Analysis
-
max time kernel
68s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe
Resource
win10-20230220-en
General
-
Target
3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe
-
Size
530KB
-
MD5
ff1b74a6191ba4e95479aca88efa0476
-
SHA1
f6d7f050ff76c8f7774be0e4907f22869b1aa5a9
-
SHA256
3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064
-
SHA512
a059d5cdab74f058c606f9049dd44935c5ccca85ee978fd763df1fe62ba9f792fca1a098361c4e4b33374a9dc31576cb199930d45855410a8e083408d6e8b9a9
-
SSDEEP
12288:/Mrqy90WPynDSEvDYvgxvgT+lf5KXa/9lCU7m2vLAhm:Vy7PyFvDYvgxBASlCU7m2DA0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr697718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr697718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr697718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr697718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr697718.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2788-141-0x0000000002680000-0x00000000026C6000-memory.dmp family_redline behavioral1/memory/2788-143-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/2788-145-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-144-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-149-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-162-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-164-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-172-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-170-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-174-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-168-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-166-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-184-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-188-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-200-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-202-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-210-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-208-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-206-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-204-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-198-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-196-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-194-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-192-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-190-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-186-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-182-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-180-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-178-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-176-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-160-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-158-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-156-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-154-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline behavioral1/memory/2788-152-0x0000000004B80000-0x0000000004BBF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2368 ziWl2706.exe 2664 jr697718.exe 2788 ku682269.exe 4788 lr563572.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr697718.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWl2706.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWl2706.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2664 jr697718.exe 2664 jr697718.exe 2788 ku682269.exe 2788 ku682269.exe 4788 lr563572.exe 4788 lr563572.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2664 jr697718.exe Token: SeDebugPrivilege 2788 ku682269.exe Token: SeDebugPrivilege 4788 lr563572.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2368 2052 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe 66 PID 2052 wrote to memory of 2368 2052 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe 66 PID 2052 wrote to memory of 2368 2052 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe 66 PID 2368 wrote to memory of 2664 2368 ziWl2706.exe 67 PID 2368 wrote to memory of 2664 2368 ziWl2706.exe 67 PID 2368 wrote to memory of 2788 2368 ziWl2706.exe 68 PID 2368 wrote to memory of 2788 2368 ziWl2706.exe 68 PID 2368 wrote to memory of 2788 2368 ziWl2706.exe 68 PID 2052 wrote to memory of 4788 2052 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe 70 PID 2052 wrote to memory of 4788 2052 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe 70 PID 2052 wrote to memory of 4788 2052 3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe"C:\Users\Admin\AppData\Local\Temp\3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWl2706.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWl2706.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr697718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr697718.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682269.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682269.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr563572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr563572.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD52fac3ec1adfc93d02f71d66fa8553113
SHA140476002ffad33c56f4ac7dd568a5b4d6baedbf3
SHA25688dd012f640cf3ed5d08884a2ecaaa0cf9716b8c332f7fa39ca2863f586b06c0
SHA5121440d0d201ed4149f22cbdec399ea7ba3d73ccc2c024ecc987d25391a9ac0a043f7bab1f80c786615cc047cb00cf1d4b4b912f407d93b44df6cd7408c0c7584e
-
Filesize
176KB
MD52fac3ec1adfc93d02f71d66fa8553113
SHA140476002ffad33c56f4ac7dd568a5b4d6baedbf3
SHA25688dd012f640cf3ed5d08884a2ecaaa0cf9716b8c332f7fa39ca2863f586b06c0
SHA5121440d0d201ed4149f22cbdec399ea7ba3d73ccc2c024ecc987d25391a9ac0a043f7bab1f80c786615cc047cb00cf1d4b4b912f407d93b44df6cd7408c0c7584e
-
Filesize
388KB
MD5c5abc7da4e4d8aa73941b535ea11e745
SHA1c26a052a797d7cfd847a33e142bab6f9e30446fc
SHA25614b915521631cb9816205d8e8f2c73ef46a0c0643437f6e3d587614131bf613a
SHA512985bb4b29a98c0a12bacedce3a049206b94266d0c1b9fd119b89ca697c51c0dd54f28cf28840b1234d2a1e961c9c316da4d78f43cd2bf58555f9b229a6997263
-
Filesize
388KB
MD5c5abc7da4e4d8aa73941b535ea11e745
SHA1c26a052a797d7cfd847a33e142bab6f9e30446fc
SHA25614b915521631cb9816205d8e8f2c73ef46a0c0643437f6e3d587614131bf613a
SHA512985bb4b29a98c0a12bacedce3a049206b94266d0c1b9fd119b89ca697c51c0dd54f28cf28840b1234d2a1e961c9c316da4d78f43cd2bf58555f9b229a6997263
-
Filesize
12KB
MD53b1e808e1fffc7080300b70f6a533b10
SHA192a751551133ee641f67eefb9c2999026955fd07
SHA2561c516f2f1356143d94e92500926afa66fa5700d80928716bd5abc2140f3abdae
SHA5120a03cc1a50fc82b59294d6c0d7544816b449a0262af70bdfa06eabf12fec7b72bc809d8cf3fed8001a158fd13cb23282f7e9cca9e49ca4575d61101be5bf1957
-
Filesize
12KB
MD53b1e808e1fffc7080300b70f6a533b10
SHA192a751551133ee641f67eefb9c2999026955fd07
SHA2561c516f2f1356143d94e92500926afa66fa5700d80928716bd5abc2140f3abdae
SHA5120a03cc1a50fc82b59294d6c0d7544816b449a0262af70bdfa06eabf12fec7b72bc809d8cf3fed8001a158fd13cb23282f7e9cca9e49ca4575d61101be5bf1957
-
Filesize
434KB
MD5423595fc4302bab7cf0b6ef32a8f260d
SHA13833cc89d553ca384bda1953bd91016ca6084e4e
SHA2560056c6cd23621ea1bb11dec8aa37358bc6a228b2b7f916d166a994b80f65fb87
SHA512db31d61eb8deb8a7a13daa8bb45ae6591ca90a390b294f2e3b897ba0eef71d28afcdb016715df0e69868583eff65b1ab9e124a804d1916d3203a6fbfaa51f954
-
Filesize
434KB
MD5423595fc4302bab7cf0b6ef32a8f260d
SHA13833cc89d553ca384bda1953bd91016ca6084e4e
SHA2560056c6cd23621ea1bb11dec8aa37358bc6a228b2b7f916d166a994b80f65fb87
SHA512db31d61eb8deb8a7a13daa8bb45ae6591ca90a390b294f2e3b897ba0eef71d28afcdb016715df0e69868583eff65b1ab9e124a804d1916d3203a6fbfaa51f954