Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe
Resource
win10-20230220-en
General
-
Target
a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe
-
Size
536KB
-
MD5
de615502545409c2816cbf68fde24793
-
SHA1
18ebe2f0c3aa00c35e2837a0eeeb1e9dbc02488f
-
SHA256
a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669
-
SHA512
5bf97e15a100d87d140e496719aca13999a02aac88eb15e89f6ab5b7a5b1d5cd69c4303cbad62c18fc05165cf33bdf797d0a571ec08142b72312af33deca1cc4
-
SSDEEP
12288:aMrfy90/9sY30lJtEjQANYznW04LDsxLQMAcHsY:5ywmSEfENYN4A9J
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr329149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr329149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr329149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr329149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr329149.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3500-140-0x00000000026F0000-0x0000000002736000-memory.dmp family_redline behavioral1/memory/3500-142-0x0000000002890000-0x00000000028D4000-memory.dmp family_redline behavioral1/memory/3500-147-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-148-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-150-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-152-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-154-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-156-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-158-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-160-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-162-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-164-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-166-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-168-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-170-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-172-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-174-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-176-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-178-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-180-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-182-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-184-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-190-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-188-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-186-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-192-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-194-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-196-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-198-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-200-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-202-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-204-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-206-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-208-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/3500-210-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3728 ziof0284.exe 4156 jr329149.exe 3500 ku476592.exe 2488 lr525455.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr329149.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziof0284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziof0284.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4156 jr329149.exe 4156 jr329149.exe 3500 ku476592.exe 3500 ku476592.exe 2488 lr525455.exe 2488 lr525455.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4156 jr329149.exe Token: SeDebugPrivilege 3500 ku476592.exe Token: SeDebugPrivilege 2488 lr525455.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 996 wrote to memory of 3728 996 a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe 66 PID 996 wrote to memory of 3728 996 a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe 66 PID 996 wrote to memory of 3728 996 a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe 66 PID 3728 wrote to memory of 4156 3728 ziof0284.exe 67 PID 3728 wrote to memory of 4156 3728 ziof0284.exe 67 PID 3728 wrote to memory of 3500 3728 ziof0284.exe 68 PID 3728 wrote to memory of 3500 3728 ziof0284.exe 68 PID 3728 wrote to memory of 3500 3728 ziof0284.exe 68 PID 996 wrote to memory of 2488 996 a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe 70 PID 996 wrote to memory of 2488 996 a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe 70 PID 996 wrote to memory of 2488 996 a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe"C:\Users\Admin\AppData\Local\Temp\a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof0284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof0284.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr329149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr329149.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476592.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476592.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr525455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr525455.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b8df08e136c294e117d6843563c6cd0f
SHA19f63893c24f1af7f10ce2431a4c0e64a569a18d5
SHA256862399f3989d036ab98bc6aeee37b3e60c82bfb1eeaaab5d74f576ecf13d4a45
SHA512b1a8d483a37f5125f0a2779feff490a64fa3552c8d00845fc7c0e7c91d5e06746ffca2a87598183968e3991ea227b6b64a4bad35caba738c61fe5090a0dfb45b
-
Filesize
175KB
MD5b8df08e136c294e117d6843563c6cd0f
SHA19f63893c24f1af7f10ce2431a4c0e64a569a18d5
SHA256862399f3989d036ab98bc6aeee37b3e60c82bfb1eeaaab5d74f576ecf13d4a45
SHA512b1a8d483a37f5125f0a2779feff490a64fa3552c8d00845fc7c0e7c91d5e06746ffca2a87598183968e3991ea227b6b64a4bad35caba738c61fe5090a0dfb45b
-
Filesize
394KB
MD5517aee8e37beda59bcdf437bffc98e2e
SHA10ff02b41fe3ab823d3707b053044801819eda8bc
SHA256854dae1510b93cd2b909e7367beaed5f59a26b0c3774db90394d6bf9f922705c
SHA512f183da5de6c6fe32b156cc53c844a5a8996dc5c2a0763eb3be2ced79286057a468d008d7e2fa458b8f4218e753f1e74b2430c7cc2e4ce9907c47a4f6ff651c38
-
Filesize
394KB
MD5517aee8e37beda59bcdf437bffc98e2e
SHA10ff02b41fe3ab823d3707b053044801819eda8bc
SHA256854dae1510b93cd2b909e7367beaed5f59a26b0c3774db90394d6bf9f922705c
SHA512f183da5de6c6fe32b156cc53c844a5a8996dc5c2a0763eb3be2ced79286057a468d008d7e2fa458b8f4218e753f1e74b2430c7cc2e4ce9907c47a4f6ff651c38
-
Filesize
13KB
MD593f1aae2f1fe5bb30a3312c566f15281
SHA14da51090aa2e49a722306a8384111601f3f86f67
SHA256d290df5bc452eb1c9968552ebf8e243cbc2797233fb7c4ceba7f185b7852bfbb
SHA512de9ea969ed792ce52a02bf00d2437f81bfd26bedf7e04f483bc031ba3303990f65ac269061d8561ffa41f0fd383b0cf742fba9b115295a962b288afb7231216d
-
Filesize
13KB
MD593f1aae2f1fe5bb30a3312c566f15281
SHA14da51090aa2e49a722306a8384111601f3f86f67
SHA256d290df5bc452eb1c9968552ebf8e243cbc2797233fb7c4ceba7f185b7852bfbb
SHA512de9ea969ed792ce52a02bf00d2437f81bfd26bedf7e04f483bc031ba3303990f65ac269061d8561ffa41f0fd383b0cf742fba9b115295a962b288afb7231216d
-
Filesize
353KB
MD5b799dcdeee9cb9eae0819cc640877af1
SHA16cd145de0266396439506283ec154592131ec92a
SHA25663b5cff83282599093be04fc73233f1d5461669ee408a4a56177a8fb65b2d138
SHA512c2a1d494c7fe267439702deed6063d2be4882660cc1e3a222dcf85882bd056ba3313707a208bd50906ae3f156d4b7173c1078e2cfaf0871779706edf49303cf0
-
Filesize
353KB
MD5b799dcdeee9cb9eae0819cc640877af1
SHA16cd145de0266396439506283ec154592131ec92a
SHA25663b5cff83282599093be04fc73233f1d5461669ee408a4a56177a8fb65b2d138
SHA512c2a1d494c7fe267439702deed6063d2be4882660cc1e3a222dcf85882bd056ba3313707a208bd50906ae3f156d4b7173c1078e2cfaf0871779706edf49303cf0