Analysis
-
max time kernel
52s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 21:42
Static task
static1
Behavioral task
behavioral1
Sample
4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe
Resource
win10-20230220-en
General
-
Target
4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe
-
Size
533KB
-
MD5
8c6a43a322902e1954d70784258d5a9e
-
SHA1
677d0901d358b47b6ef1d52eda44bf26b7a38b0b
-
SHA256
4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d
-
SHA512
bdc8c12323032b3f8352f7abd6d1a801cf52049a39867f43538ae1eb9980ca941571e4b0ebbddd816b13e9bef1ee4eba322ec7ce775400c4e5f14f729378d7b2
-
SSDEEP
6144:KEy+bnr+0p0yN90QEgTrewtqz+vf2HSyTSroM64cgO3ZXv/rE3Lq6i89SOHPJycf:0MrEy90+yGySyy96fDY3LqsDHRycuzU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr299965.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr299965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr299965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr299965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr299965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr299965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1072-141-0x0000000005FD0000-0x0000000006016000-memory.dmp family_redline behavioral1/memory/1072-143-0x0000000006060000-0x00000000060A4000-memory.dmp family_redline behavioral1/memory/1072-148-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-149-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-151-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-155-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-153-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-159-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-163-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-161-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-167-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-165-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-171-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-173-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-175-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-177-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-181-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-183-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-179-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-185-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-169-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-157-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-187-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-189-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-197-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-201-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-205-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-203-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-207-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-199-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-211-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-209-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-195-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-193-0x0000000006060000-0x000000000609F000-memory.dmp family_redline behavioral1/memory/1072-191-0x0000000006060000-0x000000000609F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zitP7430.exejr299965.exeku435338.exelr504882.exepid process 1500 zitP7430.exe 1784 jr299965.exe 1072 ku435338.exe 2628 lr504882.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr299965.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr299965.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zitP7430.exe4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitP7430.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitP7430.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr299965.exeku435338.exelr504882.exepid process 1784 jr299965.exe 1784 jr299965.exe 1072 ku435338.exe 1072 ku435338.exe 2628 lr504882.exe 2628 lr504882.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr299965.exeku435338.exelr504882.exedescription pid process Token: SeDebugPrivilege 1784 jr299965.exe Token: SeDebugPrivilege 1072 ku435338.exe Token: SeDebugPrivilege 2628 lr504882.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exezitP7430.exedescription pid process target process PID 1224 wrote to memory of 1500 1224 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe zitP7430.exe PID 1224 wrote to memory of 1500 1224 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe zitP7430.exe PID 1224 wrote to memory of 1500 1224 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe zitP7430.exe PID 1500 wrote to memory of 1784 1500 zitP7430.exe jr299965.exe PID 1500 wrote to memory of 1784 1500 zitP7430.exe jr299965.exe PID 1500 wrote to memory of 1072 1500 zitP7430.exe ku435338.exe PID 1500 wrote to memory of 1072 1500 zitP7430.exe ku435338.exe PID 1500 wrote to memory of 1072 1500 zitP7430.exe ku435338.exe PID 1224 wrote to memory of 2628 1224 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe lr504882.exe PID 1224 wrote to memory of 2628 1224 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe lr504882.exe PID 1224 wrote to memory of 2628 1224 4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe lr504882.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe"C:\Users\Admin\AppData\Local\Temp\4d49650943c2689fea6885a02f89901660e7e5d84697063b8e4e34a27d6e041d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitP7430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitP7430.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr299965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr299965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku435338.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku435338.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr504882.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr504882.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD553d5cdd81125ecf3910dbed1f0aa3bb9
SHA1a90bf67e1cfee79009f74cec763914b1950f5957
SHA2560694a4d4218a6707ac8fee56a99a518269860026e5c3486030fa229f5de27698
SHA51298f8456e8b189dbc88407d083234ac6ed8fe11e63ea52beff3dd203d5a68859eda4d1904d7956b8db157e148d9f6cd8dd824e6249de3a57a22d21841d2ad6f5d
-
Filesize
175KB
MD553d5cdd81125ecf3910dbed1f0aa3bb9
SHA1a90bf67e1cfee79009f74cec763914b1950f5957
SHA2560694a4d4218a6707ac8fee56a99a518269860026e5c3486030fa229f5de27698
SHA51298f8456e8b189dbc88407d083234ac6ed8fe11e63ea52beff3dd203d5a68859eda4d1904d7956b8db157e148d9f6cd8dd824e6249de3a57a22d21841d2ad6f5d
-
Filesize
391KB
MD50dbf4fcc6cf6a8aa598e2ca16a73b8ab
SHA1389c1aba96348d92dbdd6b75598a976a03588970
SHA2567fa8f289e77f386f90dd4e87304d3a5c5c18f568c97ef3c0cc6e6a7a75216cef
SHA51293edd4ac839a7dcdd601ee65c3e391d5cb8cf0b1061b87b05fdea6e95c4d297b702d0470a3bf12a7af9ff609e848b8a30bdfd34aeed36e4d02011b9bd2bdd513
-
Filesize
391KB
MD50dbf4fcc6cf6a8aa598e2ca16a73b8ab
SHA1389c1aba96348d92dbdd6b75598a976a03588970
SHA2567fa8f289e77f386f90dd4e87304d3a5c5c18f568c97ef3c0cc6e6a7a75216cef
SHA51293edd4ac839a7dcdd601ee65c3e391d5cb8cf0b1061b87b05fdea6e95c4d297b702d0470a3bf12a7af9ff609e848b8a30bdfd34aeed36e4d02011b9bd2bdd513
-
Filesize
11KB
MD587bb742331211c1300d310314aae4f83
SHA15d28794497cb37cff1e463698f51ba5cdb9eff5f
SHA256b08f0e542490096b4fe40bf02ebd8c595e8bc253da3dd62d23301013eae25943
SHA5126f6a5dc26d4e4cab8ebead4844cc74f9a1b8d1177967ab31a442290f280d710d1a0df67a5310df74747880a7731719acad0e28bc25910ca07317f6b9095c2176
-
Filesize
11KB
MD587bb742331211c1300d310314aae4f83
SHA15d28794497cb37cff1e463698f51ba5cdb9eff5f
SHA256b08f0e542490096b4fe40bf02ebd8c595e8bc253da3dd62d23301013eae25943
SHA5126f6a5dc26d4e4cab8ebead4844cc74f9a1b8d1177967ab31a442290f280d710d1a0df67a5310df74747880a7731719acad0e28bc25910ca07317f6b9095c2176
-
Filesize
359KB
MD52b3e3042a21d8fe092b5b222f7652246
SHA10d7d79ce4d3756d0b5474fe78194d6126f44b3bd
SHA256f6fac4de2addc9be17daed7694bcc55cd4d897112d33f63cbd6ac798d691e908
SHA512c56d87c94ed5c0513954357f243e8697d10a499e85df6b07d6917db9844f5a48616265a84bada748f0ab9d459835739074b4afcfbeba262121773dc9ad0b5eb6
-
Filesize
359KB
MD52b3e3042a21d8fe092b5b222f7652246
SHA10d7d79ce4d3756d0b5474fe78194d6126f44b3bd
SHA256f6fac4de2addc9be17daed7694bcc55cd4d897112d33f63cbd6ac798d691e908
SHA512c56d87c94ed5c0513954357f243e8697d10a499e85df6b07d6917db9844f5a48616265a84bada748f0ab9d459835739074b4afcfbeba262121773dc9ad0b5eb6