Analysis
-
max time kernel
55s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 20:12
Static task
static1
Behavioral task
behavioral1
Sample
b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe
Resource
win10-20230220-en
General
-
Target
b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe
-
Size
533KB
-
MD5
25338b85b90cf9a9337b4d030c5f0985
-
SHA1
c19111598b5335b7319c5cccd0c48a6e8077296e
-
SHA256
b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71
-
SHA512
7ce647c1d28fa695da05fa87892493239a37b2098e979a79a37dd254b74a7ddc7b1ca23768b75a8b23bc3215341507eefc534450c0db2adbb90f7a52552b9cd4
-
SSDEEP
12288:uMrWy904GZjK5xORYC6t7XhQvGOb4rb6OIFWYEjrnGwz:8yse5wAAbW6JWYmGA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr791247.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr791247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr791247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr791247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr791247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr791247.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2264-137-0x00000000021D0000-0x0000000002216000-memory.dmp family_redline behavioral1/memory/2264-139-0x0000000002270000-0x00000000022B4000-memory.dmp family_redline behavioral1/memory/2264-144-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-145-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-149-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-147-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-151-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-153-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-155-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-157-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-159-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-161-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-163-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-165-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-167-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-169-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-171-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-173-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-175-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-177-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-179-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-181-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-183-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-185-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-187-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-189-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-191-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-193-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-195-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-197-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-199-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-201-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-203-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-205-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline behavioral1/memory/2264-207-0x0000000002270000-0x00000000022AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziQD6332.exejr791247.exeku627902.exelr676411.exepid process 1792 ziQD6332.exe 4132 jr791247.exe 2264 ku627902.exe 3040 lr676411.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr791247.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr791247.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exeziQD6332.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQD6332.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQD6332.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr791247.exeku627902.exelr676411.exepid process 4132 jr791247.exe 4132 jr791247.exe 2264 ku627902.exe 2264 ku627902.exe 3040 lr676411.exe 3040 lr676411.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr791247.exeku627902.exelr676411.exedescription pid process Token: SeDebugPrivilege 4132 jr791247.exe Token: SeDebugPrivilege 2264 ku627902.exe Token: SeDebugPrivilege 3040 lr676411.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exeziQD6332.exedescription pid process target process PID 3904 wrote to memory of 1792 3904 b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe ziQD6332.exe PID 3904 wrote to memory of 1792 3904 b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe ziQD6332.exe PID 3904 wrote to memory of 1792 3904 b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe ziQD6332.exe PID 1792 wrote to memory of 4132 1792 ziQD6332.exe jr791247.exe PID 1792 wrote to memory of 4132 1792 ziQD6332.exe jr791247.exe PID 1792 wrote to memory of 2264 1792 ziQD6332.exe ku627902.exe PID 1792 wrote to memory of 2264 1792 ziQD6332.exe ku627902.exe PID 1792 wrote to memory of 2264 1792 ziQD6332.exe ku627902.exe PID 3904 wrote to memory of 3040 3904 b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe lr676411.exe PID 3904 wrote to memory of 3040 3904 b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe lr676411.exe PID 3904 wrote to memory of 3040 3904 b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe lr676411.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe"C:\Users\Admin\AppData\Local\Temp\b26bf9ed08b8d2770543a3567b950cbaf3a134a15820b1b7c2bbfae70657bc71.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQD6332.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQD6332.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791247.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku627902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku627902.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr676411.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr676411.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr676411.exeFilesize
175KB
MD5a94d5e0cfbdbcf3e6587eecdfea2299a
SHA17e926654cfc1abb84f742dc6013c794add003ad7
SHA2568111bda5b45a77f0a1eb36ad9913a8427948d66c0fb956c91d8de800c1dd29ac
SHA512e24163fb7ae71d94ae0c59e6a332b496ef07edc0a11c295ef87c7433027d49c1e925d7915aefedd12e0889a22a516352bdf9707683dbaa0e27f3b75971b7cbf0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr676411.exeFilesize
175KB
MD5a94d5e0cfbdbcf3e6587eecdfea2299a
SHA17e926654cfc1abb84f742dc6013c794add003ad7
SHA2568111bda5b45a77f0a1eb36ad9913a8427948d66c0fb956c91d8de800c1dd29ac
SHA512e24163fb7ae71d94ae0c59e6a332b496ef07edc0a11c295ef87c7433027d49c1e925d7915aefedd12e0889a22a516352bdf9707683dbaa0e27f3b75971b7cbf0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQD6332.exeFilesize
392KB
MD5cc77e46a967773533020f2e6b6aaf58c
SHA145e1a9f30d247c9b79d2bd6456d9027e16442921
SHA2562eaef54c68829edc279a4b8dfd0c097c1b365636cdb00114f1d53b315b26bdae
SHA5124189efb7e0381fa4a56dff430842d174a0f00aac98603734ed857cfb9ca3039f1e3d92b7b4ea264f4fd809f7e770180b73475cadcedd4b83fdf8ae503a8ac5ca
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQD6332.exeFilesize
392KB
MD5cc77e46a967773533020f2e6b6aaf58c
SHA145e1a9f30d247c9b79d2bd6456d9027e16442921
SHA2562eaef54c68829edc279a4b8dfd0c097c1b365636cdb00114f1d53b315b26bdae
SHA5124189efb7e0381fa4a56dff430842d174a0f00aac98603734ed857cfb9ca3039f1e3d92b7b4ea264f4fd809f7e770180b73475cadcedd4b83fdf8ae503a8ac5ca
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791247.exeFilesize
11KB
MD5147be3e9f28ff2b981c0d39c95eb977a
SHA1b366eaad27f284b441b4c3ae3becf4ebda101f1c
SHA256e305c1b1ec49c7f8715709df7e109643050eb2f4bd5e9fa6876ac93916158d4b
SHA512538b8a5129ad23a342294bf071db3e29e46e6a81449318bcd07ef06d915d5d5d22bea61ed93414cd058457de0ee75bcab8953f44acf594e2f1b899b2cc810be9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791247.exeFilesize
11KB
MD5147be3e9f28ff2b981c0d39c95eb977a
SHA1b366eaad27f284b441b4c3ae3becf4ebda101f1c
SHA256e305c1b1ec49c7f8715709df7e109643050eb2f4bd5e9fa6876ac93916158d4b
SHA512538b8a5129ad23a342294bf071db3e29e46e6a81449318bcd07ef06d915d5d5d22bea61ed93414cd058457de0ee75bcab8953f44acf594e2f1b899b2cc810be9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku627902.exeFilesize
318KB
MD598942922be725f945e7a7c6d5aa69e00
SHA1a3514dd748552d4b9411bd2f6d728e7d0aff6c62
SHA2565f2e42d3a6c9b9237852bc95c14a127bbd465364015d44eff307e82dab0278d8
SHA512a2d0ab1d29242285eb21fb253b6a9fd6e48b2049b42fe79ccd9e2385201f7c38bf0e3923f08aceb9de50b75119633d0cce188b1e46b838481c4419e4b8e918cb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku627902.exeFilesize
318KB
MD598942922be725f945e7a7c6d5aa69e00
SHA1a3514dd748552d4b9411bd2f6d728e7d0aff6c62
SHA2565f2e42d3a6c9b9237852bc95c14a127bbd465364015d44eff307e82dab0278d8
SHA512a2d0ab1d29242285eb21fb253b6a9fd6e48b2049b42fe79ccd9e2385201f7c38bf0e3923f08aceb9de50b75119633d0cce188b1e46b838481c4419e4b8e918cb
-
memory/2264-137-0x00000000021D0000-0x0000000002216000-memory.dmpFilesize
280KB
-
memory/2264-138-0x0000000004C70000-0x000000000516E000-memory.dmpFilesize
5.0MB
-
memory/2264-140-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/2264-139-0x0000000002270000-0x00000000022B4000-memory.dmpFilesize
272KB
-
memory/2264-141-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-142-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-143-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-144-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-145-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-149-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-147-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-151-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-153-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-155-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-157-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-159-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-161-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-163-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-165-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-167-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-169-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-171-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-173-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-175-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-177-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-179-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-181-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-183-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-185-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-187-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-189-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-191-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-193-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-195-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-197-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-199-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-201-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-203-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-205-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-207-0x0000000002270000-0x00000000022AF000-memory.dmpFilesize
252KB
-
memory/2264-1050-0x0000000005170000-0x0000000005776000-memory.dmpFilesize
6.0MB
-
memory/2264-1051-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/2264-1052-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/2264-1053-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-1054-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/2264-1055-0x0000000005A50000-0x0000000005A9B000-memory.dmpFilesize
300KB
-
memory/2264-1057-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/2264-1058-0x00000000062A0000-0x0000000006332000-memory.dmpFilesize
584KB
-
memory/2264-1059-0x00000000063A0000-0x0000000006562000-memory.dmpFilesize
1.8MB
-
memory/2264-1060-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-1062-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-1061-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-1063-0x0000000006570000-0x0000000006A9C000-memory.dmpFilesize
5.2MB
-
memory/2264-1064-0x0000000004C60000-0x0000000004C70000-memory.dmpFilesize
64KB
-
memory/2264-1065-0x0000000006CC0000-0x0000000006D36000-memory.dmpFilesize
472KB
-
memory/2264-1066-0x0000000006D50000-0x0000000006DA0000-memory.dmpFilesize
320KB
-
memory/3040-1072-0x0000000000090000-0x00000000000C2000-memory.dmpFilesize
200KB
-
memory/3040-1073-0x0000000004AD0000-0x0000000004B1B000-memory.dmpFilesize
300KB
-
memory/3040-1074-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/3040-1075-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/4132-131-0x0000000000CF0000-0x0000000000CFA000-memory.dmpFilesize
40KB