Analysis
-
max time kernel
54s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:49
Static task
static1
Behavioral task
behavioral1
Sample
5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe
Resource
win10-20230220-en
General
-
Target
5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe
-
Size
522KB
-
MD5
efa14e5bc9e75b2421b25968a18500cd
-
SHA1
a6cadca7874c9015bcfe7ebf8799c1d33a4e110d
-
SHA256
5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295
-
SHA512
2c6668b5ad5c8982d25c2ed8853e44189f1440e312982d04a13e2a59d7d9fb9670aac42bce09368b608d568ca3d217f63f1e1375e6298d17b525265252ee3b6d
-
SSDEEP
12288:sMrdy90atgktKCZZjKrw1thCrJufErflo08C:RyftguZ+itYrp4C
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr083395.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr083395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr083395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr083395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr083395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr083395.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4416-140-0x0000000002080000-0x00000000020C6000-memory.dmp family_redline behavioral1/memory/4416-142-0x0000000002130000-0x0000000002174000-memory.dmp family_redline behavioral1/memory/4416-146-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-149-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-151-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-147-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-153-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-155-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-157-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-159-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-161-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-163-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-165-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-167-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-169-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-171-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-173-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-175-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-177-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-179-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-181-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-183-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-185-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-187-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-189-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-191-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-193-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-195-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-197-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-199-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-201-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-203-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-205-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-207-0x0000000002130000-0x000000000216F000-memory.dmp family_redline behavioral1/memory/4416-209-0x0000000002130000-0x000000000216F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zihd8796.exejr083395.exeku867868.exelr411341.exepid process 2488 zihd8796.exe 2128 jr083395.exe 4416 ku867868.exe 2784 lr411341.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr083395.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr083395.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exezihd8796.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihd8796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihd8796.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr083395.exeku867868.exelr411341.exepid process 2128 jr083395.exe 2128 jr083395.exe 4416 ku867868.exe 4416 ku867868.exe 2784 lr411341.exe 2784 lr411341.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr083395.exeku867868.exelr411341.exedescription pid process Token: SeDebugPrivilege 2128 jr083395.exe Token: SeDebugPrivilege 4416 ku867868.exe Token: SeDebugPrivilege 2784 lr411341.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exezihd8796.exedescription pid process target process PID 4108 wrote to memory of 2488 4108 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe zihd8796.exe PID 4108 wrote to memory of 2488 4108 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe zihd8796.exe PID 4108 wrote to memory of 2488 4108 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe zihd8796.exe PID 2488 wrote to memory of 2128 2488 zihd8796.exe jr083395.exe PID 2488 wrote to memory of 2128 2488 zihd8796.exe jr083395.exe PID 2488 wrote to memory of 4416 2488 zihd8796.exe ku867868.exe PID 2488 wrote to memory of 4416 2488 zihd8796.exe ku867868.exe PID 2488 wrote to memory of 4416 2488 zihd8796.exe ku867868.exe PID 4108 wrote to memory of 2784 4108 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe lr411341.exe PID 4108 wrote to memory of 2784 4108 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe lr411341.exe PID 4108 wrote to memory of 2784 4108 5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe lr411341.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe"C:\Users\Admin\AppData\Local\Temp\5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exeFilesize
175KB
MD5788e9b64e63e05d62cd933ee1891514e
SHA1b7a0b595078731407d873c09a1a69a499917cf53
SHA2564a90774d12309de280cf529e0121bd59be97580bf4ad625468fb55aa8d2e3d3a
SHA51281ee49b2fa5b509fa824ba58b7d02da51cb775ce9a0553b9347c10545fd036e7603efa08eb3871a85dbfe1fe05094d19032ff7ab6c89dc02b19b4feb4cec2e86
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exeFilesize
175KB
MD5788e9b64e63e05d62cd933ee1891514e
SHA1b7a0b595078731407d873c09a1a69a499917cf53
SHA2564a90774d12309de280cf529e0121bd59be97580bf4ad625468fb55aa8d2e3d3a
SHA51281ee49b2fa5b509fa824ba58b7d02da51cb775ce9a0553b9347c10545fd036e7603efa08eb3871a85dbfe1fe05094d19032ff7ab6c89dc02b19b4feb4cec2e86
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exeFilesize
380KB
MD57b735eea60834ca68d57ab4b61ada094
SHA11a4269826682af659e9a2ac56a714626e8c3cbe4
SHA256be239ca492d21048df54e3620bb5e964aedeee1495c0d51297fa25510a670633
SHA512e844b09a2637d837069b5348e6afe6a2e27d367ddee0f63c738fe77b36811bce7651de8a472d382b7a170deb765193ef52692fb3a0706df93ee5b3e3ba2d5b84
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exeFilesize
380KB
MD57b735eea60834ca68d57ab4b61ada094
SHA11a4269826682af659e9a2ac56a714626e8c3cbe4
SHA256be239ca492d21048df54e3620bb5e964aedeee1495c0d51297fa25510a670633
SHA512e844b09a2637d837069b5348e6afe6a2e27d367ddee0f63c738fe77b36811bce7651de8a472d382b7a170deb765193ef52692fb3a0706df93ee5b3e3ba2d5b84
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exeFilesize
15KB
MD5785900820e473d575f91e484ca0e7bee
SHA168a967bfa868d7311996c6b048e1c450c69074f3
SHA2566248671551a4e0f3e3a8029d0c539bbd0ca2a19cdaa48850046db23a73470b80
SHA512450c46b567557bd1365264e1c13a87dffda742b573a493fdf990625b6695ee2dd8e718abe747240edde0c861d756ef21f94890d643d0149cd7961920ec271ba8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exeFilesize
15KB
MD5785900820e473d575f91e484ca0e7bee
SHA168a967bfa868d7311996c6b048e1c450c69074f3
SHA2566248671551a4e0f3e3a8029d0c539bbd0ca2a19cdaa48850046db23a73470b80
SHA512450c46b567557bd1365264e1c13a87dffda742b573a493fdf990625b6695ee2dd8e718abe747240edde0c861d756ef21f94890d643d0149cd7961920ec271ba8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exeFilesize
295KB
MD5108048601049807b76aacae2403016de
SHA14ff6f03f0eb128e186313a69fa2981602ebd1d6d
SHA256a18f85f0a64ebef7b04c36c0da9deaccac9f7a93bc8267967653c532e92ea12d
SHA51204a0c2b4bf4a9aecdd45f593d31629d73571719f38652746e35a22de347b1962d57338373126dcfd405a7d6f762597bb4215e41402ccc2bbbdf11511eed26144
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exeFilesize
295KB
MD5108048601049807b76aacae2403016de
SHA14ff6f03f0eb128e186313a69fa2981602ebd1d6d
SHA256a18f85f0a64ebef7b04c36c0da9deaccac9f7a93bc8267967653c532e92ea12d
SHA51204a0c2b4bf4a9aecdd45f593d31629d73571719f38652746e35a22de347b1962d57338373126dcfd405a7d6f762597bb4215e41402ccc2bbbdf11511eed26144
-
memory/2128-133-0x0000000000BB0000-0x0000000000BBA000-memory.dmpFilesize
40KB
-
memory/2784-1074-0x0000000000530000-0x0000000000562000-memory.dmpFilesize
200KB
-
memory/2784-1075-0x0000000004F70000-0x0000000004FBB000-memory.dmpFilesize
300KB
-
memory/2784-1076-0x0000000004DB0000-0x0000000004DC0000-memory.dmpFilesize
64KB
-
memory/4416-177-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-187-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-142-0x0000000002130000-0x0000000002174000-memory.dmpFilesize
272KB
-
memory/4416-144-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-143-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-145-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-146-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-149-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-151-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-147-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-153-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-155-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-157-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-159-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-161-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-163-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-165-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-167-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-169-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-171-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-173-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-175-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-140-0x0000000002080000-0x00000000020C6000-memory.dmpFilesize
280KB
-
memory/4416-179-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-181-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-183-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-185-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-141-0x0000000004C60000-0x000000000515E000-memory.dmpFilesize
5.0MB
-
memory/4416-189-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-191-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-193-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-195-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-197-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-199-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-201-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-203-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-205-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-207-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-209-0x0000000002130000-0x000000000216F000-memory.dmpFilesize
252KB
-
memory/4416-1052-0x0000000005770000-0x0000000005D76000-memory.dmpFilesize
6.0MB
-
memory/4416-1053-0x0000000005190000-0x000000000529A000-memory.dmpFilesize
1.0MB
-
memory/4416-1054-0x00000000052D0000-0x00000000052E2000-memory.dmpFilesize
72KB
-
memory/4416-1055-0x00000000052F0000-0x000000000532E000-memory.dmpFilesize
248KB
-
memory/4416-1056-0x0000000005440000-0x000000000548B000-memory.dmpFilesize
300KB
-
memory/4416-1057-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-1059-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/4416-1060-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-1061-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-1062-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-1063-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/4416-1064-0x0000000006700000-0x00000000068C2000-memory.dmpFilesize
1.8MB
-
memory/4416-139-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/4416-1065-0x00000000068F0000-0x0000000006E1C000-memory.dmpFilesize
5.2MB
-
memory/4416-1066-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4416-1067-0x0000000006F60000-0x0000000006FD6000-memory.dmpFilesize
472KB
-
memory/4416-1068-0x0000000006FE0000-0x0000000007030000-memory.dmpFilesize
320KB