Analysis
-
max time kernel
52s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 12:49
Static task
static1
Behavioral task
behavioral1
Sample
da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe
Resource
win10-20230220-en
General
-
Target
da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe
-
Size
691KB
-
MD5
89ae8d43eaa724a3cceec8885235f601
-
SHA1
36be6adad9f7c873e324701f514ec032c0f73346
-
SHA256
da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b
-
SHA512
349eddfbd5064e183e3a7efecd0b975be547fa522e46c415182915ba86b8aa469eec070f959ca099900ac30fe18382162055f0283e92946f5502a6803623c11d
-
SSDEEP
12288:ajXKBvlIpVxdoY3596cdUkVcLaKNJbITIIkvg9UnFhsMZx8xT2:0abIpVjtScdfxKT6IIktFhsMgT2
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr806405.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2824-144-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/2824-148-0x00000000025D0000-0x0000000002614000-memory.dmp family_redline behavioral1/memory/2824-149-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-150-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-152-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-154-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-156-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-158-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-160-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-162-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-164-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-166-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-168-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-170-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-172-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-174-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-176-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-178-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-180-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-182-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-184-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-186-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-188-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-190-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-192-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-194-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-196-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-198-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-200-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-202-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-204-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-206-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-208-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline behavioral1/memory/2824-210-0x00000000025D0000-0x000000000260E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2100 zieN6673.exe 2132 jr806405.exe 2824 ku081645.exe 4312 lr730710.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr806405.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieN6673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieN6673.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2132 jr806405.exe 2132 jr806405.exe 2824 ku081645.exe 2824 ku081645.exe 4312 lr730710.exe 4312 lr730710.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2132 jr806405.exe Token: SeDebugPrivilege 2824 ku081645.exe Token: SeDebugPrivilege 4312 lr730710.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2100 4212 da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe 66 PID 4212 wrote to memory of 2100 4212 da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe 66 PID 4212 wrote to memory of 2100 4212 da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe 66 PID 2100 wrote to memory of 2132 2100 zieN6673.exe 67 PID 2100 wrote to memory of 2132 2100 zieN6673.exe 67 PID 2100 wrote to memory of 2824 2100 zieN6673.exe 68 PID 2100 wrote to memory of 2824 2100 zieN6673.exe 68 PID 2100 wrote to memory of 2824 2100 zieN6673.exe 68 PID 4212 wrote to memory of 4312 4212 da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe 70 PID 4212 wrote to memory of 4312 4212 da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe 70 PID 4212 wrote to memory of 4312 4212 da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe"C:\Users\Admin\AppData\Local\Temp\da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd