Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-04-2023 03:39
Static task
static1
Behavioral task
behavioral1
Sample
2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe
Resource
win10-20230220-en
General
-
Target
2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe
-
Size
530KB
-
MD5
29a14432fe5834b83cb77c4de4ee26eb
-
SHA1
3402d26e2207cc6abf9897be0e7d308031b0b101
-
SHA256
2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb
-
SHA512
2c824e5b22e4c51b7b0c582fe096b2a02d0dd773a43fa0014ec9cff92089e0094eb0108a40395f6f183f405e325715cff47fb6d3c8439bf7cb8d322b180a3084
-
SSDEEP
12288:AMrYy90tlYQx3KipQLFaLtFpuXDT27F3GYbJNiBOBJBylYz:Iy4lvVBImtL8T271GKiBO7ByCz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr897539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr897539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr897539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr897539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr897539.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2552-143-0x0000000004180000-0x00000000041C6000-memory.dmp family_redline behavioral1/memory/2552-145-0x0000000006D80000-0x0000000006DC4000-memory.dmp family_redline behavioral1/memory/2552-148-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-149-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-151-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-153-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-155-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-157-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-159-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-161-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-163-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-165-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-167-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-169-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-171-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-173-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-175-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-177-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-179-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-181-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-183-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-185-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-187-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-189-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-191-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-193-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-195-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-197-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-199-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-201-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-203-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-205-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-207-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-209-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline behavioral1/memory/2552-211-0x0000000006D80000-0x0000000006DBF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4116 ziRH7666.exe 3324 jr897539.exe 2552 ku125899.exe 3052 lr285711.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr897539.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRH7666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRH7666.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3324 jr897539.exe 3324 jr897539.exe 2552 ku125899.exe 2552 ku125899.exe 3052 lr285711.exe 3052 lr285711.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3324 jr897539.exe Token: SeDebugPrivilege 2552 ku125899.exe Token: SeDebugPrivilege 3052 lr285711.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4116 3200 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe 66 PID 3200 wrote to memory of 4116 3200 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe 66 PID 3200 wrote to memory of 4116 3200 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe 66 PID 4116 wrote to memory of 3324 4116 ziRH7666.exe 67 PID 4116 wrote to memory of 3324 4116 ziRH7666.exe 67 PID 4116 wrote to memory of 2552 4116 ziRH7666.exe 68 PID 4116 wrote to memory of 2552 4116 ziRH7666.exe 68 PID 4116 wrote to memory of 2552 4116 ziRH7666.exe 68 PID 3200 wrote to memory of 3052 3200 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe 70 PID 3200 wrote to memory of 3052 3200 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe 70 PID 3200 wrote to memory of 3052 3200 2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe"C:\Users\Admin\AppData\Local\Temp\2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRH7666.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRH7666.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897539.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125899.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125899.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr285711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr285711.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5ee222f26afc75f047fbb80db7b3d74d8
SHA17db971904e6d728bc1dd8669b3a66c43d6796670
SHA2566419de487ffbf91d6b4b7e0fef06351af78a4315cf50a8a40bc48b03382508b1
SHA512de82294f737ff02629443cc8ea173cd804b1557f2478a3b6ea60e24b361a54d93a14b64d1664d04abe7fbe09f3328c4d0f394524ab19b33bfceaf74bfa7894e5
-
Filesize
176KB
MD5ee222f26afc75f047fbb80db7b3d74d8
SHA17db971904e6d728bc1dd8669b3a66c43d6796670
SHA2566419de487ffbf91d6b4b7e0fef06351af78a4315cf50a8a40bc48b03382508b1
SHA512de82294f737ff02629443cc8ea173cd804b1557f2478a3b6ea60e24b361a54d93a14b64d1664d04abe7fbe09f3328c4d0f394524ab19b33bfceaf74bfa7894e5
-
Filesize
388KB
MD562da3ffb1fc8a183de459e3af2961d2a
SHA1f30d1be90f53c6cdc8020a5cc5a1413fc1c0527c
SHA25644ef8a52d1331930ad392327e9fa4bc11572ef7e6af9ac3106cb4abc21b4b994
SHA5129b490e10994995e2d7023265011a98314b7ff609748b40338faa2a21c7018820872a8d5732cb3ee33997b12a37ef55ee07d95b13e62d38661dbfd9f781f478de
-
Filesize
388KB
MD562da3ffb1fc8a183de459e3af2961d2a
SHA1f30d1be90f53c6cdc8020a5cc5a1413fc1c0527c
SHA25644ef8a52d1331930ad392327e9fa4bc11572ef7e6af9ac3106cb4abc21b4b994
SHA5129b490e10994995e2d7023265011a98314b7ff609748b40338faa2a21c7018820872a8d5732cb3ee33997b12a37ef55ee07d95b13e62d38661dbfd9f781f478de
-
Filesize
12KB
MD5fcf7c6340707f582e561faaaaba95b55
SHA153dd28821a141f314bfbe2243c1561401466cc1e
SHA25636474df79e8e5733dd915c62ace7d7e0a57cf3b7a68efd1df4f49d08f5800bdc
SHA512f311ddcb7df9d446b7bb1ae25aa86200f9f0fd3a95dbf02233baa13548b870493bef294c05890cd15c3c5017176d08aef0154163c781aeb7b626f4c3abf6bb25
-
Filesize
12KB
MD5fcf7c6340707f582e561faaaaba95b55
SHA153dd28821a141f314bfbe2243c1561401466cc1e
SHA25636474df79e8e5733dd915c62ace7d7e0a57cf3b7a68efd1df4f49d08f5800bdc
SHA512f311ddcb7df9d446b7bb1ae25aa86200f9f0fd3a95dbf02233baa13548b870493bef294c05890cd15c3c5017176d08aef0154163c781aeb7b626f4c3abf6bb25
-
Filesize
435KB
MD5ac2bb665ead08f2ea3b56641098c846e
SHA113a9a1f1de19b497c705615413474ecbbd44dba6
SHA2564981d9cd4244aa70e396b0b8d7efda060f78463a01588bc21fa7b4599993cb3c
SHA512305022ef588d68ba6a293961fa0de1f1eb6dc33f03d919b5a07f61e989acf698c823f5ca41d00bb5da097108cdd58d6f8ddf4d0231c0d77ca8395486acbed827
-
Filesize
435KB
MD5ac2bb665ead08f2ea3b56641098c846e
SHA113a9a1f1de19b497c705615413474ecbbd44dba6
SHA2564981d9cd4244aa70e396b0b8d7efda060f78463a01588bc21fa7b4599993cb3c
SHA512305022ef588d68ba6a293961fa0de1f1eb6dc33f03d919b5a07f61e989acf698c823f5ca41d00bb5da097108cdd58d6f8ddf4d0231c0d77ca8395486acbed827