Analysis
-
max time kernel
51s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe
Resource
win10v2004-20230220-en
General
-
Target
cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe
-
Size
522KB
-
MD5
8dd55f64a31134724343fa69648041fb
-
SHA1
8fcb3c3deff9b61118e3965f4f4a8f278640ad08
-
SHA256
cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5
-
SHA512
c1917a0775cd43825100f60baa99d730f4b2acddcc4b449a98e9ab86aee7da4304e7df1aeb7ea4b9fc82258cef106738542f35033cf1fccbc28bd6f9c9cbdb02
-
SSDEEP
12288:RMrJy90cORox6nx348+8qp4kJzWK5/8vRXpOzJ:oy3mIuqCkMKEXg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr563970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr563970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr563970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr563970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr563970.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr563970.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4376-156-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-157-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-159-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-161-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-163-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-165-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-167-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-169-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-171-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-173-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-175-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-177-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-179-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-181-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-183-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-185-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-187-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-194-0x0000000004B00000-0x0000000004B10000-memory.dmp family_redline behavioral1/memory/4376-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/4376-1075-0x0000000004B00000-0x0000000004B10000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1940 zioL7552.exe 1952 jr563970.exe 4376 ku871450.exe 3704 lr656578.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr563970.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zioL7552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zioL7552.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 740 4376 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 jr563970.exe 1952 jr563970.exe 4376 ku871450.exe 4376 ku871450.exe 3704 lr656578.exe 3704 lr656578.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1952 jr563970.exe Token: SeDebugPrivilege 4376 ku871450.exe Token: SeDebugPrivilege 3704 lr656578.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4852 wrote to memory of 1940 4852 cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe 78 PID 4852 wrote to memory of 1940 4852 cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe 78 PID 4852 wrote to memory of 1940 4852 cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe 78 PID 1940 wrote to memory of 1952 1940 zioL7552.exe 79 PID 1940 wrote to memory of 1952 1940 zioL7552.exe 79 PID 1940 wrote to memory of 4376 1940 zioL7552.exe 80 PID 1940 wrote to memory of 4376 1940 zioL7552.exe 80 PID 1940 wrote to memory of 4376 1940 zioL7552.exe 80 PID 4852 wrote to memory of 3704 4852 cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe 86 PID 4852 wrote to memory of 3704 4852 cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe 86 PID 4852 wrote to memory of 3704 4852 cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe"C:\Users\Admin\AppData\Local\Temp\cc0f454b66b661eff55a13a25bab010651a2d2e5a413f0b914fe2d799d8e15d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioL7552.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioL7552.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr563970.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr563970.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku871450.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku871450.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 13364⤵
- Program crash
PID:740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr656578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr656578.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4376 -ip 43761⤵PID:3364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD59e18740902004ebac0402948b641def3
SHA1b5dfb9f9da5e149e2bb60b71d5ea6a081ff6b7af
SHA25654a3ff84d39002ff9567cc1d85b3a855e40fab8e91bae4fdde5d769966af0f81
SHA512b1128ecadf1fa39f58674df5648a2ce3c5a831cb94e8481d87d854f9685137654e69ba0f977d77b4d8863d97032c280c380772772165582b027fca144df8e78b
-
Filesize
175KB
MD59e18740902004ebac0402948b641def3
SHA1b5dfb9f9da5e149e2bb60b71d5ea6a081ff6b7af
SHA25654a3ff84d39002ff9567cc1d85b3a855e40fab8e91bae4fdde5d769966af0f81
SHA512b1128ecadf1fa39f58674df5648a2ce3c5a831cb94e8481d87d854f9685137654e69ba0f977d77b4d8863d97032c280c380772772165582b027fca144df8e78b
-
Filesize
380KB
MD58a25f9b0bc830b85f6912cf7821286dc
SHA126865e5502f93c54c281177ddbd262cc9098cdc6
SHA256f92779b70eea857477232ba08dc760ef34c9a675c1baf332223679af2bd0b07e
SHA512a5bd87db48164735b15ad54ee1e4d5d863b68c9ee4c0da1fd1fec39e4d5bbc0758e91567518750cd94511247b167a62ccb1b258cd9c2fa40c7bb52600cbcdab0
-
Filesize
380KB
MD58a25f9b0bc830b85f6912cf7821286dc
SHA126865e5502f93c54c281177ddbd262cc9098cdc6
SHA256f92779b70eea857477232ba08dc760ef34c9a675c1baf332223679af2bd0b07e
SHA512a5bd87db48164735b15ad54ee1e4d5d863b68c9ee4c0da1fd1fec39e4d5bbc0758e91567518750cd94511247b167a62ccb1b258cd9c2fa40c7bb52600cbcdab0
-
Filesize
15KB
MD53f95c368a2f20d435624a7ef6932649d
SHA1379178e177031f71746b102cdc157ab1b3520a1e
SHA256074142582410d24c30522edbf997852d3ee51fa2c2d12a2561dc079c475106ce
SHA5124f7c1ee9085230fc29207e97356b048dd94530920210ca2de6a1b4ac93801ab8a80fc17879a26f18353c2f912d808548c4abde94d2ad892d5c28f0abbc14eb74
-
Filesize
15KB
MD53f95c368a2f20d435624a7ef6932649d
SHA1379178e177031f71746b102cdc157ab1b3520a1e
SHA256074142582410d24c30522edbf997852d3ee51fa2c2d12a2561dc079c475106ce
SHA5124f7c1ee9085230fc29207e97356b048dd94530920210ca2de6a1b4ac93801ab8a80fc17879a26f18353c2f912d808548c4abde94d2ad892d5c28f0abbc14eb74
-
Filesize
294KB
MD57ed635b62b6690c7476799399cbb8979
SHA1164d28451fb081ae1ca3285424abb0849b0e5cc6
SHA256925a2174ee3d930e3835d993bf60bbc8169fed06ed0253845321c89b307e4e95
SHA51227d97b2b76179bb2c242177b207fbe63fe71339310ec507c6bb7d9d03103f6a70d87d34b4e09f2cb79dde2c52cf517ff7df41eaca5e78763ce6ea9e9b1d3ebff
-
Filesize
294KB
MD57ed635b62b6690c7476799399cbb8979
SHA1164d28451fb081ae1ca3285424abb0849b0e5cc6
SHA256925a2174ee3d930e3835d993bf60bbc8169fed06ed0253845321c89b307e4e95
SHA51227d97b2b76179bb2c242177b207fbe63fe71339310ec507c6bb7d9d03103f6a70d87d34b4e09f2cb79dde2c52cf517ff7df41eaca5e78763ce6ea9e9b1d3ebff