Analysis
-
max time kernel
67s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 21:09
Static task
static1
Behavioral task
behavioral1
Sample
d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe
Resource
win10v2004-20230220-en
General
-
Target
d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe
-
Size
522KB
-
MD5
4f60ed16360097208efccac1cdac2ec7
-
SHA1
d181a2ca371c505047886c7a035288e832d8ff0e
-
SHA256
d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412
-
SHA512
ee9ce1a401082cd7d96d9acec6ac4e722f39185104c4597b55c6fc65b61a79aa82286c0c3918a8ca36ded3d2d5ab8b9765e4450e61345481ed32fb9b7b610015
-
SSDEEP
12288:CMrfy90GjMTCzsGgSEZEC58Ev4PIzWXTK+WHZ:typj+CwGJAFmEwPBjcZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr064548.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr064548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr064548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr064548.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr064548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr064548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr064548.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/3364-158-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-159-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-161-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-163-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-165-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-169-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-167-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-171-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-173-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-177-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-175-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-179-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-181-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-183-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-185-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-187-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-189-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-191-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-193-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-195-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-197-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-199-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-201-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-203-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-205-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-207-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-209-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-211-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-213-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-215-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-217-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-219-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3364-221-0x0000000002550000-0x000000000258F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziCL0209.exejr064548.exeku595748.exelr918418.exepid process 1040 ziCL0209.exe 4084 jr064548.exe 3364 ku595748.exe 240 lr918418.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr064548.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr064548.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exeziCL0209.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziCL0209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCL0209.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4796 3364 WerFault.exe ku595748.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr064548.exeku595748.exelr918418.exepid process 4084 jr064548.exe 4084 jr064548.exe 3364 ku595748.exe 3364 ku595748.exe 240 lr918418.exe 240 lr918418.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr064548.exeku595748.exelr918418.exedescription pid process Token: SeDebugPrivilege 4084 jr064548.exe Token: SeDebugPrivilege 3364 ku595748.exe Token: SeDebugPrivilege 240 lr918418.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exeziCL0209.exedescription pid process target process PID 1120 wrote to memory of 1040 1120 d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe ziCL0209.exe PID 1120 wrote to memory of 1040 1120 d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe ziCL0209.exe PID 1120 wrote to memory of 1040 1120 d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe ziCL0209.exe PID 1040 wrote to memory of 4084 1040 ziCL0209.exe jr064548.exe PID 1040 wrote to memory of 4084 1040 ziCL0209.exe jr064548.exe PID 1040 wrote to memory of 3364 1040 ziCL0209.exe ku595748.exe PID 1040 wrote to memory of 3364 1040 ziCL0209.exe ku595748.exe PID 1040 wrote to memory of 3364 1040 ziCL0209.exe ku595748.exe PID 1120 wrote to memory of 240 1120 d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe lr918418.exe PID 1120 wrote to memory of 240 1120 d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe lr918418.exe PID 1120 wrote to memory of 240 1120 d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe lr918418.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe"C:\Users\Admin\AppData\Local\Temp\d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL0209.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL0209.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr064548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr064548.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595748.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595748.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 13724⤵
- Program crash
PID:4796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918418.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918418.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3364 -ip 33641⤵PID:1876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD511236a454445c5242f712f6d1e3f9d12
SHA15e411bb62092445537bb17b3c62d2caa39d41b96
SHA25633051f6e3e6793efcb26bd167738a55ac59f512c4712e0553f5299a47d00a829
SHA512c127404660367e8c4b444378005a54e0050690d6628761a4f0e2105d757fff7f191c7896812ac644215a9170680de61ca50a8a8ce0b240fd1004279626b7a15e
-
Filesize
175KB
MD511236a454445c5242f712f6d1e3f9d12
SHA15e411bb62092445537bb17b3c62d2caa39d41b96
SHA25633051f6e3e6793efcb26bd167738a55ac59f512c4712e0553f5299a47d00a829
SHA512c127404660367e8c4b444378005a54e0050690d6628761a4f0e2105d757fff7f191c7896812ac644215a9170680de61ca50a8a8ce0b240fd1004279626b7a15e
-
Filesize
379KB
MD51a3e73b577826b6ad0669491656bb574
SHA1c0ba069ee7c2b3e57538539324e1c16029c1aa88
SHA2562cf3ad24b874605310eb0a9f611d2004161cb0bd3a50e0add2a4204f92f95172
SHA512c1f7fc4ae0ad9e6e550dee454a4ead439c14f755fbf053d48e79451888f4055cd7038d2e0aa83c7298069f94fe66c4d2d8c5b8d077f9cea3956fe3ce418054dc
-
Filesize
379KB
MD51a3e73b577826b6ad0669491656bb574
SHA1c0ba069ee7c2b3e57538539324e1c16029c1aa88
SHA2562cf3ad24b874605310eb0a9f611d2004161cb0bd3a50e0add2a4204f92f95172
SHA512c1f7fc4ae0ad9e6e550dee454a4ead439c14f755fbf053d48e79451888f4055cd7038d2e0aa83c7298069f94fe66c4d2d8c5b8d077f9cea3956fe3ce418054dc
-
Filesize
15KB
MD5483240f55605534f1233347a5bfb989a
SHA1683ed7e748e66d30908964d52e0fb9152a74888a
SHA256662b7010f48a57d1c2660f3651f15f2fd04e520838b51f3670f4da5af17a9c8b
SHA512e53fc7127879a16443a9596aee080813316832344ff6e28d6bc9a02c55a9195d2c8343115e4072818c3221650310f728dd7d64690ac0b91c7395166ca9e1bfb5
-
Filesize
15KB
MD5483240f55605534f1233347a5bfb989a
SHA1683ed7e748e66d30908964d52e0fb9152a74888a
SHA256662b7010f48a57d1c2660f3651f15f2fd04e520838b51f3670f4da5af17a9c8b
SHA512e53fc7127879a16443a9596aee080813316832344ff6e28d6bc9a02c55a9195d2c8343115e4072818c3221650310f728dd7d64690ac0b91c7395166ca9e1bfb5
-
Filesize
294KB
MD55c90fcb635fab7a2655b4dc7c25cf817
SHA138d15b52429310e437f6502ce385f67e4372c6ca
SHA256445d0df4239c3ab9ad31d84a85a8f8009e78f076b6d74a60910cd58a4ebcbe68
SHA512e64f7203da097ec8ecd9cc452ab8970e382323f2e9bd122594e429cc8b1f3a881129374b3af52c981e838ed5e29799afc1fc27d911612ba150c3b6a58456cad6
-
Filesize
294KB
MD55c90fcb635fab7a2655b4dc7c25cf817
SHA138d15b52429310e437f6502ce385f67e4372c6ca
SHA256445d0df4239c3ab9ad31d84a85a8f8009e78f076b6d74a60910cd58a4ebcbe68
SHA512e64f7203da097ec8ecd9cc452ab8970e382323f2e9bd122594e429cc8b1f3a881129374b3af52c981e838ed5e29799afc1fc27d911612ba150c3b6a58456cad6