Analysis
-
max time kernel
105s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:18
Static task
static1
Behavioral task
behavioral1
Sample
b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe
Resource
win10v2004-20230220-en
General
-
Target
b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe
-
Size
522KB
-
MD5
cf59c35c75a0e97d311113956505aa07
-
SHA1
db1a3d9b8cf5c0978b8f3b36b4273bfbf458719d
-
SHA256
b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d
-
SHA512
610c851adc789b49c01edf8bf4cf30083a32ae26f1680413f86a6c375415761a39f60702aa074dc1a2f045c459b2394816d26f8f217ed31ca98caff144559760
-
SSDEEP
12288:uMr6y906jF6FyszN7ZC2qh+AwTJLK8GJ4ubzWKpuzWGnc23:MyfbszN7jq4Aw1jGiuGKpiW3I
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr987757.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr987757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr987757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr987757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr987757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr987757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr987757.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3776-157-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-186-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/3776-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziHk6235.exejr987757.exeku517214.exelr121295.exepid process 4776 ziHk6235.exe 3920 jr987757.exe 3776 ku517214.exe 2868 lr121295.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr987757.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr987757.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exeziHk6235.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHk6235.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHk6235.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3368 3776 WerFault.exe ku517214.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr987757.exeku517214.exelr121295.exepid process 3920 jr987757.exe 3920 jr987757.exe 3776 ku517214.exe 3776 ku517214.exe 2868 lr121295.exe 2868 lr121295.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr987757.exeku517214.exelr121295.exedescription pid process Token: SeDebugPrivilege 3920 jr987757.exe Token: SeDebugPrivilege 3776 ku517214.exe Token: SeDebugPrivilege 2868 lr121295.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exeziHk6235.exedescription pid process target process PID 2264 wrote to memory of 4776 2264 b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe ziHk6235.exe PID 2264 wrote to memory of 4776 2264 b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe ziHk6235.exe PID 2264 wrote to memory of 4776 2264 b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe ziHk6235.exe PID 4776 wrote to memory of 3920 4776 ziHk6235.exe jr987757.exe PID 4776 wrote to memory of 3920 4776 ziHk6235.exe jr987757.exe PID 4776 wrote to memory of 3776 4776 ziHk6235.exe ku517214.exe PID 4776 wrote to memory of 3776 4776 ziHk6235.exe ku517214.exe PID 4776 wrote to memory of 3776 4776 ziHk6235.exe ku517214.exe PID 2264 wrote to memory of 2868 2264 b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe lr121295.exe PID 2264 wrote to memory of 2868 2264 b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe lr121295.exe PID 2264 wrote to memory of 2868 2264 b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe lr121295.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe"C:\Users\Admin\AppData\Local\Temp\b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3776 -ip 37761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exeFilesize
175KB
MD517918356f985217bfc8c5f196f4bf201
SHA160d12066125f703670258e503e184b0df8bde229
SHA256fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5
SHA5128af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exeFilesize
175KB
MD517918356f985217bfc8c5f196f4bf201
SHA160d12066125f703670258e503e184b0df8bde229
SHA256fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5
SHA5128af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exeFilesize
379KB
MD52b415aa65ba42c7a6f9ae4c81fad5b00
SHA149146ab217ce6ac1be1fb616417c68fcd64c5f0c
SHA2560362979c4cc7f180a8c119680ed4fff2cef6e31c6f3e39ab70f3589db7732125
SHA512c12b38de4191cfd579ab6ee4a4e14935d9e4a45bd8f222164eba6a667c35d6b14e33f6d59852e227c9843e1f27cd295583fcb12589cc739db45b9d104d487a5f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exeFilesize
379KB
MD52b415aa65ba42c7a6f9ae4c81fad5b00
SHA149146ab217ce6ac1be1fb616417c68fcd64c5f0c
SHA2560362979c4cc7f180a8c119680ed4fff2cef6e31c6f3e39ab70f3589db7732125
SHA512c12b38de4191cfd579ab6ee4a4e14935d9e4a45bd8f222164eba6a667c35d6b14e33f6d59852e227c9843e1f27cd295583fcb12589cc739db45b9d104d487a5f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exeFilesize
15KB
MD519bed85fe81a0924d8e2d21271133d82
SHA1bf8ef8613af4a1a929855d8670e11dc89229dee7
SHA256d5270df01e15e94242a49f77de966256e008f79f29d7d0bc2f26c8ce6c7bff92
SHA512bbe52470c9078c61f08df10c3a2ed79cb13381938611a6473b9d0ec959a8b23819eafb7bcdef5557f82d63617b1ae5f88d7faa89192d359f0ba056866ca5d468
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exeFilesize
15KB
MD519bed85fe81a0924d8e2d21271133d82
SHA1bf8ef8613af4a1a929855d8670e11dc89229dee7
SHA256d5270df01e15e94242a49f77de966256e008f79f29d7d0bc2f26c8ce6c7bff92
SHA512bbe52470c9078c61f08df10c3a2ed79cb13381938611a6473b9d0ec959a8b23819eafb7bcdef5557f82d63617b1ae5f88d7faa89192d359f0ba056866ca5d468
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exeFilesize
294KB
MD54e60bf28d0f23f22a80d025b22fe33db
SHA187c8b602b3ef7071d36a9794bbe61fe0b24ad10b
SHA256d9894f9c31dd093f0519ce57e1ef45aeec2f422355679056a2635c2c0f85a7d8
SHA5121cd7db349961b92ab5653572d3548f153d5fb1397efdb05626b024f499a3b751a1258f8a21cca1b8b90800bbc27c9292d32d2be657bd045321b4524e601440bf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exeFilesize
294KB
MD54e60bf28d0f23f22a80d025b22fe33db
SHA187c8b602b3ef7071d36a9794bbe61fe0b24ad10b
SHA256d9894f9c31dd093f0519ce57e1ef45aeec2f422355679056a2635c2c0f85a7d8
SHA5121cd7db349961b92ab5653572d3548f153d5fb1397efdb05626b024f499a3b751a1258f8a21cca1b8b90800bbc27c9292d32d2be657bd045321b4524e601440bf
-
memory/2868-1085-0x0000000000960000-0x0000000000992000-memory.dmpFilesize
200KB
-
memory/2868-1086-0x0000000005570000-0x0000000005580000-memory.dmpFilesize
64KB
-
memory/3776-194-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-203-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-156-0x0000000004B60000-0x0000000005104000-memory.dmpFilesize
5.6MB
-
memory/3776-157-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-158-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-160-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-162-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-164-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-166-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-168-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-170-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-172-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-174-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-176-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-178-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-180-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-182-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-186-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-184-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-188-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-190-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-192-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-154-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-195-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-197-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-199-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-201-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-155-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-205-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-207-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-209-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-211-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-213-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-215-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-217-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-219-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-221-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/3776-1064-0x0000000005210000-0x0000000005828000-memory.dmpFilesize
6.1MB
-
memory/3776-1065-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/3776-1066-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/3776-1067-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/3776-1070-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-1071-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-1072-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/3776-1073-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/3776-1074-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-1075-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/3776-1076-0x0000000006620000-0x0000000006670000-memory.dmpFilesize
320KB
-
memory/3776-153-0x0000000002120000-0x000000000216B000-memory.dmpFilesize
300KB
-
memory/3776-1077-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/3776-1078-0x0000000006910000-0x0000000006AD2000-memory.dmpFilesize
1.8MB
-
memory/3776-1079-0x0000000006B00000-0x000000000702C000-memory.dmpFilesize
5.2MB
-
memory/3920-147-0x0000000000B00000-0x0000000000B0A000-memory.dmpFilesize
40KB