Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 13:32
Static task
static1
Behavioral task
behavioral1
Sample
05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe
Resource
win10-20230220-en
General
-
Target
05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe
-
Size
682KB
-
MD5
cd27ed163028ecd2e41ec7addd43cca6
-
SHA1
b193968d09e02f2afcce16939d90d3beba5251fd
-
SHA256
05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a
-
SHA512
1ed93613626b5a8183b5f6d103b8d6731b376a155116ee2c79b529218bfba3bd6132ccd92abf0d1373f36dacca0880533907665d6718a898f6a449fd1dfcd088
-
SSDEEP
12288:6K7KRc/2qg5H3fNrHqZ99foYUtoBsaUleNc8EfSzAON8ymWJtMsOYyBu:dmI2tH3fBHqZnfoYUt4rUleNECGy54bB
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr806405.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr806405.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1452-145-0x00000000022A0000-0x00000000022E6000-memory.dmp family_redline behavioral1/memory/1452-148-0x0000000002640000-0x0000000002684000-memory.dmp family_redline behavioral1/memory/1452-149-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-150-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-154-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-152-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-156-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-158-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-166-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-164-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-162-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-160-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-168-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-170-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-172-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-174-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-176-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-178-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-180-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-186-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-196-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-194-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-200-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-198-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-192-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-204-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-206-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-210-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-208-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-202-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-190-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-188-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-184-0x0000000002640000-0x000000000267E000-memory.dmp family_redline behavioral1/memory/1452-182-0x0000000002640000-0x000000000267E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4100 zieN6673.exe 4104 jr806405.exe 1452 ku081645.exe 3068 lr730710.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr806405.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieN6673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieN6673.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4104 jr806405.exe 4104 jr806405.exe 1452 ku081645.exe 1452 ku081645.exe 3068 lr730710.exe 3068 lr730710.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4104 jr806405.exe Token: SeDebugPrivilege 1452 ku081645.exe Token: SeDebugPrivilege 3068 lr730710.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4100 1780 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe 66 PID 1780 wrote to memory of 4100 1780 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe 66 PID 1780 wrote to memory of 4100 1780 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe 66 PID 4100 wrote to memory of 4104 4100 zieN6673.exe 67 PID 4100 wrote to memory of 4104 4100 zieN6673.exe 67 PID 4100 wrote to memory of 1452 4100 zieN6673.exe 68 PID 4100 wrote to memory of 1452 4100 zieN6673.exe 68 PID 4100 wrote to memory of 1452 4100 zieN6673.exe 68 PID 1780 wrote to memory of 3068 1780 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe 70 PID 1780 wrote to memory of 3068 1780 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe 70 PID 1780 wrote to memory of 3068 1780 05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe"C:\Users\Admin\AppData\Local\Temp\05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
175KB
MD5d4c1f423e14e05d191e0de1520ad2b17
SHA1d7c1c6fe54d004bdf09fa92bcf202196da23fddc
SHA2567ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7
SHA5122386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
404KB
MD57a51e103844b277238ff8e58e0e451e7
SHA1837df4df7c0ecb44e00e41b4cb1656653467a802
SHA25646e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f
SHA512912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
12KB
MD506c290899c893f40854380588946f1d9
SHA1c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3
SHA256ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81
SHA512eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd
-
Filesize
359KB
MD5f8274519359c67b43f6bd8dc4b784d36
SHA1ed1e8c923663c099b0c46b306000c3ba28389ee4
SHA25604b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296
SHA512a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd