Analysis
-
max time kernel
82s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:15
Static task
static1
Behavioral task
behavioral1
Sample
645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe
Resource
win10v2004-20230220-en
General
-
Target
645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe
-
Size
522KB
-
MD5
94101b9af08097b91f9e0a6df7fb55fb
-
SHA1
1b87ac47b958f2a6d53b53c5fe54f8658d7ba284
-
SHA256
645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c
-
SHA512
2bfb46b0003bf074c6879651b3f1a9d28b5b4de0d04953b9cdc2487c973c6e2e7654bb01a5c098f7f50a3e91e1bd6f5ed9bc4d415f5ee2325d5aaaaaba3be5e2
-
SSDEEP
12288:OMr2y9061k0shlcr6m0N38r64sbzWKAe/QvCf4KS5I:gyONhl26m0Nsr7sGKAeII4Z5I
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr201401.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr201401.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr201401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr201401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr201401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr201401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr201401.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1456-156-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-159-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-157-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-161-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-163-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-165-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-167-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-170-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-172-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-174-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-176-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-178-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-180-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-182-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-184-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-186-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-188-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-190-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-192-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-194-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-196-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-198-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-200-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-202-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-204-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-208-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-206-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-210-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-212-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-214-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-216-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-218-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-220-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1456-1070-0x0000000004B70000-0x0000000004B80000-memory.dmp family_redline behavioral1/memory/1456-1071-0x0000000004B70000-0x0000000004B80000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziNx9267.exejr201401.exeku904783.exelr378936.exepid process 780 ziNx9267.exe 4488 jr201401.exe 1456 ku904783.exe 5092 lr378936.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr201401.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr201401.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exeziNx9267.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNx9267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNx9267.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3196 1456 WerFault.exe ku904783.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr201401.exeku904783.exelr378936.exepid process 4488 jr201401.exe 4488 jr201401.exe 1456 ku904783.exe 1456 ku904783.exe 5092 lr378936.exe 5092 lr378936.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr201401.exeku904783.exelr378936.exedescription pid process Token: SeDebugPrivilege 4488 jr201401.exe Token: SeDebugPrivilege 1456 ku904783.exe Token: SeDebugPrivilege 5092 lr378936.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exeziNx9267.exedescription pid process target process PID 1240 wrote to memory of 780 1240 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe ziNx9267.exe PID 1240 wrote to memory of 780 1240 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe ziNx9267.exe PID 1240 wrote to memory of 780 1240 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe ziNx9267.exe PID 780 wrote to memory of 4488 780 ziNx9267.exe jr201401.exe PID 780 wrote to memory of 4488 780 ziNx9267.exe jr201401.exe PID 780 wrote to memory of 1456 780 ziNx9267.exe ku904783.exe PID 780 wrote to memory of 1456 780 ziNx9267.exe ku904783.exe PID 780 wrote to memory of 1456 780 ziNx9267.exe ku904783.exe PID 1240 wrote to memory of 5092 1240 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe lr378936.exe PID 1240 wrote to memory of 5092 1240 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe lr378936.exe PID 1240 wrote to memory of 5092 1240 645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe lr378936.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe"C:\Users\Admin\AppData\Local\Temp\645a10f0bb7c4655f04cef3ba2d49771a2ca463cf4d77f7922515ebbe72d011c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx9267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx9267.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr201401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr201401.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku904783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku904783.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 11524⤵
- Program crash
PID:3196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr378936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr378936.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1456 -ip 14561⤵PID:2132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD531b80a32e8683abf5f7db282efef6b7b
SHA19b00ccb5d04e87a4a07a29940ce6e9edc4a19502
SHA256a2dd5b67b18035fc9066f621cdd1dc728d0be9bebfe3e789554223f42de0c732
SHA5120bf24cb6b235a8b9ff1f55bf8479622de75db422f56242560ea8da4f2b46dc23817b75b6239cc05a1572405982f8cd2fe3cae01c15427bc98abad3ce79f41b62
-
Filesize
175KB
MD531b80a32e8683abf5f7db282efef6b7b
SHA19b00ccb5d04e87a4a07a29940ce6e9edc4a19502
SHA256a2dd5b67b18035fc9066f621cdd1dc728d0be9bebfe3e789554223f42de0c732
SHA5120bf24cb6b235a8b9ff1f55bf8479622de75db422f56242560ea8da4f2b46dc23817b75b6239cc05a1572405982f8cd2fe3cae01c15427bc98abad3ce79f41b62
-
Filesize
379KB
MD5189cc4edf7f6d32e0341655a6f57367c
SHA1c2dfaf4aea3bf2fddb7da1d538e1c8e343447574
SHA25642aedaa41928857b08b2a1706a50e39ddca5fe36ee6c8ff6750139faba153dc4
SHA5122e09818ec113d036340ee786afd23c5f13ed3504a87f99e193f7c5200345d74967948d0b59c01139d74fd605ecf9c184573b33dd46c8b4192a7ab2ca06634e0e
-
Filesize
379KB
MD5189cc4edf7f6d32e0341655a6f57367c
SHA1c2dfaf4aea3bf2fddb7da1d538e1c8e343447574
SHA25642aedaa41928857b08b2a1706a50e39ddca5fe36ee6c8ff6750139faba153dc4
SHA5122e09818ec113d036340ee786afd23c5f13ed3504a87f99e193f7c5200345d74967948d0b59c01139d74fd605ecf9c184573b33dd46c8b4192a7ab2ca06634e0e
-
Filesize
15KB
MD5c564ded650ad8dd9117ed70d33fb7d59
SHA1ba3e58e19abd92adaff58b7b2cff051bf2f51efe
SHA256db88048ae4c160a86bb5f0675e34439170b522233d4068e4d9aac88576e7830e
SHA5121a2af27c359de30a32ef086cc4d4b93e2b191870b784f4f1a0777ecc505a3ba58614ad7cc3c5aafc838464d5073345ba1a68f3b6087c62616201e03f6ccba868
-
Filesize
15KB
MD5c564ded650ad8dd9117ed70d33fb7d59
SHA1ba3e58e19abd92adaff58b7b2cff051bf2f51efe
SHA256db88048ae4c160a86bb5f0675e34439170b522233d4068e4d9aac88576e7830e
SHA5121a2af27c359de30a32ef086cc4d4b93e2b191870b784f4f1a0777ecc505a3ba58614ad7cc3c5aafc838464d5073345ba1a68f3b6087c62616201e03f6ccba868
-
Filesize
294KB
MD525dd7ed8bc6c79813651b300c41857e6
SHA19cc0673192fad6b31c5329c4fb303a124fb9359b
SHA256113e8bb754d456e0e972d78bbc0bf117d6ac7fa3177aaa4c8c7704d669e07c73
SHA51282c495aa3b9d0dde1058e73bdee97379a0161ccca02ef2068018f814273264a8a34c947b7355aa05c99a4a7ee6a3d5efc17de9a9d8c9ffb0074ec0395b65d8dd
-
Filesize
294KB
MD525dd7ed8bc6c79813651b300c41857e6
SHA19cc0673192fad6b31c5329c4fb303a124fb9359b
SHA256113e8bb754d456e0e972d78bbc0bf117d6ac7fa3177aaa4c8c7704d669e07c73
SHA51282c495aa3b9d0dde1058e73bdee97379a0161ccca02ef2068018f814273264a8a34c947b7355aa05c99a4a7ee6a3d5efc17de9a9d8c9ffb0074ec0395b65d8dd