Analysis
-
max time kernel
53s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-04-2023 20:31
Static task
static1
Behavioral task
behavioral1
Sample
a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe
Resource
win10-20230220-en
General
-
Target
a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe
-
Size
536KB
-
MD5
3f606784b2bc2b2aa5546ae4115bfd79
-
SHA1
35f196d4eead00597d33e6a8890c1af5113d3f19
-
SHA256
a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07
-
SHA512
6bd4cce65405b26d56a52f3c5b12c82ed3e62ac585c6fdbeeb708b4fbb1bfa896b71acfdda3f92f57741446dfe7a1387989fd63250d6b9492bb94232ed485ef8
-
SSDEEP
12288:dMrey90oxiG/2ShO1z8u8GN+zjyqrLsBYQc:jypj+S87ZN+Zrulc
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr791474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr791474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr791474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr791474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr791474.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3404-142-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/3404-147-0x0000000002700000-0x0000000002744000-memory.dmp family_redline behavioral1/memory/3404-148-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-149-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-151-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-153-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-155-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-157-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-159-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-161-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-163-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-165-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-167-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-169-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-171-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-173-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-175-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-177-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-179-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-181-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-183-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-185-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-187-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-189-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-191-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-193-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-195-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-197-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-199-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-201-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-203-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-205-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-207-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-209-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/3404-211-0x0000000002700000-0x000000000273F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3280 ziye3502.exe 3396 jr791474.exe 3404 ku292423.exe 1548 lr284252.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr791474.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziye3502.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziye3502.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3396 jr791474.exe 3396 jr791474.exe 3404 ku292423.exe 3404 ku292423.exe 1548 lr284252.exe 1548 lr284252.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3396 jr791474.exe Token: SeDebugPrivilege 3404 ku292423.exe Token: SeDebugPrivilege 1548 lr284252.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3280 2900 a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe 66 PID 2900 wrote to memory of 3280 2900 a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe 66 PID 2900 wrote to memory of 3280 2900 a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe 66 PID 3280 wrote to memory of 3396 3280 ziye3502.exe 67 PID 3280 wrote to memory of 3396 3280 ziye3502.exe 67 PID 3280 wrote to memory of 3404 3280 ziye3502.exe 68 PID 3280 wrote to memory of 3404 3280 ziye3502.exe 68 PID 3280 wrote to memory of 3404 3280 ziye3502.exe 68 PID 2900 wrote to memory of 1548 2900 a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe 70 PID 2900 wrote to memory of 1548 2900 a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe 70 PID 2900 wrote to memory of 1548 2900 a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe"C:\Users\Admin\AppData\Local\Temp\a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziye3502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziye3502.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791474.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku292423.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku292423.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284252.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ff8e40a54e81566afe3539b0d45504b8
SHA11f9dd25e0e5f68dd749c827f3b5842016f9572c4
SHA2563a40de706144a84bc04c43903697186c015f99f97c02d055fc53c24c968f79e8
SHA5127dd77ea570b47bf15f27c35e44b291d27f4037d026f103b994e5b5463ca3634e1b54946cb1e329ba361868ac4b0be9b4d4be45887b369bef0282de6d10348eee
-
Filesize
175KB
MD5ff8e40a54e81566afe3539b0d45504b8
SHA11f9dd25e0e5f68dd749c827f3b5842016f9572c4
SHA2563a40de706144a84bc04c43903697186c015f99f97c02d055fc53c24c968f79e8
SHA5127dd77ea570b47bf15f27c35e44b291d27f4037d026f103b994e5b5463ca3634e1b54946cb1e329ba361868ac4b0be9b4d4be45887b369bef0282de6d10348eee
-
Filesize
394KB
MD54526752661f13bd6d940e6f7df2142a1
SHA1e13075ff8fc336e3ec191e1983c2114c6699a647
SHA25647a3b8a45c6b12c2d5a3e65d389bce3cd3d744319f5c71cddcb8b67fdb03166d
SHA512e69e8446f8be8ebdedb7d85619b39c3353941e93c304f8967cb63ab57de207214a873b814985d56c1cce48c75ccaf8406ad6d1ae62a91cc6afcf9506159aad34
-
Filesize
394KB
MD54526752661f13bd6d940e6f7df2142a1
SHA1e13075ff8fc336e3ec191e1983c2114c6699a647
SHA25647a3b8a45c6b12c2d5a3e65d389bce3cd3d744319f5c71cddcb8b67fdb03166d
SHA512e69e8446f8be8ebdedb7d85619b39c3353941e93c304f8967cb63ab57de207214a873b814985d56c1cce48c75ccaf8406ad6d1ae62a91cc6afcf9506159aad34
-
Filesize
13KB
MD51b1b3d51477db83537ed04f88b66db00
SHA111ed2efc66102f4b90ed4255c2f065bbb9436a4a
SHA256f856bf45f40f0efcd60acc3185d17998b83aad4e78cc348078409492f115232f
SHA512dfdf5094973a9904e85222466b09f001ec682cbf5113bcf2331a1d65b542c2bd5e23452b543c98f11d8a666bbb9575f11b07c2301231d5c19f7a2821c70b90b1
-
Filesize
13KB
MD51b1b3d51477db83537ed04f88b66db00
SHA111ed2efc66102f4b90ed4255c2f065bbb9436a4a
SHA256f856bf45f40f0efcd60acc3185d17998b83aad4e78cc348078409492f115232f
SHA512dfdf5094973a9904e85222466b09f001ec682cbf5113bcf2331a1d65b542c2bd5e23452b543c98f11d8a666bbb9575f11b07c2301231d5c19f7a2821c70b90b1
-
Filesize
353KB
MD51680ff15db94ceaaddc47e2667fe92ee
SHA199e5e929a1b5747be8672b1e169cd9fccbae2461
SHA256b9364ddc4025e376caffd5b85005e0719c918c33741cff84eb646acd152f310e
SHA512df7216b0e9d3343020b821a6209472b83bfb4a93fec95387c39be5c5a706ab859e7c6160e49b31ed1ff57d509d06ddf1818cc8d3d366536137b0087149bcfb65
-
Filesize
353KB
MD51680ff15db94ceaaddc47e2667fe92ee
SHA199e5e929a1b5747be8672b1e169cd9fccbae2461
SHA256b9364ddc4025e376caffd5b85005e0719c918c33741cff84eb646acd152f310e
SHA512df7216b0e9d3343020b821a6209472b83bfb4a93fec95387c39be5c5a706ab859e7c6160e49b31ed1ff57d509d06ddf1818cc8d3d366536137b0087149bcfb65