Analysis
-
max time kernel
84s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:05
Static task
static1
Behavioral task
behavioral1
Sample
359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe
Resource
win10v2004-20230220-en
General
-
Target
359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe
-
Size
522KB
-
MD5
a018fec7de54a2a39d9c3e23b2c3d8df
-
SHA1
61d0cbe2ece5e81c7931aa5722819bcb428a94d6
-
SHA256
359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac
-
SHA512
1bb51b24125d1974752737497ed78b778d7b4b6dabbd265152fa8f5eef8e89f33a777a6b4db8f7d613fe12c279059255aa37c78b95b8c9f1c820f7c942287977
-
SSDEEP
12288:bMrvy905Di0sgZ7ZqMi5sp1/q5+8Yd4vLzWCwyWvtA5iBd:EyKwhMi6pRaXY+v2COA5iBd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr208310.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr208310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr208310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr208310.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr208310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr208310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr208310.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/4612-157-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-160-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-158-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-162-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-164-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-166-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-168-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-170-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-172-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-174-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-176-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-178-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-180-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-182-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-184-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-186-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-188-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-190-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-192-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-194-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-196-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-198-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-200-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-202-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-204-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-206-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-208-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-210-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-212-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-214-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-216-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-218-0x0000000002730000-0x000000000276F000-memory.dmp family_redline behavioral1/memory/4612-220-0x0000000002730000-0x000000000276F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziXr1920.exejr208310.exeku491083.exelr155596.exepid process 1060 ziXr1920.exe 4432 jr208310.exe 4612 ku491083.exe 2236 lr155596.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr208310.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr208310.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exeziXr1920.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXr1920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXr1920.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1424 4612 WerFault.exe ku491083.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr208310.exeku491083.exelr155596.exepid process 4432 jr208310.exe 4432 jr208310.exe 4612 ku491083.exe 4612 ku491083.exe 2236 lr155596.exe 2236 lr155596.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr208310.exeku491083.exelr155596.exedescription pid process Token: SeDebugPrivilege 4432 jr208310.exe Token: SeDebugPrivilege 4612 ku491083.exe Token: SeDebugPrivilege 2236 lr155596.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exeziXr1920.exedescription pid process target process PID 1804 wrote to memory of 1060 1804 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe ziXr1920.exe PID 1804 wrote to memory of 1060 1804 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe ziXr1920.exe PID 1804 wrote to memory of 1060 1804 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe ziXr1920.exe PID 1060 wrote to memory of 4432 1060 ziXr1920.exe jr208310.exe PID 1060 wrote to memory of 4432 1060 ziXr1920.exe jr208310.exe PID 1060 wrote to memory of 4612 1060 ziXr1920.exe ku491083.exe PID 1060 wrote to memory of 4612 1060 ziXr1920.exe ku491083.exe PID 1060 wrote to memory of 4612 1060 ziXr1920.exe ku491083.exe PID 1804 wrote to memory of 2236 1804 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe lr155596.exe PID 1804 wrote to memory of 2236 1804 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe lr155596.exe PID 1804 wrote to memory of 2236 1804 359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe lr155596.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe"C:\Users\Admin\AppData\Local\Temp\359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 18684⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4612 -ip 46121⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exeFilesize
175KB
MD5ae9797c456535d7493ae3918603a2c19
SHA19db12e90bab014e02d1adb02cd27a346d4714e36
SHA256cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e
SHA512839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exeFilesize
175KB
MD5ae9797c456535d7493ae3918603a2c19
SHA19db12e90bab014e02d1adb02cd27a346d4714e36
SHA256cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e
SHA512839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exeFilesize
380KB
MD52d90372365c93f4d34ba6e985f5bbaa0
SHA147b50628c5b1b1a6c46c09ecf188ef02405555ff
SHA256944066820998fba3ff185071efac182e044bb84d292fb9d54d037c79125fbb42
SHA5124249ffc796b6869a2f109cf8325ba42ced8cc84e1647bbd80804d5ccf64101d7864d51e3ef192d1f6a4ee3566664b6059e69676ce706149a3393e3a96aa3c61e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exeFilesize
380KB
MD52d90372365c93f4d34ba6e985f5bbaa0
SHA147b50628c5b1b1a6c46c09ecf188ef02405555ff
SHA256944066820998fba3ff185071efac182e044bb84d292fb9d54d037c79125fbb42
SHA5124249ffc796b6869a2f109cf8325ba42ced8cc84e1647bbd80804d5ccf64101d7864d51e3ef192d1f6a4ee3566664b6059e69676ce706149a3393e3a96aa3c61e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exeFilesize
15KB
MD58da2908c6814d335a73a34df2d2d9135
SHA11782719da1526781f7d323982d0f43f6e62e4a05
SHA256ca89b67aef1f70e55da29aab7559e89d64e7236f9e152064c4696f406dc25b80
SHA512cd4e4829ea8c9b29fa4dee4aa66c5a2000eb9b66aacba02d3fecb28275c6adaf785ee902feaeea4426d21931cf5acee94d63c1645d50cb04b83a66b1fc7930b1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exeFilesize
15KB
MD58da2908c6814d335a73a34df2d2d9135
SHA11782719da1526781f7d323982d0f43f6e62e4a05
SHA256ca89b67aef1f70e55da29aab7559e89d64e7236f9e152064c4696f406dc25b80
SHA512cd4e4829ea8c9b29fa4dee4aa66c5a2000eb9b66aacba02d3fecb28275c6adaf785ee902feaeea4426d21931cf5acee94d63c1645d50cb04b83a66b1fc7930b1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exeFilesize
294KB
MD5e706b46d4b2f9476b47c4fac955a9d13
SHA11268f8dee6c6d469c1979c2cbf40af5a88803dd1
SHA256d382527a03be3562180441bde796bace1628a0d8d7f5d66f69b5a4575097cd4f
SHA512edf28337d370f353bf349b552c5fc8cbcec32e1e6137183e1db0d9e4c8715f80e45ffe901dbccb4011c1fbd764586b090f4c8a553c98cd4470d53bbd22d11d5c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exeFilesize
294KB
MD5e706b46d4b2f9476b47c4fac955a9d13
SHA11268f8dee6c6d469c1979c2cbf40af5a88803dd1
SHA256d382527a03be3562180441bde796bace1628a0d8d7f5d66f69b5a4575097cd4f
SHA512edf28337d370f353bf349b552c5fc8cbcec32e1e6137183e1db0d9e4c8715f80e45ffe901dbccb4011c1fbd764586b090f4c8a553c98cd4470d53bbd22d11d5c
-
memory/2236-1083-0x00000000005C0000-0x00000000005F2000-memory.dmpFilesize
200KB
-
memory/2236-1084-0x00000000051F0000-0x0000000005200000-memory.dmpFilesize
64KB
-
memory/4432-147-0x0000000000FB0000-0x0000000000FBA000-memory.dmpFilesize
40KB
-
memory/4612-186-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-198-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-156-0x00000000027D0000-0x00000000027E0000-memory.dmpFilesize
64KB
-
memory/4612-155-0x00000000027D0000-0x00000000027E0000-memory.dmpFilesize
64KB
-
memory/4612-157-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-160-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-158-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-162-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-164-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-166-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-168-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-170-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-172-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-174-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-176-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-178-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-180-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-182-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-184-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-153-0x0000000004B30000-0x00000000050D4000-memory.dmpFilesize
5.6MB
-
memory/4612-188-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-190-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-192-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-194-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-196-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-154-0x0000000000640000-0x000000000068B000-memory.dmpFilesize
300KB
-
memory/4612-200-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-202-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-204-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-206-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-208-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-210-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-212-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-214-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-216-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-218-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-220-0x0000000002730000-0x000000000276F000-memory.dmpFilesize
252KB
-
memory/4612-1063-0x0000000005220000-0x0000000005838000-memory.dmpFilesize
6.1MB
-
memory/4612-1064-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4612-1065-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4612-1066-0x00000000027D0000-0x00000000027E0000-memory.dmpFilesize
64KB
-
memory/4612-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4612-1069-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/4612-1070-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/4612-1071-0x00000000027D0000-0x00000000027E0000-memory.dmpFilesize
64KB
-
memory/4612-1072-0x00000000027D0000-0x00000000027E0000-memory.dmpFilesize
64KB
-
memory/4612-1073-0x00000000027D0000-0x00000000027E0000-memory.dmpFilesize
64KB
-
memory/4612-1074-0x0000000007810000-0x00000000079D2000-memory.dmpFilesize
1.8MB
-
memory/4612-1075-0x00000000079E0000-0x0000000007F0C000-memory.dmpFilesize
5.2MB
-
memory/4612-1076-0x00000000064C0000-0x0000000006536000-memory.dmpFilesize
472KB
-
memory/4612-1077-0x0000000006550000-0x00000000065A0000-memory.dmpFilesize
320KB