Analysis
-
max time kernel
55s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 20:19
Static task
static1
Behavioral task
behavioral1
Sample
085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe
Resource
win10-20230220-en
General
-
Target
085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe
-
Size
533KB
-
MD5
483b4082d35720abd59c982fa45994bb
-
SHA1
38bd48154e167ce9a1570227983c01559797b153
-
SHA256
085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d
-
SHA512
86f2450233dc57e5ed24218adc295223a1db666b8900a8e83b516e37fa45cb34174d7da03f099a3f57a0ca575ce9969fe8c97dd3b070fb856ae1397212073557
-
SSDEEP
12288:RMrEy90S8fCxRjT563233LqH3UCfy4a7tZL:BySfCxp56G33GXy4ctx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr116880.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr116880.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr116880.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr116880.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr116880.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr116880.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4668-140-0x00000000039F0000-0x0000000003A36000-memory.dmp family_redline behavioral1/memory/4668-144-0x00000000060D0000-0x0000000006114000-memory.dmp family_redline behavioral1/memory/4668-147-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-148-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-150-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-152-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-154-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-156-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-158-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-160-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-162-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-164-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-166-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-168-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-170-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-172-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-174-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-180-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-178-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-176-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-182-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-184-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-186-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-188-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-190-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-192-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-194-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-196-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-198-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-200-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-202-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-204-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-206-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-208-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/4668-210-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziHD5786.exejr116880.exeku411847.exelr553165.exepid process 2120 ziHD5786.exe 4248 jr116880.exe 4668 ku411847.exe 1580 lr553165.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr116880.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr116880.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exeziHD5786.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHD5786.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHD5786.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr116880.exeku411847.exelr553165.exepid process 4248 jr116880.exe 4248 jr116880.exe 4668 ku411847.exe 4668 ku411847.exe 1580 lr553165.exe 1580 lr553165.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr116880.exeku411847.exelr553165.exedescription pid process Token: SeDebugPrivilege 4248 jr116880.exe Token: SeDebugPrivilege 4668 ku411847.exe Token: SeDebugPrivilege 1580 lr553165.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exeziHD5786.exedescription pid process target process PID 5044 wrote to memory of 2120 5044 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe ziHD5786.exe PID 5044 wrote to memory of 2120 5044 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe ziHD5786.exe PID 5044 wrote to memory of 2120 5044 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe ziHD5786.exe PID 2120 wrote to memory of 4248 2120 ziHD5786.exe jr116880.exe PID 2120 wrote to memory of 4248 2120 ziHD5786.exe jr116880.exe PID 2120 wrote to memory of 4668 2120 ziHD5786.exe ku411847.exe PID 2120 wrote to memory of 4668 2120 ziHD5786.exe ku411847.exe PID 2120 wrote to memory of 4668 2120 ziHD5786.exe ku411847.exe PID 5044 wrote to memory of 1580 5044 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe lr553165.exe PID 5044 wrote to memory of 1580 5044 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe lr553165.exe PID 5044 wrote to memory of 1580 5044 085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe lr553165.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe"C:\Users\Admin\AppData\Local\Temp\085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exeFilesize
175KB
MD54ae4e6ce495af0af0b3bb25467e585c9
SHA16d0de52751ffa25bae1d2b1a531a08a9b8f13c7a
SHA256b81cdb896902143de069bd2bbc05cd621d544f1bef560e4f2055ed406e2017ba
SHA512548e99ab748087cb0e743e574e36817d17bedaa23fc200e7d1ef53a27799a806651424398ade1a2e8879c76c5bed721adf120783d528cb9e36a8823cf4213e57
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exeFilesize
175KB
MD54ae4e6ce495af0af0b3bb25467e585c9
SHA16d0de52751ffa25bae1d2b1a531a08a9b8f13c7a
SHA256b81cdb896902143de069bd2bbc05cd621d544f1bef560e4f2055ed406e2017ba
SHA512548e99ab748087cb0e743e574e36817d17bedaa23fc200e7d1ef53a27799a806651424398ade1a2e8879c76c5bed721adf120783d528cb9e36a8823cf4213e57
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exeFilesize
391KB
MD5ebbfb2f923af7679d1880f9654545d83
SHA1def2286997a413d2e0fb0ad0da2ebb014af8e595
SHA256810353254806f1cd69545e6a6dfe4391c1b0715b0965ef9897a4fedc70059826
SHA512597bd3ae7839f676ab53a7a011c93e5eee71bd5fd4406136e7ee6f3db15c614292e31837475c244d6f4edf01221316bc70b4fc10c123a54259e6262b079d8b90
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exeFilesize
391KB
MD5ebbfb2f923af7679d1880f9654545d83
SHA1def2286997a413d2e0fb0ad0da2ebb014af8e595
SHA256810353254806f1cd69545e6a6dfe4391c1b0715b0965ef9897a4fedc70059826
SHA512597bd3ae7839f676ab53a7a011c93e5eee71bd5fd4406136e7ee6f3db15c614292e31837475c244d6f4edf01221316bc70b4fc10c123a54259e6262b079d8b90
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exeFilesize
11KB
MD52d573d483075cfa25385b0cc73af87bd
SHA10c68fc1baa8e2b15c72ed4d4a6e4a6d618318196
SHA2569b742919671663d980f9471d1f2b2891602d919182ae1909d4f00dba5e0f3ed1
SHA512158f2b046df4cb29a4d17c4454cf73c4bd12ba5654d4bffe21813abba5b39e3bb12929b9d1bc78dd812c786129b42bbb559f8a19d444266a56be744c0d7bbe58
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exeFilesize
11KB
MD52d573d483075cfa25385b0cc73af87bd
SHA10c68fc1baa8e2b15c72ed4d4a6e4a6d618318196
SHA2569b742919671663d980f9471d1f2b2891602d919182ae1909d4f00dba5e0f3ed1
SHA512158f2b046df4cb29a4d17c4454cf73c4bd12ba5654d4bffe21813abba5b39e3bb12929b9d1bc78dd812c786129b42bbb559f8a19d444266a56be744c0d7bbe58
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exeFilesize
359KB
MD580ea6481ccd3339d337c86632e54c844
SHA1480798fb4666b264d06a3fa198d1dd56af6d9997
SHA256507e768168e0292e84969406f2069c0a4ba275ff7c40588020787f4ed1dd61b1
SHA512bab10b0a75e3de26857127456dd3ad0ffa85dc145d4be96630799463780e709797ccce25a7d53cb67a08b74d1a711942dcbc5aa13e148a95b321a8827a918ed2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exeFilesize
359KB
MD580ea6481ccd3339d337c86632e54c844
SHA1480798fb4666b264d06a3fa198d1dd56af6d9997
SHA256507e768168e0292e84969406f2069c0a4ba275ff7c40588020787f4ed1dd61b1
SHA512bab10b0a75e3de26857127456dd3ad0ffa85dc145d4be96630799463780e709797ccce25a7d53cb67a08b74d1a711942dcbc5aa13e148a95b321a8827a918ed2
-
memory/1580-1075-0x0000000000250000-0x0000000000282000-memory.dmpFilesize
200KB
-
memory/1580-1076-0x0000000004C90000-0x0000000004CDB000-memory.dmpFilesize
300KB
-
memory/1580-1077-0x0000000004DF0000-0x0000000004E00000-memory.dmpFilesize
64KB
-
memory/4248-134-0x0000000000540000-0x000000000054A000-memory.dmpFilesize
40KB
-
memory/4668-178-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-188-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-142-0x0000000001BD0000-0x0000000001C1B000-memory.dmpFilesize
300KB
-
memory/4668-146-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-145-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-144-0x00000000060D0000-0x0000000006114000-memory.dmpFilesize
272KB
-
memory/4668-147-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-148-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-150-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-152-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-154-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-156-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-158-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-160-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-162-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-164-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-166-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-168-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-170-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-172-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-174-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-180-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-141-0x0000000006130000-0x000000000662E000-memory.dmpFilesize
5.0MB
-
memory/4668-176-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-182-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-184-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-186-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-143-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-190-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-192-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-194-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-196-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-198-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-200-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-202-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-204-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-206-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-208-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-210-0x00000000060D0000-0x000000000610F000-memory.dmpFilesize
252KB
-
memory/4668-1053-0x0000000006D80000-0x0000000007386000-memory.dmpFilesize
6.0MB
-
memory/4668-1054-0x00000000067D0000-0x00000000068DA000-memory.dmpFilesize
1.0MB
-
memory/4668-1055-0x0000000006910000-0x0000000006922000-memory.dmpFilesize
72KB
-
memory/4668-1056-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-1057-0x0000000006930000-0x000000000696E000-memory.dmpFilesize
248KB
-
memory/4668-1058-0x0000000006A80000-0x0000000006ACB000-memory.dmpFilesize
300KB
-
memory/4668-1060-0x0000000006C10000-0x0000000006C76000-memory.dmpFilesize
408KB
-
memory/4668-1061-0x00000000078E0000-0x0000000007972000-memory.dmpFilesize
584KB
-
memory/4668-1062-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-1063-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-1064-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-1065-0x0000000007AD0000-0x0000000007C92000-memory.dmpFilesize
1.8MB
-
memory/4668-140-0x00000000039F0000-0x0000000003A36000-memory.dmpFilesize
280KB
-
memory/4668-1066-0x0000000007CB0000-0x00000000081DC000-memory.dmpFilesize
5.2MB
-
memory/4668-1067-0x0000000006120000-0x0000000006130000-memory.dmpFilesize
64KB
-
memory/4668-1068-0x0000000008450000-0x00000000084C6000-memory.dmpFilesize
472KB
-
memory/4668-1069-0x00000000084E0000-0x0000000008530000-memory.dmpFilesize
320KB