Analysis
-
max time kernel
51s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:36
Static task
static1
Behavioral task
behavioral1
Sample
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe
Resource
win10v2004-20230220-en
General
-
Target
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe
-
Size
522KB
-
MD5
a6c188daa512b45730f2cbeef28d2a08
-
SHA1
126d87ba73aadbcbc7da36235db62efa94ca8c58
-
SHA256
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7
-
SHA512
da15d19bc6caf71f9709ff2a01538d7ddf6c430a0cad0315545dad5a060b1f2d428761e37c3e2200ffd534210e3fac6d673d291e0eccb9fd145e24383966fcfc
-
SSDEEP
12288:aMrwy90ojbqWmsVy77wJ3R8m3446zWKKiLaIalW9jBpBX:Sy/ObeuGumo4DKBLaDlW9NX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr868174.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr868174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr868174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr868174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr868174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr868174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr868174.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/3428-157-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-158-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-160-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-162-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-164-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-166-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-172-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-170-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-174-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-176-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-178-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-180-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-182-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-184-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-186-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-188-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-190-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-192-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-194-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-198-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-196-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-200-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-202-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-204-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-206-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-208-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-210-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-212-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-214-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-218-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-216-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/3428-220-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziqn1662.exejr868174.exeku402492.exelr594211.exepid process 3716 ziqn1662.exe 4684 jr868174.exe 3428 ku402492.exe 4808 lr594211.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr868174.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr868174.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exeziqn1662.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziqn1662.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqn1662.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2144 3428 WerFault.exe ku402492.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr868174.exeku402492.exelr594211.exepid process 4684 jr868174.exe 4684 jr868174.exe 3428 ku402492.exe 3428 ku402492.exe 4808 lr594211.exe 4808 lr594211.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr868174.exeku402492.exelr594211.exedescription pid process Token: SeDebugPrivilege 4684 jr868174.exe Token: SeDebugPrivilege 3428 ku402492.exe Token: SeDebugPrivilege 4808 lr594211.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exeziqn1662.exedescription pid process target process PID 2076 wrote to memory of 3716 2076 c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe ziqn1662.exe PID 2076 wrote to memory of 3716 2076 c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe ziqn1662.exe PID 2076 wrote to memory of 3716 2076 c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe ziqn1662.exe PID 3716 wrote to memory of 4684 3716 ziqn1662.exe jr868174.exe PID 3716 wrote to memory of 4684 3716 ziqn1662.exe jr868174.exe PID 3716 wrote to memory of 3428 3716 ziqn1662.exe ku402492.exe PID 3716 wrote to memory of 3428 3716 ziqn1662.exe ku402492.exe PID 3716 wrote to memory of 3428 3716 ziqn1662.exe ku402492.exe PID 2076 wrote to memory of 4808 2076 c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe lr594211.exe PID 2076 wrote to memory of 4808 2076 c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe lr594211.exe PID 2076 wrote to memory of 4808 2076 c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe lr594211.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe"C:\Users\Admin\AppData\Local\Temp\c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 14884⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3428 -ip 34281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exeFilesize
175KB
MD55b91d3ad54eae27feb0c5e438a9b8908
SHA1644e7ad0fb1e0edd4e3dacef4fe5095287ff3518
SHA256eb82369510994d45a7e3525a92f5c512fed0ed0c4d6561e1308b5060e665c836
SHA51214015e59eb5e73bb34793adef8bd6db24f0c904ace4a95abea092754e6e8ba5b24c586e4b1ca0a6c8222ff5fbf3fbb29bbe6ba6da51ed65d3685924de1555618
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exeFilesize
175KB
MD55b91d3ad54eae27feb0c5e438a9b8908
SHA1644e7ad0fb1e0edd4e3dacef4fe5095287ff3518
SHA256eb82369510994d45a7e3525a92f5c512fed0ed0c4d6561e1308b5060e665c836
SHA51214015e59eb5e73bb34793adef8bd6db24f0c904ace4a95abea092754e6e8ba5b24c586e4b1ca0a6c8222ff5fbf3fbb29bbe6ba6da51ed65d3685924de1555618
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exeFilesize
380KB
MD5842234350fc0e7f4225e3d6839ac4291
SHA14498352d9f96ad7deea3789af4c9d150f12558cb
SHA256dfc908675401769761c89b8dd15b88d9686f235c7ebd8b4b1f9078f6ba80642b
SHA512cacae75669c208b5d6c18a144f8f210e3af6dccbdca24695ad1bb95c54aec71148303875af347ffeaa53f70f742b9430755248625a0f12757b818eb34f3cccf8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exeFilesize
380KB
MD5842234350fc0e7f4225e3d6839ac4291
SHA14498352d9f96ad7deea3789af4c9d150f12558cb
SHA256dfc908675401769761c89b8dd15b88d9686f235c7ebd8b4b1f9078f6ba80642b
SHA512cacae75669c208b5d6c18a144f8f210e3af6dccbdca24695ad1bb95c54aec71148303875af347ffeaa53f70f742b9430755248625a0f12757b818eb34f3cccf8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exeFilesize
15KB
MD57e10658aa7db8233824c2e9b0805790c
SHA139b4ed5b30897c7665f7cadf75aba8e3e780480d
SHA256471c046582224a5fb931cf77380472c9c18ef6a36069cc4dfa6f02d14ece8b5b
SHA512811b84e3b57f63147f8f99b0eefc64d922d230b2a283b9e48e3cdd67ddfa10d68f0c6980f4a445ef3f681d25ac0eeeb6a1eb985201c61f5d73147401fff4090b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exeFilesize
15KB
MD57e10658aa7db8233824c2e9b0805790c
SHA139b4ed5b30897c7665f7cadf75aba8e3e780480d
SHA256471c046582224a5fb931cf77380472c9c18ef6a36069cc4dfa6f02d14ece8b5b
SHA512811b84e3b57f63147f8f99b0eefc64d922d230b2a283b9e48e3cdd67ddfa10d68f0c6980f4a445ef3f681d25ac0eeeb6a1eb985201c61f5d73147401fff4090b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exeFilesize
294KB
MD53662d5a93287b9e7ce53339265f777bb
SHA1b4348d3bb05da2f40c5123d71c04a2184d722742
SHA256b122f827d4efbacc744d95135da863efc172f94298a8a79e0979b478b0379c43
SHA512b0f5689ac350570a1cc6b2792a44b9d4c6bc80e2bd5862c48109b08bb3c88924778747f8574537540bc504e458cb6c79f947767bd028445a1b77a5544973e910
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exeFilesize
294KB
MD53662d5a93287b9e7ce53339265f777bb
SHA1b4348d3bb05da2f40c5123d71c04a2184d722742
SHA256b122f827d4efbacc744d95135da863efc172f94298a8a79e0979b478b0379c43
SHA512b0f5689ac350570a1cc6b2792a44b9d4c6bc80e2bd5862c48109b08bb3c88924778747f8574537540bc504e458cb6c79f947767bd028445a1b77a5544973e910
-
memory/3428-154-0x0000000002160000-0x00000000021AB000-memory.dmpFilesize
300KB
-
memory/3428-155-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-156-0x0000000004BC0000-0x0000000005164000-memory.dmpFilesize
5.6MB
-
memory/3428-157-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-158-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-160-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-162-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-164-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-169-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-167-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-166-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-172-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-170-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-174-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-176-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-178-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-180-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-182-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-184-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-186-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-188-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-190-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-192-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-194-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-198-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-196-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-200-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-202-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-204-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-206-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-208-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-210-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-212-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-214-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-218-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-216-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-220-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/3428-1065-0x0000000005170000-0x0000000005788000-memory.dmpFilesize
6.1MB
-
memory/3428-1066-0x0000000005790000-0x000000000589A000-memory.dmpFilesize
1.0MB
-
memory/3428-1067-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/3428-1068-0x0000000005900000-0x000000000593C000-memory.dmpFilesize
240KB
-
memory/3428-1069-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-1071-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-1072-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-1073-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/3428-1074-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/3428-1075-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/3428-1076-0x0000000006370000-0x0000000006532000-memory.dmpFilesize
1.8MB
-
memory/3428-1077-0x0000000006550000-0x0000000006A7C000-memory.dmpFilesize
5.2MB
-
memory/3428-1078-0x0000000006CB0000-0x0000000006D26000-memory.dmpFilesize
472KB
-
memory/3428-1079-0x0000000006D40000-0x0000000006D90000-memory.dmpFilesize
320KB
-
memory/3428-1080-0x0000000002240000-0x0000000002250000-memory.dmpFilesize
64KB
-
memory/4684-147-0x0000000000390000-0x000000000039A000-memory.dmpFilesize
40KB
-
memory/4684-149-0x000000001AF40000-0x000000001B08E000-memory.dmpFilesize
1.3MB
-
memory/4808-1086-0x0000000000080000-0x00000000000B2000-memory.dmpFilesize
200KB
-
memory/4808-1087-0x0000000004990000-0x00000000049A0000-memory.dmpFilesize
64KB