Analysis
-
max time kernel
149s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-04-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe
Resource
win10-20230220-en
General
-
Target
5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe
-
Size
530KB
-
MD5
b29316321ebc0d0822cc41b382cc91e4
-
SHA1
8d27125fe7083989a8eb2dd6c359a1a89559a253
-
SHA256
5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c
-
SHA512
8938b819933a9235df8b44b8d16d06314b18e016b42a0547ad29ca66bdda55e99877622c512f37eb2754843f916a8d4747bb8bcda02cc13e0a69fc651c6f040f
-
SSDEEP
12288:SMr8y90WMTAcDMJ8ZYxCb1PVgwccZ66Qr936o0g80mzL:yylyKxCb1POfnr9q28lL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr154624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr154624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr154624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr154624.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr154624.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/4888-141-0x0000000004BE0000-0x0000000004C26000-memory.dmp family_redline behavioral1/memory/4888-143-0x0000000007680000-0x00000000076C4000-memory.dmp family_redline behavioral1/memory/4888-144-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-145-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-147-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-149-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-151-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-153-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-155-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-158-0x0000000004990000-0x00000000049A0000-memory.dmp family_redline behavioral1/memory/4888-157-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-161-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-164-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-166-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-168-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-170-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-172-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-174-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-176-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-178-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-180-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-182-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-184-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-186-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-188-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-190-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-192-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-194-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-196-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-198-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-200-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-202-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-204-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-206-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-208-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline behavioral1/memory/4888-210-0x0000000007680000-0x00000000076BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2132 ziqV3904.exe 4556 jr154624.exe 4888 ku496118.exe 3080 lr838797.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr154624.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziqV3904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqV3904.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4556 jr154624.exe 4556 jr154624.exe 4888 ku496118.exe 4888 ku496118.exe 3080 lr838797.exe 3080 lr838797.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4556 jr154624.exe Token: SeDebugPrivilege 4888 ku496118.exe Token: SeDebugPrivilege 3080 lr838797.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2132 4152 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe 66 PID 4152 wrote to memory of 2132 4152 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe 66 PID 4152 wrote to memory of 2132 4152 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe 66 PID 2132 wrote to memory of 4556 2132 ziqV3904.exe 67 PID 2132 wrote to memory of 4556 2132 ziqV3904.exe 67 PID 2132 wrote to memory of 4888 2132 ziqV3904.exe 68 PID 2132 wrote to memory of 4888 2132 ziqV3904.exe 68 PID 2132 wrote to memory of 4888 2132 ziqV3904.exe 68 PID 4152 wrote to memory of 3080 4152 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe 70 PID 4152 wrote to memory of 3080 4152 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe 70 PID 4152 wrote to memory of 3080 4152 5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe"C:\Users\Admin\AppData\Local\Temp\5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqV3904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqV3904.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154624.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku496118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku496118.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838797.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5001ae1863ba1969706f1e5952991250c
SHA1470c852b3400f93eb132fbdfdc4d4c0fe5674f7e
SHA256dc547bf2c51ef26d9c2ccc78367e27c388739ebffcfdf985058c06fb06269bea
SHA51208963d2facde2ac7ac1896b7faf4cb90a0860d94877ae7728990ea718da460a1630bd705d213c4a9cca3910f3e7246c3a4864c09e2052ac6a149530317312f81
-
Filesize
175KB
MD5001ae1863ba1969706f1e5952991250c
SHA1470c852b3400f93eb132fbdfdc4d4c0fe5674f7e
SHA256dc547bf2c51ef26d9c2ccc78367e27c388739ebffcfdf985058c06fb06269bea
SHA51208963d2facde2ac7ac1896b7faf4cb90a0860d94877ae7728990ea718da460a1630bd705d213c4a9cca3910f3e7246c3a4864c09e2052ac6a149530317312f81
-
Filesize
388KB
MD522fd0aa582756bf5cce2ac3762883cb7
SHA11991e7c26b5cf1c7b17d2dd74a93307382920182
SHA256ff1e975eea150a1e6384da28b04f757c710c5a71108b452f46a8817d8f561252
SHA5123a89b1e3486a65469620ba493bca6fed242b8cddba55f5137d27c4a74eb13c0c6fb9d96a5d831d9a02c458114f3f18ec95f9cfee8d6be06579e8d632dabc5530
-
Filesize
388KB
MD522fd0aa582756bf5cce2ac3762883cb7
SHA11991e7c26b5cf1c7b17d2dd74a93307382920182
SHA256ff1e975eea150a1e6384da28b04f757c710c5a71108b452f46a8817d8f561252
SHA5123a89b1e3486a65469620ba493bca6fed242b8cddba55f5137d27c4a74eb13c0c6fb9d96a5d831d9a02c458114f3f18ec95f9cfee8d6be06579e8d632dabc5530
-
Filesize
11KB
MD5b968cb5ee58d2be7a39da9dbe566c5e2
SHA14c5aee95f0541f56342489494fb55f4540861903
SHA2562706a36e942b9cc9fa797c7cf817d554238b8dfa1f71ef0fa6e3706382627356
SHA512c8ec877350d9ac098b194c2b1a3ecec27f9d198e91064ab5a016879df16e8d5caaa9077ad210ffd623f0ffec9502ae00e4e312d577027f1ef2ab15af966f37c1
-
Filesize
11KB
MD5b968cb5ee58d2be7a39da9dbe566c5e2
SHA14c5aee95f0541f56342489494fb55f4540861903
SHA2562706a36e942b9cc9fa797c7cf817d554238b8dfa1f71ef0fa6e3706382627356
SHA512c8ec877350d9ac098b194c2b1a3ecec27f9d198e91064ab5a016879df16e8d5caaa9077ad210ffd623f0ffec9502ae00e4e312d577027f1ef2ab15af966f37c1
-
Filesize
355KB
MD50c2c0387eb0b2076100d8cc350eabd8c
SHA19ed6dd4c1eaa4634d02b3408bfee6fc53b2c0257
SHA25666a7dd787fca45b2e125a0ba3809fc9ebf5eb6bc425bf0cb396f9b1d870934a5
SHA512fadcd2a8a1e467a836a2d413140fa06f7f06a3b0a96b8cfe72d034e36247bc9b70cf0eb5799e8ac5aaeca85f8473ea2cbfad75114b357cdc4a8a2b7e8b7f7dee
-
Filesize
355KB
MD50c2c0387eb0b2076100d8cc350eabd8c
SHA19ed6dd4c1eaa4634d02b3408bfee6fc53b2c0257
SHA25666a7dd787fca45b2e125a0ba3809fc9ebf5eb6bc425bf0cb396f9b1d870934a5
SHA512fadcd2a8a1e467a836a2d413140fa06f7f06a3b0a96b8cfe72d034e36247bc9b70cf0eb5799e8ac5aaeca85f8473ea2cbfad75114b357cdc4a8a2b7e8b7f7dee