Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 19:10
Static task
static1
Behavioral task
behavioral1
Sample
f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe
Resource
win10-20230220-en
General
-
Target
f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe
-
Size
534KB
-
MD5
ce818715bbbe5873d0e572a55be9eeb9
-
SHA1
63c893bec9296189545b69dc379ea63721256acc
-
SHA256
f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b
-
SHA512
1a9c8aff4d210982c6a10a1191c1da7a061ce9c760085a4c85016b9ffa87eceb12bb554cd351c9f99ecf5dc5f578a44a3536c58e47e504ad11e1d293fefdb319
-
SSDEEP
12288:HMrxy90zO8HWgOZJQVFH5WjLmWJ/O6DJSnrMaAsTp:qyMWgObQVFZWdIrMaAsF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr159180.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr159180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr159180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr159180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr159180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr159180.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1540-136-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/1540-140-0x0000000004F90000-0x0000000004FD4000-memory.dmp family_redline behavioral1/memory/1540-143-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-144-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-146-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-148-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-150-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-152-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-154-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-156-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-158-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-160-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-162-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-164-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-166-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-168-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-170-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-172-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-174-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-176-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-178-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-182-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-180-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-186-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-184-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-188-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-190-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-192-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-194-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-196-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-198-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-200-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-204-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-206-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline behavioral1/memory/1540-202-0x0000000004F90000-0x0000000004FCF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziNe9130.exejr159180.exeku257209.exelr475438.exepid process 3904 ziNe9130.exe 4816 jr159180.exe 1540 ku257209.exe 4572 lr475438.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr159180.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr159180.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exeziNe9130.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNe9130.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNe9130.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr159180.exeku257209.exelr475438.exepid process 4816 jr159180.exe 4816 jr159180.exe 1540 ku257209.exe 1540 ku257209.exe 4572 lr475438.exe 4572 lr475438.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr159180.exeku257209.exelr475438.exedescription pid process Token: SeDebugPrivilege 4816 jr159180.exe Token: SeDebugPrivilege 1540 ku257209.exe Token: SeDebugPrivilege 4572 lr475438.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exeziNe9130.exedescription pid process target process PID 4052 wrote to memory of 3904 4052 f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe ziNe9130.exe PID 4052 wrote to memory of 3904 4052 f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe ziNe9130.exe PID 4052 wrote to memory of 3904 4052 f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe ziNe9130.exe PID 3904 wrote to memory of 4816 3904 ziNe9130.exe jr159180.exe PID 3904 wrote to memory of 4816 3904 ziNe9130.exe jr159180.exe PID 3904 wrote to memory of 1540 3904 ziNe9130.exe ku257209.exe PID 3904 wrote to memory of 1540 3904 ziNe9130.exe ku257209.exe PID 3904 wrote to memory of 1540 3904 ziNe9130.exe ku257209.exe PID 4052 wrote to memory of 4572 4052 f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe lr475438.exe PID 4052 wrote to memory of 4572 4052 f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe lr475438.exe PID 4052 wrote to memory of 4572 4052 f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe lr475438.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe"C:\Users\Admin\AppData\Local\Temp\f130e761bfb0425d2a23dc3fcd3e11b1bbf55ab74c9eb7b2bcbf6042021e8f8b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNe9130.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNe9130.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr159180.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr159180.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku257209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku257209.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr475438.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr475438.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr475438.exeFilesize
175KB
MD5b3270fd2a5a169f2f063ce8bf1c88392
SHA136f923efba25d9c56a5991e2e5195027ca919806
SHA256c15b2ee652970cb233a1c54f4e8989433a0f70b44e28433a77c062f1487fa03b
SHA512bcc8b990dd3c897e665d3a234ab48886cee017e8b9c811fe81d787cef7970c6563e3035da0d3a202c096f5e14c74bcaaeb0fa1f9978feac86e3e6cd1dba84e9d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr475438.exeFilesize
175KB
MD5b3270fd2a5a169f2f063ce8bf1c88392
SHA136f923efba25d9c56a5991e2e5195027ca919806
SHA256c15b2ee652970cb233a1c54f4e8989433a0f70b44e28433a77c062f1487fa03b
SHA512bcc8b990dd3c897e665d3a234ab48886cee017e8b9c811fe81d787cef7970c6563e3035da0d3a202c096f5e14c74bcaaeb0fa1f9978feac86e3e6cd1dba84e9d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNe9130.exeFilesize
392KB
MD5919f618f0ce76cef25ff929ba1a64079
SHA1c2f71978abe73964ba649d7afafb0980a8d11e6c
SHA2563a9937532798c2be8a87505fe5eeb48a2f574cfff1f722cdabc04b6653fa0cf4
SHA512a38bf6bbb2c1a710570b7b9ceee5aa084dc47103bf5e2b6b50de3158355c5d7bf9aec5b785b41dd66bf52c1168229bcc39b80dafac4e85cc4a16f98c1f8240f2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNe9130.exeFilesize
392KB
MD5919f618f0ce76cef25ff929ba1a64079
SHA1c2f71978abe73964ba649d7afafb0980a8d11e6c
SHA2563a9937532798c2be8a87505fe5eeb48a2f574cfff1f722cdabc04b6653fa0cf4
SHA512a38bf6bbb2c1a710570b7b9ceee5aa084dc47103bf5e2b6b50de3158355c5d7bf9aec5b785b41dd66bf52c1168229bcc39b80dafac4e85cc4a16f98c1f8240f2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr159180.exeFilesize
11KB
MD5578db0fa5399c347f0e402797a1ecb6f
SHA17ba53627d4a29aab2c93c50f96916f300135f1f9
SHA256a3dffdea23bfa317f501f1f6fa1dfb28bac189935cf14ac07e38a7a96d6ca3b4
SHA512ef8f37146e09dd0f12fce2846f3bb8595065b722f0ca0a10cf17bef4c610c5503e6ca205849f10e68c98836d32e19054ff2fec86f171e075a21b3f04db9a99ff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr159180.exeFilesize
11KB
MD5578db0fa5399c347f0e402797a1ecb6f
SHA17ba53627d4a29aab2c93c50f96916f300135f1f9
SHA256a3dffdea23bfa317f501f1f6fa1dfb28bac189935cf14ac07e38a7a96d6ca3b4
SHA512ef8f37146e09dd0f12fce2846f3bb8595065b722f0ca0a10cf17bef4c610c5503e6ca205849f10e68c98836d32e19054ff2fec86f171e075a21b3f04db9a99ff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku257209.exeFilesize
318KB
MD5c40490633f26a37f7092a046d22a2b93
SHA140fcc872f08448eec4a6abf9f949865af398c494
SHA2564032438522dbc6a7b4f2862494f9d33b40fcfd8a4d259e0945b826bc3d3948a9
SHA5123a78fb55fb5b0eae12a47eacbb95a68dedb64d2796b7ed349bdd3b7bc5623ce103045b22d7207785f37655c58288a97c115a85cb1c439a437fd8930889e5cda8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku257209.exeFilesize
318KB
MD5c40490633f26a37f7092a046d22a2b93
SHA140fcc872f08448eec4a6abf9f949865af398c494
SHA2564032438522dbc6a7b4f2862494f9d33b40fcfd8a4d259e0945b826bc3d3948a9
SHA5123a78fb55fb5b0eae12a47eacbb95a68dedb64d2796b7ed349bdd3b7bc5623ce103045b22d7207785f37655c58288a97c115a85cb1c439a437fd8930889e5cda8
-
memory/1540-136-0x0000000004A10000-0x0000000004A56000-memory.dmpFilesize
280KB
-
memory/1540-137-0x0000000004A50000-0x0000000004F4E000-memory.dmpFilesize
5.0MB
-
memory/1540-138-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/1540-140-0x0000000004F90000-0x0000000004FD4000-memory.dmpFilesize
272KB
-
memory/1540-141-0x0000000000700000-0x0000000000710000-memory.dmpFilesize
64KB
-
memory/1540-142-0x0000000000700000-0x0000000000710000-memory.dmpFilesize
64KB
-
memory/1540-139-0x0000000000700000-0x0000000000710000-memory.dmpFilesize
64KB
-
memory/1540-143-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-144-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-146-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-148-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-150-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-152-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-154-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-156-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-158-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-160-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-162-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-164-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-166-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-168-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-170-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-172-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-174-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-176-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-178-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-182-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-180-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-186-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-184-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-188-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-190-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-192-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-194-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-196-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-198-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-200-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-204-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-206-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-202-0x0000000004F90000-0x0000000004FCF000-memory.dmpFilesize
252KB
-
memory/1540-1049-0x0000000005110000-0x0000000005716000-memory.dmpFilesize
6.0MB
-
memory/1540-1050-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/1540-1051-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/1540-1052-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/1540-1053-0x0000000005A90000-0x0000000005ADB000-memory.dmpFilesize
300KB
-
memory/1540-1054-0x0000000000700000-0x0000000000710000-memory.dmpFilesize
64KB
-
memory/1540-1056-0x0000000005BE0000-0x0000000005C72000-memory.dmpFilesize
584KB
-
memory/1540-1057-0x0000000005C80000-0x0000000005CE6000-memory.dmpFilesize
408KB
-
memory/1540-1058-0x0000000000700000-0x0000000000710000-memory.dmpFilesize
64KB
-
memory/1540-1059-0x0000000006480000-0x0000000006642000-memory.dmpFilesize
1.8MB
-
memory/1540-1060-0x0000000006670000-0x0000000006B9C000-memory.dmpFilesize
5.2MB
-
memory/1540-1061-0x0000000006E10000-0x0000000006E86000-memory.dmpFilesize
472KB
-
memory/1540-1062-0x0000000006EA0000-0x0000000006EF0000-memory.dmpFilesize
320KB
-
memory/1540-1063-0x0000000000700000-0x0000000000710000-memory.dmpFilesize
64KB
-
memory/4572-1069-0x00000000001A0000-0x00000000001D2000-memory.dmpFilesize
200KB
-
memory/4572-1070-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4572-1071-0x0000000004BE0000-0x0000000004C2B000-memory.dmpFilesize
300KB
-
memory/4572-1072-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/4816-130-0x0000000000E30000-0x0000000000E3A000-memory.dmpFilesize
40KB