Analysis
-
max time kernel
103s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:17
Static task
static1
Behavioral task
behavioral1
Sample
58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe
Resource
win10v2004-20230220-en
General
-
Target
58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe
-
Size
522KB
-
MD5
1c05974cb349c22fa4166005eaf04a48
-
SHA1
5b80a7cde8be3e43f15d4ad974f0a1c85394bcfb
-
SHA256
58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200
-
SHA512
d14c408efeff5fd6d65c4cb596063bce9754804e51eba6dfbf81c37433de4770e9d2ed7f7ba1a672f0c161d3582f9a21bfb531ad41439fc294f3ec4915f4b82e
-
SSDEEP
12288:vMr1y90CwyXF0wP7DN2tu1M9J238wz44pzWywEZvImirzvI:uyp+wj13swM4sy+dfvI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr992813.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr992813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr992813.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr992813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr992813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr992813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr992813.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/4600-156-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-157-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-159-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-161-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-163-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-165-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-167-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-169-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-171-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-175-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-178-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-180-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-182-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-184-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-186-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-188-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4600-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziNp3194.exejr992813.exeku413393.exelr386009.exepid process 3564 ziNp3194.exe 552 jr992813.exe 4600 ku413393.exe 4176 lr386009.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr992813.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr992813.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziNp3194.exe58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNp3194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNp3194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3316 4600 WerFault.exe ku413393.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr992813.exeku413393.exelr386009.exepid process 552 jr992813.exe 552 jr992813.exe 4600 ku413393.exe 4600 ku413393.exe 4176 lr386009.exe 4176 lr386009.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr992813.exeku413393.exelr386009.exedescription pid process Token: SeDebugPrivilege 552 jr992813.exe Token: SeDebugPrivilege 4600 ku413393.exe Token: SeDebugPrivilege 4176 lr386009.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exeziNp3194.exedescription pid process target process PID 4936 wrote to memory of 3564 4936 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe ziNp3194.exe PID 4936 wrote to memory of 3564 4936 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe ziNp3194.exe PID 4936 wrote to memory of 3564 4936 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe ziNp3194.exe PID 3564 wrote to memory of 552 3564 ziNp3194.exe jr992813.exe PID 3564 wrote to memory of 552 3564 ziNp3194.exe jr992813.exe PID 3564 wrote to memory of 4600 3564 ziNp3194.exe ku413393.exe PID 3564 wrote to memory of 4600 3564 ziNp3194.exe ku413393.exe PID 3564 wrote to memory of 4600 3564 ziNp3194.exe ku413393.exe PID 4936 wrote to memory of 4176 4936 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe lr386009.exe PID 4936 wrote to memory of 4176 4936 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe lr386009.exe PID 4936 wrote to memory of 4176 4936 58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe lr386009.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe"C:\Users\Admin\AppData\Local\Temp\58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNp3194.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNp3194.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr992813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr992813.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku413393.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku413393.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 13284⤵
- Program crash
PID:3316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386009.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4600 -ip 46001⤵PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50b67025398f753671e101920146fc18a
SHA1d5fe60a42982cd0ad8fbcea455eaa45c381b33e5
SHA25674d3553535ee5d0e3bb89b06714ff807e0a44decdc40a40ed526edf946d59554
SHA5127d564c78b930f81f5b8b2f439bb2314129287bd8b5627b3591b0e7edc5f531c1895ba96579c5c71f2c9a070788e620331d85124ce6c35192466497956595586a
-
Filesize
175KB
MD50b67025398f753671e101920146fc18a
SHA1d5fe60a42982cd0ad8fbcea455eaa45c381b33e5
SHA25674d3553535ee5d0e3bb89b06714ff807e0a44decdc40a40ed526edf946d59554
SHA5127d564c78b930f81f5b8b2f439bb2314129287bd8b5627b3591b0e7edc5f531c1895ba96579c5c71f2c9a070788e620331d85124ce6c35192466497956595586a
-
Filesize
380KB
MD5ba3c4acb8908e244812cbfd2ef0cce83
SHA1b0dbadc2af7617cafe55691bb76f94393869d92f
SHA256118123dcaa3527b911dc5f7ffb09c08337a2cfcf6fb1e5802a47c7801b27b0ee
SHA512c3ba512c02c6a92b19b06ad5a7367c767977e333660ab887bf55fcb7bb8f795ac648fb71c352b57812d77e9b7883effa8b54c3e17af15ef54885643b9b01b11c
-
Filesize
380KB
MD5ba3c4acb8908e244812cbfd2ef0cce83
SHA1b0dbadc2af7617cafe55691bb76f94393869d92f
SHA256118123dcaa3527b911dc5f7ffb09c08337a2cfcf6fb1e5802a47c7801b27b0ee
SHA512c3ba512c02c6a92b19b06ad5a7367c767977e333660ab887bf55fcb7bb8f795ac648fb71c352b57812d77e9b7883effa8b54c3e17af15ef54885643b9b01b11c
-
Filesize
15KB
MD557490e1635a0965ed5cd98141e551d33
SHA16002eb78ac2098f4379eca4af5a92a8f9202e395
SHA256c3f2af6930a329a9157bd02ed0e7fbd7b9df8a353fe155e6bdda759bc3ef9719
SHA512d911b83aadcbd23b06966b7875666721efe56cdce46b806574b7fe762edb039a310af3f17a2132a8a83246fe6b72d561a1adebacfd392106d37c8ff46edd92ec
-
Filesize
15KB
MD557490e1635a0965ed5cd98141e551d33
SHA16002eb78ac2098f4379eca4af5a92a8f9202e395
SHA256c3f2af6930a329a9157bd02ed0e7fbd7b9df8a353fe155e6bdda759bc3ef9719
SHA512d911b83aadcbd23b06966b7875666721efe56cdce46b806574b7fe762edb039a310af3f17a2132a8a83246fe6b72d561a1adebacfd392106d37c8ff46edd92ec
-
Filesize
294KB
MD52e170e3c90ebac3b33e51ad273f1c7d5
SHA16dc5f23affd1ef4def15ad1e53c61f9b13292513
SHA256e05a03bf00ac82f12fb08aa753087f26e565e0cc4e2317970ad86d9145fa8c37
SHA5125a0fc0b655f89ead9e56f294329654d18154ad1a65fb322fad11e052ea30f7ddfa652489f71c4f1842e35418f7381a0d239992c8729eddf1ac14a1ec79ce4795
-
Filesize
294KB
MD52e170e3c90ebac3b33e51ad273f1c7d5
SHA16dc5f23affd1ef4def15ad1e53c61f9b13292513
SHA256e05a03bf00ac82f12fb08aa753087f26e565e0cc4e2317970ad86d9145fa8c37
SHA5125a0fc0b655f89ead9e56f294329654d18154ad1a65fb322fad11e052ea30f7ddfa652489f71c4f1842e35418f7381a0d239992c8729eddf1ac14a1ec79ce4795