Analysis
-
max time kernel
88s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:43
Static task
static1
Behavioral task
behavioral1
Sample
7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe
Resource
win10v2004-20230221-en
General
-
Target
7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe
-
Size
522KB
-
MD5
8e98652835c14c2ff771d212c944d76f
-
SHA1
f044e0c7ef50e8cf7efd5b59bfdfa6a072a39537
-
SHA256
7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b
-
SHA512
4002b66fde08ac7d5b2fc4c83db8bb8c949b6448611f53425f7a82a9ce70d92132f5d963c6817c22a23b97bfc1b511c5acc2e0e8c4df8d15068c973db32cc178
-
SSDEEP
12288:IMr3y90d2KgvXszvXmhE8Wl4pgzWKVokfyuh:PyG2KgqXIlW2ppKVb/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr032692.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr032692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr032692.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr032692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr032692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr032692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr032692.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4860-156-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-155-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-158-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-160-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-162-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-164-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-166-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-168-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-170-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-172-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-174-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-176-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-178-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-180-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-182-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-184-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-186-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-190-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-193-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-195-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-197-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-199-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-201-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-203-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-205-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-207-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-209-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-211-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-213-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-215-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-217-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-219-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/4860-221-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziAL9685.exejr032692.exeku976935.exelr294272.exepid process 640 ziAL9685.exe 1524 jr032692.exe 4860 ku976935.exe 4608 lr294272.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr032692.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr032692.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exeziAL9685.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziAL9685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAL9685.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 436 4860 WerFault.exe ku976935.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr032692.exeku976935.exelr294272.exepid process 1524 jr032692.exe 1524 jr032692.exe 4860 ku976935.exe 4860 ku976935.exe 4608 lr294272.exe 4608 lr294272.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr032692.exeku976935.exelr294272.exedescription pid process Token: SeDebugPrivilege 1524 jr032692.exe Token: SeDebugPrivilege 4860 ku976935.exe Token: SeDebugPrivilege 4608 lr294272.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exeziAL9685.exedescription pid process target process PID 1172 wrote to memory of 640 1172 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe ziAL9685.exe PID 1172 wrote to memory of 640 1172 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe ziAL9685.exe PID 1172 wrote to memory of 640 1172 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe ziAL9685.exe PID 640 wrote to memory of 1524 640 ziAL9685.exe jr032692.exe PID 640 wrote to memory of 1524 640 ziAL9685.exe jr032692.exe PID 640 wrote to memory of 4860 640 ziAL9685.exe ku976935.exe PID 640 wrote to memory of 4860 640 ziAL9685.exe ku976935.exe PID 640 wrote to memory of 4860 640 ziAL9685.exe ku976935.exe PID 1172 wrote to memory of 4608 1172 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe lr294272.exe PID 1172 wrote to memory of 4608 1172 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe lr294272.exe PID 1172 wrote to memory of 4608 1172 7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe lr294272.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe"C:\Users\Admin\AppData\Local\Temp\7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL9685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL9685.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032692.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku976935.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku976935.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 18684⤵
- Program crash
PID:436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294272.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4860 -ip 48601⤵PID:3616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5320ed9a07da95271730c1208187f92b7
SHA1540d7cf11521bf862f6efe15edf266b953c72645
SHA256491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af
SHA5122190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4
-
Filesize
175KB
MD5320ed9a07da95271730c1208187f92b7
SHA1540d7cf11521bf862f6efe15edf266b953c72645
SHA256491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af
SHA5122190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4
-
Filesize
379KB
MD58dcba5b9187d58981e8a0a29b6dddfc2
SHA1051ea50174bf1aa0fb3c8719ac9138c0d4b89368
SHA2567b8da4d87d37ede3272e1391f288aa0c45727898ab2947b1ab213852f264f23e
SHA5125366c18063b9bae961ec09a462c3178e9539313eb5c680c4d6a62b96dd45dfd1d4eba7d2556d3a71ce93409f89ff16d23c91161569956b19e1a00dbe068c0128
-
Filesize
379KB
MD58dcba5b9187d58981e8a0a29b6dddfc2
SHA1051ea50174bf1aa0fb3c8719ac9138c0d4b89368
SHA2567b8da4d87d37ede3272e1391f288aa0c45727898ab2947b1ab213852f264f23e
SHA5125366c18063b9bae961ec09a462c3178e9539313eb5c680c4d6a62b96dd45dfd1d4eba7d2556d3a71ce93409f89ff16d23c91161569956b19e1a00dbe068c0128
-
Filesize
15KB
MD5e4700bed0cbf5b5ae164892f89957328
SHA15c76f312e68af9f5d7176b59ada0505dec2f33ed
SHA25692b85679acb6803f0797d51f1a6c81bfccc45d69b2aaf57e4c53ae544576f189
SHA51251716bbe72d0595bf11ef3f947f0c90b2b39a62547d6aef9daedeccd3be4de5afa3d84425f24c1bc250abf82335af53ac0c53c33c6c9519bb5e85bf1c9c9a08a
-
Filesize
15KB
MD5e4700bed0cbf5b5ae164892f89957328
SHA15c76f312e68af9f5d7176b59ada0505dec2f33ed
SHA25692b85679acb6803f0797d51f1a6c81bfccc45d69b2aaf57e4c53ae544576f189
SHA51251716bbe72d0595bf11ef3f947f0c90b2b39a62547d6aef9daedeccd3be4de5afa3d84425f24c1bc250abf82335af53ac0c53c33c6c9519bb5e85bf1c9c9a08a
-
Filesize
294KB
MD589d0e7d92aa29cf29be76a983bf09d72
SHA1fc4113b72e19c53b61fc4616be8d4f6ac2c75949
SHA256c5e84a7f29f81dbdb6372afdd5ac60c437457cf42281a4942c07ffa29fe0c8e0
SHA512e50e8fc9cf510fc020a19880c9a8e5398a085617e757b21c19fc8a4b971af39645827b99c03a870d1bb3a2a1e99bbc891e2fc813f008d847cb093294e78f1beb
-
Filesize
294KB
MD589d0e7d92aa29cf29be76a983bf09d72
SHA1fc4113b72e19c53b61fc4616be8d4f6ac2c75949
SHA256c5e84a7f29f81dbdb6372afdd5ac60c437457cf42281a4942c07ffa29fe0c8e0
SHA512e50e8fc9cf510fc020a19880c9a8e5398a085617e757b21c19fc8a4b971af39645827b99c03a870d1bb3a2a1e99bbc891e2fc813f008d847cb093294e78f1beb