Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-04-2023 14:57
Static task
static1
Behavioral task
behavioral1
Sample
938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe
Resource
win10-20230220-en
General
-
Target
938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe
-
Size
530KB
-
MD5
5bebd341480796e42545b52b747ea9fa
-
SHA1
a51a37635ac958b198255e6c028b189583ad69e8
-
SHA256
938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc
-
SHA512
cfb9fa49a811296f1a2d25cc5cdf191460a31d43086d2db5eec050f172d74fa10d5c4f28964fc60ea2fd2cbfacbbac4a67ce2c20ded9028bf80fc4bc1a02d9cd
-
SSDEEP
12288:mMrIy90+Xbg0LYp3IkYNZr6f8LtwFKwMQlqB/2dYXUPsc:CylnykVxwE/QEBUZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr388119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr388119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr388119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr388119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr388119.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/4176-142-0x0000000004750000-0x0000000004796000-memory.dmp family_redline behavioral1/memory/4176-144-0x00000000070F0000-0x0000000007134000-memory.dmp family_redline behavioral1/memory/4176-146-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-145-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-148-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-150-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-152-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-155-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-159-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-161-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-163-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-165-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-167-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-169-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-171-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-173-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-175-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-177-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-179-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-181-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-183-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-185-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-187-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-189-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-191-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-193-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-195-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-197-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-199-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-201-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-203-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-205-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-207-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-209-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-211-0x00000000070F0000-0x000000000712F000-memory.dmp family_redline behavioral1/memory/4176-1063-0x0000000007180000-0x0000000007190000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4936 ziYg6900.exe 4692 jr388119.exe 4176 ku681304.exe 768 lr423320.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr388119.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYg6900.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYg6900.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4692 jr388119.exe 4692 jr388119.exe 4176 ku681304.exe 4176 ku681304.exe 768 lr423320.exe 768 lr423320.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4692 jr388119.exe Token: SeDebugPrivilege 4176 ku681304.exe Token: SeDebugPrivilege 768 lr423320.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4936 2896 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe 66 PID 2896 wrote to memory of 4936 2896 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe 66 PID 2896 wrote to memory of 4936 2896 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe 66 PID 4936 wrote to memory of 4692 4936 ziYg6900.exe 67 PID 4936 wrote to memory of 4692 4936 ziYg6900.exe 67 PID 4936 wrote to memory of 4176 4936 ziYg6900.exe 68 PID 4936 wrote to memory of 4176 4936 ziYg6900.exe 68 PID 4936 wrote to memory of 4176 4936 ziYg6900.exe 68 PID 2896 wrote to memory of 768 2896 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe 70 PID 2896 wrote to memory of 768 2896 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe 70 PID 2896 wrote to memory of 768 2896 938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe"C:\Users\Admin\AppData\Local\Temp\938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYg6900.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYg6900.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388119.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku681304.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku681304.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr423320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr423320.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD571c57d701ceba9537cd54208d77ee02b
SHA17f834ca9126388a025296bd8a4bb83c8b1a3c71d
SHA2563a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb
SHA512aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba
-
Filesize
175KB
MD571c57d701ceba9537cd54208d77ee02b
SHA17f834ca9126388a025296bd8a4bb83c8b1a3c71d
SHA2563a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb
SHA512aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba
-
Filesize
388KB
MD540b492654674d354c914bf65aeacb99e
SHA187b0d5a54a105dbc7ba2b1b941b67a4184ac64a3
SHA2563f2156904aa32f6f6ebe3efb3217fd3e17dda9863fab7cc3ca421e1728bc51e2
SHA5129b927f0fe6cfdfd335b303c3122e64bbd87a48adc7d4b499327a739fe44285d59c6ed47e952de72a4cae83033e7f727e48e799a9f9e50624ecfd1b85abdd5b71
-
Filesize
388KB
MD540b492654674d354c914bf65aeacb99e
SHA187b0d5a54a105dbc7ba2b1b941b67a4184ac64a3
SHA2563f2156904aa32f6f6ebe3efb3217fd3e17dda9863fab7cc3ca421e1728bc51e2
SHA5129b927f0fe6cfdfd335b303c3122e64bbd87a48adc7d4b499327a739fe44285d59c6ed47e952de72a4cae83033e7f727e48e799a9f9e50624ecfd1b85abdd5b71
-
Filesize
11KB
MD5f1192cacffcfa84eb702b9ba7a3afeeb
SHA1ca4e6ccf69873de09572dad637cb6fa05e201bd7
SHA2563517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700
SHA5121778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0
-
Filesize
11KB
MD5f1192cacffcfa84eb702b9ba7a3afeeb
SHA1ca4e6ccf69873de09572dad637cb6fa05e201bd7
SHA2563517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700
SHA5121778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0
-
Filesize
354KB
MD5c46dd5efa96b0d986d8a566b4caf27dc
SHA105b8de95a828a8a9bf1e1e18ada09cb9ecc67223
SHA2560982f1c6820878fa7767f3feaa2633caef4a43b153c3cceab055e23afff3bb81
SHA51259a1fa0c47bc42541ef18d038497254a3d26dc24e95c7b1055549b7239cbcb2fc9f827e3ae6b6b55733e48c9b6492aee9d452ebd4f91c2ee6c0b4db3effb58e8
-
Filesize
354KB
MD5c46dd5efa96b0d986d8a566b4caf27dc
SHA105b8de95a828a8a9bf1e1e18ada09cb9ecc67223
SHA2560982f1c6820878fa7767f3feaa2633caef4a43b153c3cceab055e23afff3bb81
SHA51259a1fa0c47bc42541ef18d038497254a3d26dc24e95c7b1055549b7239cbcb2fc9f827e3ae6b6b55733e48c9b6492aee9d452ebd4f91c2ee6c0b4db3effb58e8