Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe
Resource
win10-20230220-en
General
-
Target
3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe
-
Size
531KB
-
MD5
bea396cd89d8e21ebe945f6725acc678
-
SHA1
8622ced4d8bce9dd00b32d0ffa44214f0ce3323b
-
SHA256
3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb
-
SHA512
5b4340b37bde92db560c33224d5c40c577975b853bacbfd9ed945e00acbbabf75ced9edf26116019ebe36bd0af2ac7f1cf27db5a05db02758820b79e8cf603e8
-
SSDEEP
12288:bMrWy902As3+g/d1BKyaUDu4g6+uXld2MUflxApnL8w:dyOGSAd2Lflx6Iw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr486582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr486582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr486582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr486582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr486582.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4596-139-0x0000000004070000-0x00000000040B6000-memory.dmp family_redline behavioral1/memory/4596-143-0x0000000004310000-0x0000000004354000-memory.dmp family_redline behavioral1/memory/4596-146-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-147-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-149-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-151-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-153-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-155-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-157-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-159-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-161-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-163-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-165-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-167-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-169-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-171-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-173-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-175-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-177-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-179-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-181-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-183-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-185-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-187-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-189-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-191-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-193-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-195-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-197-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-199-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-201-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-203-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-205-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-207-0x0000000004310000-0x000000000434F000-memory.dmp family_redline behavioral1/memory/4596-209-0x0000000004310000-0x000000000434F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 384 ziNx1932.exe 4504 jr486582.exe 4596 ku233432.exe 4556 lr212832.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr486582.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNx1932.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNx1932.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 jr486582.exe 4504 jr486582.exe 4596 ku233432.exe 4596 ku233432.exe 4556 lr212832.exe 4556 lr212832.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 jr486582.exe Token: SeDebugPrivilege 4596 ku233432.exe Token: SeDebugPrivilege 4556 lr212832.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4108 wrote to memory of 384 4108 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe 66 PID 4108 wrote to memory of 384 4108 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe 66 PID 4108 wrote to memory of 384 4108 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe 66 PID 384 wrote to memory of 4504 384 ziNx1932.exe 67 PID 384 wrote to memory of 4504 384 ziNx1932.exe 67 PID 384 wrote to memory of 4596 384 ziNx1932.exe 68 PID 384 wrote to memory of 4596 384 ziNx1932.exe 68 PID 384 wrote to memory of 4596 384 ziNx1932.exe 68 PID 4108 wrote to memory of 4556 4108 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe 70 PID 4108 wrote to memory of 4556 4108 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe 70 PID 4108 wrote to memory of 4556 4108 3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe"C:\Users\Admin\AppData\Local\Temp\3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx1932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx1932.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486582.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486582.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku233432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku233432.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr212832.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr212832.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5c651332e6d0ffe9637ee1cd30446667e
SHA18115e32cc1cc0d82903ee7b7505bdcb2f3e20a05
SHA256d796fb01e1c36fa946b80fc3cc6a5746b61b3348d91594c059d0358b93c93b46
SHA51232200f29cf3f06633e7fde9620432e5e857ad3c6fcfe479fe8a7179d6863c2afece40b76eeb5ef4d9653bab3b77ace7e2ca21fed991c97fb3c9b2a0dcc2a1e8b
-
Filesize
176KB
MD5c651332e6d0ffe9637ee1cd30446667e
SHA18115e32cc1cc0d82903ee7b7505bdcb2f3e20a05
SHA256d796fb01e1c36fa946b80fc3cc6a5746b61b3348d91594c059d0358b93c93b46
SHA51232200f29cf3f06633e7fde9620432e5e857ad3c6fcfe479fe8a7179d6863c2afece40b76eeb5ef4d9653bab3b77ace7e2ca21fed991c97fb3c9b2a0dcc2a1e8b
-
Filesize
389KB
MD57fa72b079c8ba8c264d9a77736e17f43
SHA17e01ce43a4bcb8a260d41315c41eddce6ebcdafe
SHA2567cf0b958e3a4c0d892c6ef91a25d7268e47efeea19bc8d3153dce9b8fe2ea9c7
SHA51292c4786ba3abe4122614e44b5e3a9c3440160f2b1f54e30c1c30a2a1531c693ec57d07a8c3950caded239190c15f42b6dbd8399349f5d7706619ad48898e290c
-
Filesize
389KB
MD57fa72b079c8ba8c264d9a77736e17f43
SHA17e01ce43a4bcb8a260d41315c41eddce6ebcdafe
SHA2567cf0b958e3a4c0d892c6ef91a25d7268e47efeea19bc8d3153dce9b8fe2ea9c7
SHA51292c4786ba3abe4122614e44b5e3a9c3440160f2b1f54e30c1c30a2a1531c693ec57d07a8c3950caded239190c15f42b6dbd8399349f5d7706619ad48898e290c
-
Filesize
12KB
MD52f68d4ad30142c3303a461608773ebbf
SHA18fb39ab02927a18919ac41b1cec2b39a69d50cec
SHA25663e87be853e2e896a77fb4b670c7e9b6902545eec151a41afb48504235628c87
SHA5121cedccc354c1cd101ed581d27dd596574c169855bd9dc7634b9f9b7fae00f574b4f268ef6678b753167265ff22900145ff58c656e9de4bf97545fa09a72f904f
-
Filesize
12KB
MD52f68d4ad30142c3303a461608773ebbf
SHA18fb39ab02927a18919ac41b1cec2b39a69d50cec
SHA25663e87be853e2e896a77fb4b670c7e9b6902545eec151a41afb48504235628c87
SHA5121cedccc354c1cd101ed581d27dd596574c169855bd9dc7634b9f9b7fae00f574b4f268ef6678b753167265ff22900145ff58c656e9de4bf97545fa09a72f904f
-
Filesize
435KB
MD5ef3ecfe3830ea670084b361ebc175089
SHA17befb40429ea8de0995433df3cef22dc58795bfa
SHA256d235051f03c7ef73662b74511d0931a5229e209e6c2465f80ac7df44c177cd0e
SHA5121f23bf09c9c12650c6a33c727e58f266fe704eb3c44fab68987010942801eedf53bf743789eabac123465d6aa4098af3ae76b2d4f92c7842bc3940c8778d42ad
-
Filesize
435KB
MD5ef3ecfe3830ea670084b361ebc175089
SHA17befb40429ea8de0995433df3cef22dc58795bfa
SHA256d235051f03c7ef73662b74511d0931a5229e209e6c2465f80ac7df44c177cd0e
SHA5121f23bf09c9c12650c6a33c727e58f266fe704eb3c44fab68987010942801eedf53bf743789eabac123465d6aa4098af3ae76b2d4f92c7842bc3940c8778d42ad