Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe
Resource
win10-20230220-en
General
-
Target
33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe
-
Size
534KB
-
MD5
fc27194adae492e7119946b86bc5fe6c
-
SHA1
3d51c8729599bdbe10cd86f352e3c887ba7d5bba
-
SHA256
33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446
-
SHA512
f02be58f3f53e5dd53a82885fc0b1951ae2685d480ff09e746e297ed0eea9d111bde8e1f3f07be26c97971961b24fc48a1a52aaff5e2ad9a49eb8be4dbc7b80c
-
SSDEEP
12288:EMrqy90RGlAOzb0/NB+3dH1u/O6b0Y6rXNS:myl0qdObJ6dS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr137092.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr137092.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr137092.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr137092.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr137092.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr137092.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/5112-136-0x00000000020C0000-0x0000000002106000-memory.dmp family_redline behavioral1/memory/5112-142-0x0000000004A80000-0x0000000004AC4000-memory.dmp family_redline behavioral1/memory/5112-143-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-144-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-146-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-148-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-150-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-152-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-154-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-156-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-186-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/5112-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziTZ0462.exejr137092.exeku359563.exelr275337.exepid process 3548 ziTZ0462.exe 2344 jr137092.exe 5112 ku359563.exe 4544 lr275337.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr137092.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr137092.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziTZ0462.exe33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTZ0462.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTZ0462.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr137092.exeku359563.exelr275337.exepid process 2344 jr137092.exe 2344 jr137092.exe 5112 ku359563.exe 5112 ku359563.exe 4544 lr275337.exe 4544 lr275337.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr137092.exeku359563.exelr275337.exedescription pid process Token: SeDebugPrivilege 2344 jr137092.exe Token: SeDebugPrivilege 5112 ku359563.exe Token: SeDebugPrivilege 4544 lr275337.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exeziTZ0462.exedescription pid process target process PID 4124 wrote to memory of 3548 4124 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe ziTZ0462.exe PID 4124 wrote to memory of 3548 4124 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe ziTZ0462.exe PID 4124 wrote to memory of 3548 4124 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe ziTZ0462.exe PID 3548 wrote to memory of 2344 3548 ziTZ0462.exe jr137092.exe PID 3548 wrote to memory of 2344 3548 ziTZ0462.exe jr137092.exe PID 3548 wrote to memory of 5112 3548 ziTZ0462.exe ku359563.exe PID 3548 wrote to memory of 5112 3548 ziTZ0462.exe ku359563.exe PID 3548 wrote to memory of 5112 3548 ziTZ0462.exe ku359563.exe PID 4124 wrote to memory of 4544 4124 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe lr275337.exe PID 4124 wrote to memory of 4544 4124 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe lr275337.exe PID 4124 wrote to memory of 4544 4124 33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe lr275337.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe"C:\Users\Admin\AppData\Local\Temp\33108df62bf35432cc566243b310fd8c41d5e55daa07daba565971f406b5f446.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTZ0462.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTZ0462.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr137092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr137092.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku359563.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku359563.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275337.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275337.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275337.exeFilesize
175KB
MD5d0dea9899398159ad2e7a8a392c9482d
SHA13ffb068db0c9faa26129c4c315ff7c436c5dded6
SHA2560e787d722bf3055e07b3327c9cf042435ac6c6f6dbf0d5c08ec5267d4d4d8a7f
SHA5122a6389d0af2f2b8cb1c34daf8eabb4cccaee3dfc4003b6d47c81d18bb2f151194afbe6b016fd7c50895e37d860837bb23882d8312fd4a3acff1bd072d2835249
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275337.exeFilesize
175KB
MD5d0dea9899398159ad2e7a8a392c9482d
SHA13ffb068db0c9faa26129c4c315ff7c436c5dded6
SHA2560e787d722bf3055e07b3327c9cf042435ac6c6f6dbf0d5c08ec5267d4d4d8a7f
SHA5122a6389d0af2f2b8cb1c34daf8eabb4cccaee3dfc4003b6d47c81d18bb2f151194afbe6b016fd7c50895e37d860837bb23882d8312fd4a3acff1bd072d2835249
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTZ0462.exeFilesize
392KB
MD54e2be84f0874ea4d6f3bc7e434c6843d
SHA1eeaaa8adfc6a44a1df54634c1f0b7bfb1d66f7e2
SHA256dd0fad8122ff443359a1cbffa8ddbc7d92c3a80bd95f5a46ecbf4c17ae96c6a7
SHA512bb3a02c013ac426d3aae5fd5a0234724757db92ecb3605e6fcde1eed017c81a9d5db7bccd9914760810118b371063a5bafd306f378f21e27b68bb770fa237588
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTZ0462.exeFilesize
392KB
MD54e2be84f0874ea4d6f3bc7e434c6843d
SHA1eeaaa8adfc6a44a1df54634c1f0b7bfb1d66f7e2
SHA256dd0fad8122ff443359a1cbffa8ddbc7d92c3a80bd95f5a46ecbf4c17ae96c6a7
SHA512bb3a02c013ac426d3aae5fd5a0234724757db92ecb3605e6fcde1eed017c81a9d5db7bccd9914760810118b371063a5bafd306f378f21e27b68bb770fa237588
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr137092.exeFilesize
11KB
MD5b01c973d25fb6f06a62fbe4989e2dfe9
SHA1eb73051d6a04748343539bd3811315df479e834e
SHA256bbe6cc4d34e1d829f1858ed8f247b915c979b51adf891b306c7530d752898e6b
SHA5124060be8dc1e9e890fcf7fa99a4a2a3aeee76b65e06acd29313dfb5e3659dd3ae05dd685403d333ba196b12379b8618f5cd5f57b3d4e73edaa54baa6a297f22cb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr137092.exeFilesize
11KB
MD5b01c973d25fb6f06a62fbe4989e2dfe9
SHA1eb73051d6a04748343539bd3811315df479e834e
SHA256bbe6cc4d34e1d829f1858ed8f247b915c979b51adf891b306c7530d752898e6b
SHA5124060be8dc1e9e890fcf7fa99a4a2a3aeee76b65e06acd29313dfb5e3659dd3ae05dd685403d333ba196b12379b8618f5cd5f57b3d4e73edaa54baa6a297f22cb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku359563.exeFilesize
318KB
MD530dfc02bd05b8d861f8362518f806cdc
SHA1d539d5bee4ba5c1f9e7dc5d88b33141847fc27ce
SHA2568cc32cda2349aae2646fcb91c5a67ec9d778d5295ef2d4f86faa3bade8d43b20
SHA512e9902aff0fae40f3552721e5f0a996cd0f064e8c5f34055249a47ab8e63b6c68212a99bed6c3451a751df689698aa82c5eb57ac5aef308f459af2b426656cedf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku359563.exeFilesize
318KB
MD530dfc02bd05b8d861f8362518f806cdc
SHA1d539d5bee4ba5c1f9e7dc5d88b33141847fc27ce
SHA2568cc32cda2349aae2646fcb91c5a67ec9d778d5295ef2d4f86faa3bade8d43b20
SHA512e9902aff0fae40f3552721e5f0a996cd0f064e8c5f34055249a47ab8e63b6c68212a99bed6c3451a751df689698aa82c5eb57ac5aef308f459af2b426656cedf
-
memory/2344-130-0x0000000000B30000-0x0000000000B3A000-memory.dmpFilesize
40KB
-
memory/4544-1071-0x0000000000800000-0x0000000000832000-memory.dmpFilesize
200KB
-
memory/4544-1072-0x0000000005250000-0x000000000529B000-memory.dmpFilesize
300KB
-
memory/4544-1073-0x00000000050A0000-0x00000000050B0000-memory.dmpFilesize
64KB
-
memory/5112-174-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-184-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-139-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-140-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-141-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-142-0x0000000004A80000-0x0000000004AC4000-memory.dmpFilesize
272KB
-
memory/5112-143-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-144-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-146-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-148-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-150-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-152-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-154-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-156-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-158-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-160-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-162-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-164-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-166-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-168-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-170-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-172-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-138-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/5112-176-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-178-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-180-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-182-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-137-0x0000000004B90000-0x000000000508E000-memory.dmpFilesize
5.0MB
-
memory/5112-186-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-188-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-190-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-192-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-194-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-196-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-198-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-200-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-202-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-204-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-206-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/5112-1049-0x0000000005190000-0x0000000005796000-memory.dmpFilesize
6.0MB
-
memory/5112-1050-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/5112-1051-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/5112-1052-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/5112-1053-0x0000000005A50000-0x0000000005A9B000-memory.dmpFilesize
300KB
-
memory/5112-1054-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-1056-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/5112-1057-0x00000000062A0000-0x0000000006332000-memory.dmpFilesize
584KB
-
memory/5112-1058-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-1059-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-1060-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/5112-1061-0x00000000065A0000-0x0000000006616000-memory.dmpFilesize
472KB
-
memory/5112-136-0x00000000020C0000-0x0000000002106000-memory.dmpFilesize
280KB
-
memory/5112-1062-0x0000000006630000-0x0000000006680000-memory.dmpFilesize
320KB
-
memory/5112-1063-0x00000000066C0000-0x0000000006882000-memory.dmpFilesize
1.8MB
-
memory/5112-1064-0x0000000006890000-0x0000000006DBC000-memory.dmpFilesize
5.2MB
-
memory/5112-1065-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB