Analysis
-
max time kernel
67s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-04-2023 10:51
Static task
static1
Behavioral task
behavioral1
Sample
165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe
Resource
win10-20230220-en
General
-
Target
165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe
-
Size
530KB
-
MD5
dbeb0b3a667c9f87d04cb5026024ef36
-
SHA1
00bf88a25a4c09c109521089a70f6edb72679a82
-
SHA256
165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c
-
SHA512
2d5d7f460b7a574d8be0b4e966c5ca1291b494e1afdb5180278585bfea57ecd4ee0edc17e010251746f35cf238654f8e7acdbdbb996a5d9a161214b458e4f152
-
SSDEEP
12288:3Mrsy90IfluNQYfqSj99crSssW7J4IIymgJNd:byRf0NQYfl9WIVyrJNd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr195687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr195687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr195687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr195687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr195687.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2832-142-0x0000000004830000-0x0000000004876000-memory.dmp family_redline behavioral1/memory/2832-144-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/2832-145-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-148-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-146-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-150-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-152-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-154-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-156-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-158-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-160-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-162-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-164-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-166-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-168-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-172-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-174-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-178-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-182-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-180-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-176-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-186-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-189-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-170-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-193-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-197-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2832-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2272 ziYZ0526.exe 2456 jr195687.exe 2832 ku924769.exe 4476 lr921212.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr195687.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYZ0526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYZ0526.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2456 jr195687.exe 2456 jr195687.exe 2832 ku924769.exe 2832 ku924769.exe 4476 lr921212.exe 4476 lr921212.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2456 jr195687.exe Token: SeDebugPrivilege 2832 ku924769.exe Token: SeDebugPrivilege 4476 lr921212.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2272 1560 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe 66 PID 1560 wrote to memory of 2272 1560 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe 66 PID 1560 wrote to memory of 2272 1560 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe 66 PID 2272 wrote to memory of 2456 2272 ziYZ0526.exe 67 PID 2272 wrote to memory of 2456 2272 ziYZ0526.exe 67 PID 2272 wrote to memory of 2832 2272 ziYZ0526.exe 68 PID 2272 wrote to memory of 2832 2272 ziYZ0526.exe 68 PID 2272 wrote to memory of 2832 2272 ziYZ0526.exe 68 PID 1560 wrote to memory of 4476 1560 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe 70 PID 1560 wrote to memory of 4476 1560 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe 70 PID 1560 wrote to memory of 4476 1560 165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe"C:\Users\Admin\AppData\Local\Temp\165e79c79334b6aaf15ccf03ba0cf1613f96a53b36199fdea5101a04c632554c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYZ0526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYZ0526.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr195687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr195687.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku924769.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku924769.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr921212.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr921212.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD59d80a52f486eb620dd74426ac507c62e
SHA1b5381841079b36a6e90bf5c7089cf8cfdc9d99c5
SHA2567b1deb4fc6f3090ca0b0d8147611404d85177cf084e6feaa41dd77ef6955c5dc
SHA512d16345ba50239f68b5f48ba9a1e15bcb0a2f9751eaccbed0e6e809708801cdd6f303326ef45707555ec438dc033a517cbc70674b09b488bde56a1911f6cbdfa9
-
Filesize
176KB
MD59d80a52f486eb620dd74426ac507c62e
SHA1b5381841079b36a6e90bf5c7089cf8cfdc9d99c5
SHA2567b1deb4fc6f3090ca0b0d8147611404d85177cf084e6feaa41dd77ef6955c5dc
SHA512d16345ba50239f68b5f48ba9a1e15bcb0a2f9751eaccbed0e6e809708801cdd6f303326ef45707555ec438dc033a517cbc70674b09b488bde56a1911f6cbdfa9
-
Filesize
387KB
MD5ea9a45796ceb3a15720bc7437bad1c62
SHA18e683ee5421b1be3f36e57258f8e2f6634d0f32f
SHA256e12101ad3ebff7b719bd5f21ace67810a877b81925bd16e6fe293aacce2d7b36
SHA512a0aafd3257b361f6af31436652e1c55aed4618311fc4c902cad76f2dcaa6c0f5fa5f3fc9d02acd32e9b48aed448b3cfa76d6ce700bfc616c7626e9668452c362
-
Filesize
387KB
MD5ea9a45796ceb3a15720bc7437bad1c62
SHA18e683ee5421b1be3f36e57258f8e2f6634d0f32f
SHA256e12101ad3ebff7b719bd5f21ace67810a877b81925bd16e6fe293aacce2d7b36
SHA512a0aafd3257b361f6af31436652e1c55aed4618311fc4c902cad76f2dcaa6c0f5fa5f3fc9d02acd32e9b48aed448b3cfa76d6ce700bfc616c7626e9668452c362
-
Filesize
12KB
MD5e6612c3bbfce6b8c0d47ea85df2d7fb0
SHA1de8103457e88248d1b8b3011c97a8bcaf07c653b
SHA256f78ea2d92d6f62d82b05cbb4387f0f97b2fa67ffb927fa0393a8f52139e2f576
SHA5126ac90335647a1ee29901d4a2b292b38db6380a44ad06f3f12d01eaf5965c9d9c6c3deb8144430fd3516e770e1aef6bb31ab38e3e54b885c72cd0075047b1ae31
-
Filesize
12KB
MD5e6612c3bbfce6b8c0d47ea85df2d7fb0
SHA1de8103457e88248d1b8b3011c97a8bcaf07c653b
SHA256f78ea2d92d6f62d82b05cbb4387f0f97b2fa67ffb927fa0393a8f52139e2f576
SHA5126ac90335647a1ee29901d4a2b292b38db6380a44ad06f3f12d01eaf5965c9d9c6c3deb8144430fd3516e770e1aef6bb31ab38e3e54b885c72cd0075047b1ae31
-
Filesize
342KB
MD59c07523ad162ee08988e136b1b647bb3
SHA12dfddb83bf92c990ebef8934a0c3dc17d2967edd
SHA2561b0fefde0cd989b4a81d1b39f525f3ee64f768d8f031580c6dd56c9ba544ea11
SHA512c9493067ba5a537d64ae51bbceb6fb472cd33bf62b4fa9f5b610a1a44540d6c4f162df2d8a5da065881e6f0558347e98b1c28f8c49cc4fc28e9c4065c37dbee7
-
Filesize
342KB
MD59c07523ad162ee08988e136b1b647bb3
SHA12dfddb83bf92c990ebef8934a0c3dc17d2967edd
SHA2561b0fefde0cd989b4a81d1b39f525f3ee64f768d8f031580c6dd56c9ba544ea11
SHA512c9493067ba5a537d64ae51bbceb6fb472cd33bf62b4fa9f5b610a1a44540d6c4f162df2d8a5da065881e6f0558347e98b1c28f8c49cc4fc28e9c4065c37dbee7