a43b49eff92
SHA512c93e081d24322fb88b43e772b5168f05afe475a141ff9c4ed5c318a974f4f1318a9aea5f8c0f888ac902f89cf8fdc702ff7cabfc5bdcbe57a9d85f95a71e4508
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilR5067.exeFilesize
380KB
MD56f88100bec14917d26dce61265de4c64
SHA164f9287220ab15e994c22c0ac3eac757d7abe0c9
SHA256d400777599d8bead11f7b02240a499c1ad0aa539cbb06bf48db81a43b49eff92
SHA512c93e081d24322fb88b43e772b5168f05afe475a141ff9c4ed5c318a974f4f1318a9aea5f8c0f888ac902f89cf8fdc702ff7cabfc5bdcbe57a9d85f95a71e4508
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr471714.exeFilesize
15KB
MD5212ce31009677b73279e44790259adb7
SHA1280041c05d1da9dff0fe1295927e70a5fcf991d0
SHA256303572c17708d952912a32fa907791143f2b8d39b0ce49f7d753c7edd69a8a2c
SHA5121473f3487d918c60e163ab72cc0a711647441b9573598859cafc679c99ac7ea84f845b8dd2d60b1492dd982834ee9648388b6790e545ecb16de25b11aa949286
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr471714.exeFilesize
15KB
MD5212ce31009677b73279e44790259adb7
SHA1280041c05d1da9dff0fe1295927e70a5fcf991d0
SHA256303572c17708d952912a32fa907791143f2b8d39b0ce49f7d753c7edd69a8a2c
SHA5121473f3487d918c60e163ab72cc0a711647441b9573598859cafc679c99ac7ea84f845b8dd2d60b1492dd982834ee9648388b6790e545ecb16de25b11aa949286
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku535770.exeFilesize
294KB
MD54666c68df879fa10e14f35a902fdd3f2
SHA1eaeee69393c997e519f7748afc23dc10f03325a8
SHA256515148d96fd691c3fc8575fc1ceeac4c96fd294d95faf98cb1b8d3b33585e743
SHA512d9a0beeaa4868917adb5e4ad74c37fbc3d5634cc3f41188ffd5f17968a87d52dfa3e1bb11221fa677360512ac33e0766036fab13eb707cad7086e50a917de9d4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku535770.exeFilesize
294KB
MD54666c68df879fa10e14f35a902fdd3f2
SHA1eaeee69393c997e519f7748afc23dc10f03325a8
SHA256515148d96fd691c3fc8575fc1ceeac4c96fd294d95faf98cb1b8d3b33585e743
SHA512d9a0beeaa4868917adb5e4ad74c37fbc3d5634cc3f41188ffd5f17968a87d52dfa3e1bb11221fa677360512ac33e0766036fab13eb707cad7086e50a917de9d4
-
memory/180-153-0x0000000000710000-0x000000000075B000-memory.dmpFilesize
300KB
-
memory/180-154-0x0000000004AF0000-0x0000000005094000-memory.dmpFilesize
5.6MB
-
memory/180-155-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-156-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-157-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-158-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-161-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-159-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-163-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-165-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-167-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-169-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-171-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-173-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-175-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-177-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-179-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-181-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-183-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-185-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-187-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-189-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-191-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-193-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-195-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-197-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-199-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-201-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-203-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-205-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-207-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-209-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-211-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-213-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-215-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-217-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-219-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-221-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/180-1064-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/180-1065-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/180-1067-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/180-1066-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-1068-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/180-1070-0x0000000000710000-0x000000000075B000-memory.dmpFilesize
300KB
-
memory/180-1071-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/180-1072-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/180-1073-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-1074-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-1075-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/180-1076-0x0000000006370000-0x0000000006532000-memory.dmpFilesize
1.8MB
-
memory/180-1077-0x0000000006540000-0x0000000006A6C000-memory.dmpFilesize
5.2MB
-
memory/180-1078-0x0000000006CC0000-0x0000000006D36000-memory.dmpFilesize
472KB
-
memory/180-1079-0x0000000006D40000-0x0000000006D90000-memory.dmpFilesize
320KB
-
memory/180-1080-0x0000000002480000-0x0000000002490000-memory.dmpFilesize
64KB
-
memory/736-147-0x00000000004B0000-0x00000000004BA000-memory.dmpFilesize
40KB
-
memory/4100-1086-0x0000000000A40000-0x0000000000A72000-memory.dmpFilesize
200KB
-
memory/4100-1087-0x0000000005310000-0x0000000005320000-memory.dmpFilesize
64KB
-
memory/4100-1088-0x0000000005310000-0x0000000005320000-memory.dmpFilesize
64KB