Analysis
-
max time kernel
70s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:20
Static task
static1
Behavioral task
behavioral1
Sample
bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe
Resource
win10v2004-20230220-en
General
-
Target
bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe
-
Size
521KB
-
MD5
8439bc55ae0209f383fc7039f47ca7c7
-
SHA1
202d7d2d8eb8ef1c019ad8e278062814a2d69026
-
SHA256
bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727
-
SHA512
c7ed0d7b11ab778bf50b500bcd2edb878fb2eb6c7ab62a23379463b69d3a14765a2933ce900097f3796bcf48828095efdbe5b629d574eda3251f64171f0f9211
-
SSDEEP
12288:2MrGy90iMPpP0LlZQOJKK8ph448zWDTiQOMElRu5F:AysaLzQJjpK41D+Q1ElyF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr403932.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr403932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr403932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr403932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr403932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr403932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr403932.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/2588-155-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-156-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-158-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-160-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-162-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-164-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-166-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-168-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-170-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-172-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-176-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-175-0x0000000002640000-0x0000000002650000-memory.dmp family_redline behavioral1/memory/2588-179-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-181-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-183-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-185-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-187-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-189-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-191-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-193-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-195-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-197-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-199-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-201-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-203-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-205-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-207-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-209-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-211-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-213-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-215-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-217-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-219-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2588-221-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziHX6166.exejr403932.exeku508585.exelr940386.exepid process 3200 ziHX6166.exe 2044 jr403932.exe 2588 ku508585.exe 524 lr940386.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr403932.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr403932.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exeziHX6166.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHX6166.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHX6166.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4228 2588 WerFault.exe ku508585.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr403932.exeku508585.exelr940386.exepid process 2044 jr403932.exe 2044 jr403932.exe 2588 ku508585.exe 2588 ku508585.exe 524 lr940386.exe 524 lr940386.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr403932.exeku508585.exelr940386.exedescription pid process Token: SeDebugPrivilege 2044 jr403932.exe Token: SeDebugPrivilege 2588 ku508585.exe Token: SeDebugPrivilege 524 lr940386.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exeziHX6166.exedescription pid process target process PID 4900 wrote to memory of 3200 4900 bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe ziHX6166.exe PID 4900 wrote to memory of 3200 4900 bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe ziHX6166.exe PID 4900 wrote to memory of 3200 4900 bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe ziHX6166.exe PID 3200 wrote to memory of 2044 3200 ziHX6166.exe jr403932.exe PID 3200 wrote to memory of 2044 3200 ziHX6166.exe jr403932.exe PID 3200 wrote to memory of 2588 3200 ziHX6166.exe ku508585.exe PID 3200 wrote to memory of 2588 3200 ziHX6166.exe ku508585.exe PID 3200 wrote to memory of 2588 3200 ziHX6166.exe ku508585.exe PID 4900 wrote to memory of 524 4900 bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe lr940386.exe PID 4900 wrote to memory of 524 4900 bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe lr940386.exe PID 4900 wrote to memory of 524 4900 bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe lr940386.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe"C:\Users\Admin\AppData\Local\Temp\bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 13284⤵
- Program crash
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2588 -ip 25881⤵PID:4260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exeFilesize
175KB
MD58b0bd4c8896fa1892c3cb0cd771e5ce0
SHA1719dad6b3df9635a037fa5804bf3950a5cef5d9c
SHA256b4d3c5e1316c5d38d2473804d248c3d970031a9becf7b341b9f4c1704452fb15
SHA5128f1b49b1cb4d7b35f995faa21bf15482b69edfe0dc2c5ddd983029a912476c908262c12fa8b57c1d6a28b2c8476a48764ee2288b6634ad990db91454b565963f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exeFilesize
175KB
MD58b0bd4c8896fa1892c3cb0cd771e5ce0
SHA1719dad6b3df9635a037fa5804bf3950a5cef5d9c
SHA256b4d3c5e1316c5d38d2473804d248c3d970031a9becf7b341b9f4c1704452fb15
SHA5128f1b49b1cb4d7b35f995faa21bf15482b69edfe0dc2c5ddd983029a912476c908262c12fa8b57c1d6a28b2c8476a48764ee2288b6634ad990db91454b565963f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exeFilesize
379KB
MD5942fc1e08648cf4e8bf607f6ebaca2cc
SHA16b83d4400e87130875d29a0186731aa6164cfb7a
SHA256466c72556c87ee5a359b686fa4d0725f41443e673a24d060e63021f53bf552da
SHA51204d30a5c6ab8ff20c7bfa13461a29a3476095f9a17e7af803c4a6fd024eac06a08aaeb78b976cabb178114e94371099d32c1cf60f16ada53f6d17a5ece7f5043
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exeFilesize
379KB
MD5942fc1e08648cf4e8bf607f6ebaca2cc
SHA16b83d4400e87130875d29a0186731aa6164cfb7a
SHA256466c72556c87ee5a359b686fa4d0725f41443e673a24d060e63021f53bf552da
SHA51204d30a5c6ab8ff20c7bfa13461a29a3476095f9a17e7af803c4a6fd024eac06a08aaeb78b976cabb178114e94371099d32c1cf60f16ada53f6d17a5ece7f5043
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exeFilesize
15KB
MD571046b87d2daf253a6121a0a3131424d
SHA11bed27f5477c0e0477d67dccc1c0b09613100222
SHA256546c3c6b876ebcd037a7c8e3fa84c3f112c32cb7d8935723838bc1e83f4f5648
SHA5125a6ed5947477f08e314a19b44ee0ae4a753a7ae7dd638dd92e032e45f3a3d5aebd4fd4745612d40193db4b572026ec69a88486cf8b5aa4d2cbeacd318d3ce0a1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exeFilesize
15KB
MD571046b87d2daf253a6121a0a3131424d
SHA11bed27f5477c0e0477d67dccc1c0b09613100222
SHA256546c3c6b876ebcd037a7c8e3fa84c3f112c32cb7d8935723838bc1e83f4f5648
SHA5125a6ed5947477f08e314a19b44ee0ae4a753a7ae7dd638dd92e032e45f3a3d5aebd4fd4745612d40193db4b572026ec69a88486cf8b5aa4d2cbeacd318d3ce0a1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exeFilesize
294KB
MD5a8dc7daaa8be95df0a0803f51cc3572d
SHA131290bb71d8e5ce4c45b1f41cfe50ccff0031afc
SHA2561f2f29dd83f6c65ca18ecd5af1f8bd8e28b0043d3f07cc41d0c44b03192d717c
SHA512d38af24e12e44a2d082d7062b7f531ea25ad157ba2fac415cb846c62fdc83f7ae8cbd7dac7d7fa844f93b8f500614890352075889c806a00b351dc0f1a0fca37
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exeFilesize
294KB
MD5a8dc7daaa8be95df0a0803f51cc3572d
SHA131290bb71d8e5ce4c45b1f41cfe50ccff0031afc
SHA2561f2f29dd83f6c65ca18ecd5af1f8bd8e28b0043d3f07cc41d0c44b03192d717c
SHA512d38af24e12e44a2d082d7062b7f531ea25ad157ba2fac415cb846c62fdc83f7ae8cbd7dac7d7fa844f93b8f500614890352075889c806a00b351dc0f1a0fca37
-
memory/524-1085-0x00000000001B0000-0x00000000001E2000-memory.dmpFilesize
200KB
-
memory/524-1086-0x0000000004A80000-0x0000000004A90000-memory.dmpFilesize
64KB
-
memory/2044-147-0x0000000000F00000-0x0000000000F0A000-memory.dmpFilesize
40KB
-
memory/2588-189-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-201-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-155-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-156-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-158-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-160-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-162-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-164-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-166-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-168-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-170-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-172-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-174-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-176-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-177-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-175-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-179-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-181-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-183-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-185-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-187-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-153-0x0000000000740000-0x000000000078B000-memory.dmpFilesize
300KB
-
memory/2588-191-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-193-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-195-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-197-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-199-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-154-0x0000000004AC0000-0x0000000005064000-memory.dmpFilesize
5.6MB
-
memory/2588-203-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-205-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-207-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-209-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-211-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-213-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-215-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-217-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-219-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-221-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2588-1064-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/2588-1065-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/2588-1066-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/2588-1067-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-1068-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/2588-1070-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/2588-1071-0x0000000006270000-0x0000000006302000-memory.dmpFilesize
584KB
-
memory/2588-1072-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-1073-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-1074-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-1075-0x0000000002640000-0x0000000002650000-memory.dmpFilesize
64KB
-
memory/2588-1076-0x0000000006470000-0x00000000064E6000-memory.dmpFilesize
472KB
-
memory/2588-1077-0x0000000006510000-0x0000000006560000-memory.dmpFilesize
320KB
-
memory/2588-1078-0x0000000006590000-0x0000000006752000-memory.dmpFilesize
1.8MB
-
memory/2588-1079-0x0000000006760000-0x0000000006C8C000-memory.dmpFilesize
5.2MB