Analysis
-
max time kernel
102s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 20:57
Static task
static1
Behavioral task
behavioral1
Sample
f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe
Resource
win10v2004-20230220-en
General
-
Target
f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe
-
Size
521KB
-
MD5
2c5929ed3f55331be70b29f098bb5b0e
-
SHA1
d0b325af88e64495f93e83f087916c03707f9076
-
SHA256
f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431
-
SHA512
0f614fa6813be8169ddeb9c177abf89ae5f0d325adeab84acd551a1baf8d94a701eb2e67d4441f8379e85d5092e394aa69591d2e790b705d33ad35e7250e54d1
-
SSDEEP
12288:dMrPy90nDEzZrxZbuSEWzhc8Vak8EI44tzWgyDJdpv:WyflrDqWzuxFEB4w5Jr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr769718.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr769718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr769718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr769718.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr769718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr769718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr769718.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2240-159-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-157-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-155-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-154-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-161-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-163-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-165-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-167-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-170-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-173-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-176-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-178-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-180-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-182-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-184-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-186-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-188-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-190-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-192-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-194-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-196-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-198-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-200-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-202-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-204-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-206-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-208-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-210-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-212-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-216-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-218-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-214-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-220-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/2240-1071-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline behavioral1/memory/2240-1072-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zinm1727.exejr769718.exeku302874.exelr823225.exepid process 3548 zinm1727.exe 64 jr769718.exe 2240 ku302874.exe 4360 lr823225.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr769718.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr769718.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exezinm1727.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zinm1727.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinm1727.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2004 2240 WerFault.exe ku302874.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr769718.exeku302874.exelr823225.exepid process 64 jr769718.exe 64 jr769718.exe 2240 ku302874.exe 2240 ku302874.exe 4360 lr823225.exe 4360 lr823225.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr769718.exeku302874.exelr823225.exedescription pid process Token: SeDebugPrivilege 64 jr769718.exe Token: SeDebugPrivilege 2240 ku302874.exe Token: SeDebugPrivilege 4360 lr823225.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exezinm1727.exedescription pid process target process PID 4348 wrote to memory of 3548 4348 f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe zinm1727.exe PID 4348 wrote to memory of 3548 4348 f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe zinm1727.exe PID 4348 wrote to memory of 3548 4348 f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe zinm1727.exe PID 3548 wrote to memory of 64 3548 zinm1727.exe jr769718.exe PID 3548 wrote to memory of 64 3548 zinm1727.exe jr769718.exe PID 3548 wrote to memory of 2240 3548 zinm1727.exe ku302874.exe PID 3548 wrote to memory of 2240 3548 zinm1727.exe ku302874.exe PID 3548 wrote to memory of 2240 3548 zinm1727.exe ku302874.exe PID 4348 wrote to memory of 4360 4348 f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe lr823225.exe PID 4348 wrote to memory of 4360 4348 f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe lr823225.exe PID 4348 wrote to memory of 4360 4348 f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe lr823225.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe"C:\Users\Admin\AppData\Local\Temp\f8d742f5df0a80fd70369f7b82fe212025758e0543c75262e4696738174b3431.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinm1727.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinm1727.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr769718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr769718.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku302874.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku302874.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 14604⤵
- Program crash
PID:2004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr823225.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr823225.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2240 -ip 22401⤵PID:3092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ac06f47f3787ad344caa5a5ab818cb91
SHA1a2c4fbe84b3ab11da7af400aec8d0ac02e733277
SHA256f3b4b78699b595ae7b170be5d9f003773413d3d7f1c3bae59af5417688787373
SHA512e61fb91de3b895d0a1aa97eac998cf2f9ccb08c076d2578180937a8d2e6480a41060825703a0de2369633883dd73d4da79d90a2c60ad8649361ebd2fe663f3b1
-
Filesize
175KB
MD5ac06f47f3787ad344caa5a5ab818cb91
SHA1a2c4fbe84b3ab11da7af400aec8d0ac02e733277
SHA256f3b4b78699b595ae7b170be5d9f003773413d3d7f1c3bae59af5417688787373
SHA512e61fb91de3b895d0a1aa97eac998cf2f9ccb08c076d2578180937a8d2e6480a41060825703a0de2369633883dd73d4da79d90a2c60ad8649361ebd2fe663f3b1
-
Filesize
379KB
MD5f5a58a173c35eceec03981452fb5fae8
SHA1df07f123e75c4ddd2917b761f979ef23600b576a
SHA2564777e2c1578cb9c3c2893ef82a5c957b1e0871a95288b83683e0a47e0f9d72ed
SHA5126b2b6a67e9ff712bb81233bd9adf6b997fa264530210d8e92f73aaca4194a00dcd8131376a52307ab9367e2dc8a8ec551ba02433c5bf8c423cd650e75bcb4e03
-
Filesize
379KB
MD5f5a58a173c35eceec03981452fb5fae8
SHA1df07f123e75c4ddd2917b761f979ef23600b576a
SHA2564777e2c1578cb9c3c2893ef82a5c957b1e0871a95288b83683e0a47e0f9d72ed
SHA5126b2b6a67e9ff712bb81233bd9adf6b997fa264530210d8e92f73aaca4194a00dcd8131376a52307ab9367e2dc8a8ec551ba02433c5bf8c423cd650e75bcb4e03
-
Filesize
15KB
MD51b34bf35618ce32a960eaaeadd04d75d
SHA10b7b99d34441e76d63837545c5e067343a9baf40
SHA25640508f3e93425b88ea30a2035103e100f99f63c8259a2759a51340da6dfad5c8
SHA51261f126f99b75e45e49eaf063a94e976f6308ea280c9de2d06f8318d5b297686070afab523124e97cc76a29ab7f44a5e79f7ab1d0f3ddae54a945723a7ca12d21
-
Filesize
15KB
MD51b34bf35618ce32a960eaaeadd04d75d
SHA10b7b99d34441e76d63837545c5e067343a9baf40
SHA25640508f3e93425b88ea30a2035103e100f99f63c8259a2759a51340da6dfad5c8
SHA51261f126f99b75e45e49eaf063a94e976f6308ea280c9de2d06f8318d5b297686070afab523124e97cc76a29ab7f44a5e79f7ab1d0f3ddae54a945723a7ca12d21
-
Filesize
294KB
MD588bd09f63d02c1bfff3c578b8da07f79
SHA10fe70f47c13a3e3d0ec9cf2c7cd528e0e9ad65c3
SHA2562db084a7a20f3bb771d2e77b2d2c90b9e82bd2c726fadb8ac71dbb74bbc4c406
SHA5127015e7dcca8b35762bcf2359bc89941d63e396ef6b7980024aa47681b70f5a2ccd3518c4d1d688ac42fb79485ffad41921eee61af344a7aa255c21f544f8aa88
-
Filesize
294KB
MD588bd09f63d02c1bfff3c578b8da07f79
SHA10fe70f47c13a3e3d0ec9cf2c7cd528e0e9ad65c3
SHA2562db084a7a20f3bb771d2e77b2d2c90b9e82bd2c726fadb8ac71dbb74bbc4c406
SHA5127015e7dcca8b35762bcf2359bc89941d63e396ef6b7980024aa47681b70f5a2ccd3518c4d1d688ac42fb79485ffad41921eee61af344a7aa255c21f544f8aa88