Analysis
-
max time kernel
50s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/04/2023, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe
Resource
win10-20230220-en
General
-
Target
2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe
-
Size
530KB
-
MD5
c4db4b0facd64a4ed30aced06bd16c42
-
SHA1
e309a19fabf2535e98cce230c303a4655faf567c
-
SHA256
2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606
-
SHA512
19464325d6c27cd0948263b6d7914a6a785d241fa846d9c15dc2d17288d06e7c3755821866d27c6074796f37954b6782b3225061dc545f8ccc419d42ec734dbe
-
SSDEEP
12288:cMrey90bgbVMGImhrc7Qv9P23KYDpY28HKzL+6w/7Gb0QLraH6:iyfRMGIyc62Zk6o7GZnaa
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr638739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr638739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr638739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr638739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr638739.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4560-140-0x0000000004810000-0x0000000004856000-memory.dmp family_redline behavioral1/memory/4560-144-0x0000000004B90000-0x0000000004BD4000-memory.dmp family_redline behavioral1/memory/4560-154-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-152-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-160-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-158-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-156-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-166-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-182-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-184-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-188-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-196-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-204-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-208-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-206-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-202-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-200-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-198-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-194-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-192-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-190-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-186-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-180-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-178-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-174-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-172-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-170-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-168-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-164-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-162-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-150-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-148-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-146-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-145-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/4560-1061-0x0000000007520000-0x0000000007530000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4120 zimz5139.exe 4116 jr638739.exe 4560 ku753953.exe 4600 lr221057.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr638739.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimz5139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimz5139.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4116 jr638739.exe 4116 jr638739.exe 4560 ku753953.exe 4560 ku753953.exe 4600 lr221057.exe 4600 lr221057.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4116 jr638739.exe Token: SeDebugPrivilege 4560 ku753953.exe Token: SeDebugPrivilege 4600 lr221057.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4120 3192 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe 66 PID 3192 wrote to memory of 4120 3192 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe 66 PID 3192 wrote to memory of 4120 3192 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe 66 PID 4120 wrote to memory of 4116 4120 zimz5139.exe 67 PID 4120 wrote to memory of 4116 4120 zimz5139.exe 67 PID 4120 wrote to memory of 4560 4120 zimz5139.exe 68 PID 4120 wrote to memory of 4560 4120 zimz5139.exe 68 PID 4120 wrote to memory of 4560 4120 zimz5139.exe 68 PID 3192 wrote to memory of 4600 3192 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe 70 PID 3192 wrote to memory of 4600 3192 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe 70 PID 3192 wrote to memory of 4600 3192 2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe"C:\Users\Admin\AppData\Local\Temp\2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimz5139.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimz5139.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr638739.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr638739.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753953.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753953.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr221057.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr221057.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5bf7ff324e2c405065bfb283ef9c141c5
SHA1a982b6b3a80c842e77f446e307b6bfcd56d70fb6
SHA256017341e12b2635419a78f7337c60de75a3181e53473fa7538f122c906b231d0b
SHA51294e97860cf92fbceee04b767c8443a02da16b280fa4bb61121279bd4e540903517bb9ad3ecce9eaf544a3d2aa766eee1b66060d1428a8134a1fa29471e57e983
-
Filesize
176KB
MD5bf7ff324e2c405065bfb283ef9c141c5
SHA1a982b6b3a80c842e77f446e307b6bfcd56d70fb6
SHA256017341e12b2635419a78f7337c60de75a3181e53473fa7538f122c906b231d0b
SHA51294e97860cf92fbceee04b767c8443a02da16b280fa4bb61121279bd4e540903517bb9ad3ecce9eaf544a3d2aa766eee1b66060d1428a8134a1fa29471e57e983
-
Filesize
388KB
MD58a8e6dd0e2f34d2cef503dc009cb7420
SHA1a6b1482a0ad5b776754e9f2e4222d89c11f96aca
SHA2569eaefecf2f3b6dfd900d698845fe1f91dc342e8c96b648e38628edbfac02f539
SHA51217772de3c1826f8ade3e89d489f822f277ffbc1e44348dbe9b21135fc6f03eae3d16a9741c2b76e171c8f48c183074a1c6ea75eab71770e3c5a9200b9ce56fa0
-
Filesize
388KB
MD58a8e6dd0e2f34d2cef503dc009cb7420
SHA1a6b1482a0ad5b776754e9f2e4222d89c11f96aca
SHA2569eaefecf2f3b6dfd900d698845fe1f91dc342e8c96b648e38628edbfac02f539
SHA51217772de3c1826f8ade3e89d489f822f277ffbc1e44348dbe9b21135fc6f03eae3d16a9741c2b76e171c8f48c183074a1c6ea75eab71770e3c5a9200b9ce56fa0
-
Filesize
12KB
MD5b4b9751a82354ef0ba90f8b05f51b471
SHA10110c5dec95cedfbc6e13b223280c250c661354a
SHA256a0d04058cc787fbb266ec7a804c4ece03dfccfedd9dc243d0af14183e533b813
SHA512c94729cc55dc517bb89a202e0db5f68b5b476548cc6ef7c79c0c1e45fab60fb03da48232e008b72907958baf726a9f0ccc17ad788d26defc7303070ec3615152
-
Filesize
12KB
MD5b4b9751a82354ef0ba90f8b05f51b471
SHA10110c5dec95cedfbc6e13b223280c250c661354a
SHA256a0d04058cc787fbb266ec7a804c4ece03dfccfedd9dc243d0af14183e533b813
SHA512c94729cc55dc517bb89a202e0db5f68b5b476548cc6ef7c79c0c1e45fab60fb03da48232e008b72907958baf726a9f0ccc17ad788d26defc7303070ec3615152
-
Filesize
342KB
MD53256d15667b206db287b08d5acee2b0f
SHA1d45ef2cc1abf9718baf2317c3ac38edd4f758571
SHA2561dafad64aa58228c87ec5e11bfb2b60f6d292901a4bf14ac5c42878f70fbefc6
SHA5123b4a1eeb28e3ffd634632e412c30213a5278c9a25e8f59d85d9d9e4e6bf3713a9f08a4a42d322d5a80ee2730df650d955e6389bb7eccff346726b785a56fa480
-
Filesize
342KB
MD53256d15667b206db287b08d5acee2b0f
SHA1d45ef2cc1abf9718baf2317c3ac38edd4f758571
SHA2561dafad64aa58228c87ec5e11bfb2b60f6d292901a4bf14ac5c42878f70fbefc6
SHA5123b4a1eeb28e3ffd634632e412c30213a5278c9a25e8f59d85d9d9e4e6bf3713a9f08a4a42d322d5a80ee2730df650d955e6389bb7eccff346726b785a56fa480