Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 01:41
Static task
static1
Behavioral task
behavioral1
Sample
417b4a5f950f580671f84dc15863ea85.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
417b4a5f950f580671f84dc15863ea85.exe
Resource
win10v2004-20230221-en
General
-
Target
417b4a5f950f580671f84dc15863ea85.exe
-
Size
689KB
-
MD5
417b4a5f950f580671f84dc15863ea85
-
SHA1
8f51262fdeb7deb38ecfa9b22e837f804769c6bf
-
SHA256
813ed11fcd39da3bbdc5143caf6c97a0b60dc61ae273da4eb7f89a00c1d9ddd8
-
SHA512
f62bc6969403494a023c1c29fd7e558d1eab7c841cdc53caefa7c7272432f370a54e01a206dc0efe48108efde9f55861786a5a39b617182eb162c5e2b47e9e93
-
SSDEEP
12288:SGwUX0PE9LEv2jYWT9BY4DvfOkRTJDfXR0cMQ18gJl24dAIrO:SG70PWrjYG9e4zvDhRGgr24d1O
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
jr442228.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr442228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr442228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr442228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr442228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr442228.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr442228.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/588-86-0x0000000000D00000-0x0000000000D46000-memory.dmp family_redline behavioral1/memory/588-87-0x0000000000F10000-0x0000000000F54000-memory.dmp family_redline behavioral1/memory/588-88-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-89-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-91-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-93-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-95-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-97-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-99-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-101-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-103-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-105-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-107-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-111-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-114-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-116-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-118-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-120-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-122-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-124-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-126-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-128-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-130-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-132-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-134-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-136-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-138-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-140-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-142-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-144-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-146-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-148-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-150-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-152-0x0000000000F10000-0x0000000000F4F000-memory.dmp family_redline behavioral1/memory/588-998-0x0000000004D50000-0x0000000004D90000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziWN9837.exejr442228.exeku242230.exelr858066.exepid process 1804 ziWN9837.exe 1100 jr442228.exe 588 ku242230.exe 1952 lr858066.exe -
Loads dropped DLL 7 IoCs
Processes:
417b4a5f950f580671f84dc15863ea85.exeziWN9837.exeku242230.exepid process 1808 417b4a5f950f580671f84dc15863ea85.exe 1804 ziWN9837.exe 1804 ziWN9837.exe 1804 ziWN9837.exe 1804 ziWN9837.exe 588 ku242230.exe 1808 417b4a5f950f580671f84dc15863ea85.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr442228.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr442228.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features jr442228.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziWN9837.exe417b4a5f950f580671f84dc15863ea85.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWN9837.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 417b4a5f950f580671f84dc15863ea85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 417b4a5f950f580671f84dc15863ea85.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWN9837.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr442228.exeku242230.exelr858066.exepid process 1100 jr442228.exe 1100 jr442228.exe 588 ku242230.exe 588 ku242230.exe 1952 lr858066.exe 1952 lr858066.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr442228.exeku242230.exelr858066.exedescription pid process Token: SeDebugPrivilege 1100 jr442228.exe Token: SeDebugPrivilege 588 ku242230.exe Token: SeDebugPrivilege 1952 lr858066.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
417b4a5f950f580671f84dc15863ea85.exeziWN9837.exedescription pid process target process PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1808 wrote to memory of 1804 1808 417b4a5f950f580671f84dc15863ea85.exe ziWN9837.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 1100 1804 ziWN9837.exe jr442228.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1804 wrote to memory of 588 1804 ziWN9837.exe ku242230.exe PID 1808 wrote to memory of 1952 1808 417b4a5f950f580671f84dc15863ea85.exe lr858066.exe PID 1808 wrote to memory of 1952 1808 417b4a5f950f580671f84dc15863ea85.exe lr858066.exe PID 1808 wrote to memory of 1952 1808 417b4a5f950f580671f84dc15863ea85.exe lr858066.exe PID 1808 wrote to memory of 1952 1808 417b4a5f950f580671f84dc15863ea85.exe lr858066.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\417b4a5f950f580671f84dc15863ea85.exe"C:\Users\Admin\AppData\Local\Temp\417b4a5f950f580671f84dc15863ea85.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWN9837.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWN9837.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr442228.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr442228.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku242230.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku242230.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr858066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr858066.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51b3d3d0bf1647846b849417c66e1eb61
SHA140f6bdf5d300c13ff57027aacc86e9014411be3d
SHA25632c9fff9e4880f6467fb1f2afb1f8496e249aac09aff74664854ef97c5315f79
SHA51292e1ad76f815de419a37f0b110c60a84e9b84da8aa67697857048303d50e6b8f7b862d51f880600c94a14ca6ad1907c9ea006f44b32c67bc1f42da5b83a63a3c
-
Filesize
175KB
MD51b3d3d0bf1647846b849417c66e1eb61
SHA140f6bdf5d300c13ff57027aacc86e9014411be3d
SHA25632c9fff9e4880f6467fb1f2afb1f8496e249aac09aff74664854ef97c5315f79
SHA51292e1ad76f815de419a37f0b110c60a84e9b84da8aa67697857048303d50e6b8f7b862d51f880600c94a14ca6ad1907c9ea006f44b32c67bc1f42da5b83a63a3c
-
Filesize
412KB
MD5919bda41ac3a51959a04239e18ae15f5
SHA1d22c97a616604dc7b8e40d076d53248c951e01eb
SHA256fe731f162020686b125737a3122f0da5da067d03c96b59518b08f0e378da52cc
SHA51222f6d9efffe89643c8662017b11a608937c112ecf77bb872017deda930b98c84a32a32a84b15eec601216e85c0b72551e19be86c36b591f7abb021f90e3bb29e
-
Filesize
412KB
MD5919bda41ac3a51959a04239e18ae15f5
SHA1d22c97a616604dc7b8e40d076d53248c951e01eb
SHA256fe731f162020686b125737a3122f0da5da067d03c96b59518b08f0e378da52cc
SHA51222f6d9efffe89643c8662017b11a608937c112ecf77bb872017deda930b98c84a32a32a84b15eec601216e85c0b72551e19be86c36b591f7abb021f90e3bb29e
-
Filesize
11KB
MD53411190db00a24305e218735da30dd43
SHA1f3eab1bbd0107864958415ba9540e961d6608ac1
SHA25658414c076a849c89a7bae1b4465cac97e6a5a1d4124acb9e3a72fd17cb955b6c
SHA5127e11fb765506bb47d43c6a0ed4a756ce5cf05751c19b9f7d27efe3ad15a6437dbb9a1fdfc3b771b7596cae96a1b17d01766f214e90fa264194cbfd7bc8e948e8
-
Filesize
11KB
MD53411190db00a24305e218735da30dd43
SHA1f3eab1bbd0107864958415ba9540e961d6608ac1
SHA25658414c076a849c89a7bae1b4465cac97e6a5a1d4124acb9e3a72fd17cb955b6c
SHA5127e11fb765506bb47d43c6a0ed4a756ce5cf05751c19b9f7d27efe3ad15a6437dbb9a1fdfc3b771b7596cae96a1b17d01766f214e90fa264194cbfd7bc8e948e8
-
Filesize
365KB
MD510e54a934dcf8cc1a605932adaa1e52b
SHA1d5159b84191c3b070dd33bb09b8749dddc8bc8db
SHA2568d9f9001387f6f8917dccead652d66d05642c4fa72f07745e0755e4dfda36ccc
SHA51240a0efe89f4246c1c23f5dd701aec060305b99a0734bedf6d612be14e40995f924764e62d9450ca3098e268290485dc75732543939df5699335800115d4e90c1
-
Filesize
365KB
MD510e54a934dcf8cc1a605932adaa1e52b
SHA1d5159b84191c3b070dd33bb09b8749dddc8bc8db
SHA2568d9f9001387f6f8917dccead652d66d05642c4fa72f07745e0755e4dfda36ccc
SHA51240a0efe89f4246c1c23f5dd701aec060305b99a0734bedf6d612be14e40995f924764e62d9450ca3098e268290485dc75732543939df5699335800115d4e90c1
-
Filesize
365KB
MD510e54a934dcf8cc1a605932adaa1e52b
SHA1d5159b84191c3b070dd33bb09b8749dddc8bc8db
SHA2568d9f9001387f6f8917dccead652d66d05642c4fa72f07745e0755e4dfda36ccc
SHA51240a0efe89f4246c1c23f5dd701aec060305b99a0734bedf6d612be14e40995f924764e62d9450ca3098e268290485dc75732543939df5699335800115d4e90c1
-
Filesize
175KB
MD51b3d3d0bf1647846b849417c66e1eb61
SHA140f6bdf5d300c13ff57027aacc86e9014411be3d
SHA25632c9fff9e4880f6467fb1f2afb1f8496e249aac09aff74664854ef97c5315f79
SHA51292e1ad76f815de419a37f0b110c60a84e9b84da8aa67697857048303d50e6b8f7b862d51f880600c94a14ca6ad1907c9ea006f44b32c67bc1f42da5b83a63a3c
-
Filesize
412KB
MD5919bda41ac3a51959a04239e18ae15f5
SHA1d22c97a616604dc7b8e40d076d53248c951e01eb
SHA256fe731f162020686b125737a3122f0da5da067d03c96b59518b08f0e378da52cc
SHA51222f6d9efffe89643c8662017b11a608937c112ecf77bb872017deda930b98c84a32a32a84b15eec601216e85c0b72551e19be86c36b591f7abb021f90e3bb29e
-
Filesize
412KB
MD5919bda41ac3a51959a04239e18ae15f5
SHA1d22c97a616604dc7b8e40d076d53248c951e01eb
SHA256fe731f162020686b125737a3122f0da5da067d03c96b59518b08f0e378da52cc
SHA51222f6d9efffe89643c8662017b11a608937c112ecf77bb872017deda930b98c84a32a32a84b15eec601216e85c0b72551e19be86c36b591f7abb021f90e3bb29e
-
Filesize
11KB
MD53411190db00a24305e218735da30dd43
SHA1f3eab1bbd0107864958415ba9540e961d6608ac1
SHA25658414c076a849c89a7bae1b4465cac97e6a5a1d4124acb9e3a72fd17cb955b6c
SHA5127e11fb765506bb47d43c6a0ed4a756ce5cf05751c19b9f7d27efe3ad15a6437dbb9a1fdfc3b771b7596cae96a1b17d01766f214e90fa264194cbfd7bc8e948e8
-
Filesize
365KB
MD510e54a934dcf8cc1a605932adaa1e52b
SHA1d5159b84191c3b070dd33bb09b8749dddc8bc8db
SHA2568d9f9001387f6f8917dccead652d66d05642c4fa72f07745e0755e4dfda36ccc
SHA51240a0efe89f4246c1c23f5dd701aec060305b99a0734bedf6d612be14e40995f924764e62d9450ca3098e268290485dc75732543939df5699335800115d4e90c1
-
Filesize
365KB
MD510e54a934dcf8cc1a605932adaa1e52b
SHA1d5159b84191c3b070dd33bb09b8749dddc8bc8db
SHA2568d9f9001387f6f8917dccead652d66d05642c4fa72f07745e0755e4dfda36ccc
SHA51240a0efe89f4246c1c23f5dd701aec060305b99a0734bedf6d612be14e40995f924764e62d9450ca3098e268290485dc75732543939df5699335800115d4e90c1
-
Filesize
365KB
MD510e54a934dcf8cc1a605932adaa1e52b
SHA1d5159b84191c3b070dd33bb09b8749dddc8bc8db
SHA2568d9f9001387f6f8917dccead652d66d05642c4fa72f07745e0755e4dfda36ccc
SHA51240a0efe89f4246c1c23f5dd701aec060305b99a0734bedf6d612be14e40995f924764e62d9450ca3098e268290485dc75732543939df5699335800115d4e90c1