Analysis
-
max time kernel
111s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:00
Static task
static1
Behavioral task
behavioral1
Sample
786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe
Resource
win10v2004-20230220-en
General
-
Target
786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe
-
Size
522KB
-
MD5
bd83bfba3f46f52a51fa47657c2fed98
-
SHA1
7d173ce0ffcde2ef2eb7b23eb02420bb968b5c4c
-
SHA256
786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc
-
SHA512
360b4894462f49b4f9ebecacccfc66489653d86dec4caa68b9677576d1c91f6e875fb0e36ce313a51202f10066caad20065866e1f8eac12c5624caee9d262c3b
-
SSDEEP
12288:XMrLy90fVpe0E/B3iv3HVW8sb4EAzWceQuF/Xdy3dX4:syVivHVfsEEJFXdy3R4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr743751.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr743751.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr743751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr743751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr743751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr743751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr743751.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2128-158-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-159-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-161-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-163-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-165-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-167-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-169-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-171-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-173-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-175-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-177-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-213-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-215-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-217-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/2128-221-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziEo9232.exejr743751.exeku920080.exelr793461.exepid process 1516 ziEo9232.exe 4676 jr743751.exe 2128 ku920080.exe 2384 lr793461.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr743751.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr743751.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exeziEo9232.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEo9232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEo9232.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2104 2128 WerFault.exe ku920080.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr743751.exeku920080.exelr793461.exepid process 4676 jr743751.exe 4676 jr743751.exe 2128 ku920080.exe 2128 ku920080.exe 2384 lr793461.exe 2384 lr793461.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr743751.exeku920080.exelr793461.exedescription pid process Token: SeDebugPrivilege 4676 jr743751.exe Token: SeDebugPrivilege 2128 ku920080.exe Token: SeDebugPrivilege 2384 lr793461.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exeziEo9232.exedescription pid process target process PID 564 wrote to memory of 1516 564 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe ziEo9232.exe PID 564 wrote to memory of 1516 564 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe ziEo9232.exe PID 564 wrote to memory of 1516 564 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe ziEo9232.exe PID 1516 wrote to memory of 4676 1516 ziEo9232.exe jr743751.exe PID 1516 wrote to memory of 4676 1516 ziEo9232.exe jr743751.exe PID 1516 wrote to memory of 2128 1516 ziEo9232.exe ku920080.exe PID 1516 wrote to memory of 2128 1516 ziEo9232.exe ku920080.exe PID 1516 wrote to memory of 2128 1516 ziEo9232.exe ku920080.exe PID 564 wrote to memory of 2384 564 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe lr793461.exe PID 564 wrote to memory of 2384 564 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe lr793461.exe PID 564 wrote to memory of 2384 564 786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe lr793461.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe"C:\Users\Admin\AppData\Local\Temp\786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 13484⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2128 -ip 21281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exeFilesize
175KB
MD555cdea1e46ff445f1eba8971f44ebf36
SHA1442a975b2d5775ee28c2504c753b8456cbdf5373
SHA2564134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e
SHA512dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exeFilesize
175KB
MD555cdea1e46ff445f1eba8971f44ebf36
SHA1442a975b2d5775ee28c2504c753b8456cbdf5373
SHA2564134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e
SHA512dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exeFilesize
379KB
MD5dd16677306d842643c87c5360c5ed9f4
SHA18c688d71a7642d6e9e304d4973f71119685b08d3
SHA256b3e09a173de06cbe62f83d544507b417170a6237d6a15c8d33916fce2b80855e
SHA512fc38d064654ae3c9fc341e58cc9f4107ea60718ae54762f39d64a60e880617426c810e2cd5317541fb30944aee6751c17fdc03519ae70993bf25de303b705e5c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exeFilesize
379KB
MD5dd16677306d842643c87c5360c5ed9f4
SHA18c688d71a7642d6e9e304d4973f71119685b08d3
SHA256b3e09a173de06cbe62f83d544507b417170a6237d6a15c8d33916fce2b80855e
SHA512fc38d064654ae3c9fc341e58cc9f4107ea60718ae54762f39d64a60e880617426c810e2cd5317541fb30944aee6751c17fdc03519ae70993bf25de303b705e5c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exeFilesize
15KB
MD57eba18eef41d33a10babbf589e51ae7f
SHA1d82f9e2ff663f5836a8d7fa4fc532b20a4020177
SHA256aa9bcf1c876e39f7cba0ad9ec19a097642f8b8696fdfa7af4548d538a035f778
SHA5122841b0f4523ae28843b75d2ea87a4ca8a8d680ddb7f5d83e343d38dedba92f648d967e494bd566780e701824d0ece61ad7af37c813c7a12ecf971826822069de
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exeFilesize
15KB
MD57eba18eef41d33a10babbf589e51ae7f
SHA1d82f9e2ff663f5836a8d7fa4fc532b20a4020177
SHA256aa9bcf1c876e39f7cba0ad9ec19a097642f8b8696fdfa7af4548d538a035f778
SHA5122841b0f4523ae28843b75d2ea87a4ca8a8d680ddb7f5d83e343d38dedba92f648d967e494bd566780e701824d0ece61ad7af37c813c7a12ecf971826822069de
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exeFilesize
294KB
MD58ba2608c1556f72eb32ef9c8c7c7575f
SHA1dbc8f467aa5dc3e9b775940ecc751eb5c8057f26
SHA256de79bb1220a59e60b6f47da82c0e122fb67bad410317495a78431322d4197cbf
SHA512eb2cd77112a10b3efa1461e7c480df244cce5b4378a3c9450a532f1df43c8b3c3b3768d2d5c0f0ca7849fa4af56bc60c1d358f02eb43ea9d77dee2a98e136239
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exeFilesize
294KB
MD58ba2608c1556f72eb32ef9c8c7c7575f
SHA1dbc8f467aa5dc3e9b775940ecc751eb5c8057f26
SHA256de79bb1220a59e60b6f47da82c0e122fb67bad410317495a78431322d4197cbf
SHA512eb2cd77112a10b3efa1461e7c480df244cce5b4378a3c9450a532f1df43c8b3c3b3768d2d5c0f0ca7849fa4af56bc60c1d358f02eb43ea9d77dee2a98e136239
-
memory/2128-153-0x00000000020F0000-0x000000000213B000-memory.dmpFilesize
300KB
-
memory/2128-154-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/2128-155-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/2128-156-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/2128-157-0x0000000004CF0000-0x0000000005294000-memory.dmpFilesize
5.6MB
-
memory/2128-158-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-159-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-161-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-163-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-165-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-167-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-169-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-171-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-173-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-175-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-177-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-179-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-181-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-183-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-185-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-187-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-189-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-191-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-193-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-195-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-197-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-199-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-201-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-203-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-205-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-207-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-209-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-211-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-213-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-215-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-217-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-219-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-221-0x0000000002510000-0x000000000254F000-memory.dmpFilesize
252KB
-
memory/2128-1064-0x00000000052A0000-0x00000000058B8000-memory.dmpFilesize
6.1MB
-
memory/2128-1065-0x0000000004B80000-0x0000000004C8A000-memory.dmpFilesize
1.0MB
-
memory/2128-1066-0x0000000004CC0000-0x0000000004CD2000-memory.dmpFilesize
72KB
-
memory/2128-1067-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/2128-1068-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/2128-1070-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/2128-1071-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/2128-1072-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/2128-1073-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/2128-1074-0x0000000004CE0000-0x0000000004CF0000-memory.dmpFilesize
64KB
-
memory/2128-1076-0x0000000007950000-0x0000000007B12000-memory.dmpFilesize
1.8MB
-
memory/2128-1077-0x0000000007B60000-0x000000000808C000-memory.dmpFilesize
5.2MB
-
memory/2384-1083-0x0000000000520000-0x0000000000552000-memory.dmpFilesize
200KB
-
memory/2384-1084-0x0000000004E30000-0x0000000004E40000-memory.dmpFilesize
64KB
-
memory/4676-147-0x0000000000A60000-0x0000000000A6A000-memory.dmpFilesize
40KB