Analysis
-
max time kernel
89s -
max time network
93s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 22:28
Static task
static1
Behavioral task
behavioral1
Sample
6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe
Resource
win10-20230220-en
General
-
Target
6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe
-
Size
522KB
-
MD5
34540ffe8a22f19fe0f20012b958eae1
-
SHA1
85060045eb54700eab664554373840a40ba0eb1d
-
SHA256
6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3
-
SHA512
a412f9a59192de70b466e05d3f9697b46d21bfd629343588a83818bec195f78bb8f897bb4484d77daa215a2d45c4e514781bd6b65ab6f4538482798f66830209
-
SSDEEP
12288:QYMr/y90jzL1TGeRtrwEvH/rwdshC7JRQ5iU:QXyfyrwEvH/OsY7Q5r
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr767380.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr767380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr767380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr767380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr767380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr767380.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-140-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/4824-142-0x00000000026E0000-0x0000000002724000-memory.dmp family_redline behavioral1/memory/4824-147-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-148-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-150-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-152-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-154-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-156-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-158-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-160-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-162-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-164-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-166-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-168-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-170-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-172-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-174-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-176-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-178-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-180-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-182-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-184-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-188-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-190-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-186-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-192-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-194-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-196-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-200-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-202-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-198-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-204-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-206-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-208-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline behavioral1/memory/4824-210-0x00000000026E0000-0x000000000271F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziLt2120.exejr767380.exeku326442.exelr204691.exepid process 4600 ziLt2120.exe 4752 jr767380.exe 4824 ku326442.exe 4444 lr204691.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr767380.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr767380.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exeziLt2120.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLt2120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLt2120.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr767380.exeku326442.exelr204691.exepid process 4752 jr767380.exe 4752 jr767380.exe 4824 ku326442.exe 4824 ku326442.exe 4444 lr204691.exe 4444 lr204691.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr767380.exeku326442.exelr204691.exedescription pid process Token: SeDebugPrivilege 4752 jr767380.exe Token: SeDebugPrivilege 4824 ku326442.exe Token: SeDebugPrivilege 4444 lr204691.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exeziLt2120.exedescription pid process target process PID 4012 wrote to memory of 4600 4012 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe ziLt2120.exe PID 4012 wrote to memory of 4600 4012 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe ziLt2120.exe PID 4012 wrote to memory of 4600 4012 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe ziLt2120.exe PID 4600 wrote to memory of 4752 4600 ziLt2120.exe jr767380.exe PID 4600 wrote to memory of 4752 4600 ziLt2120.exe jr767380.exe PID 4600 wrote to memory of 4824 4600 ziLt2120.exe ku326442.exe PID 4600 wrote to memory of 4824 4600 ziLt2120.exe ku326442.exe PID 4600 wrote to memory of 4824 4600 ziLt2120.exe ku326442.exe PID 4012 wrote to memory of 4444 4012 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe lr204691.exe PID 4012 wrote to memory of 4444 4012 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe lr204691.exe PID 4012 wrote to memory of 4444 4012 6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe lr204691.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe"C:\Users\Admin\AppData\Local\Temp\6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exeFilesize
175KB
MD5f13c2dcb65d6b00dd6b8bc3d5103b9d1
SHA1e7bc371130752f77f5a11e572c8071965f0b8e28
SHA256d48021ab5d2266f014c68761192b44bdbe4557547b51014636149b5d8fa5e1ec
SHA5129533041603cc08342df3a893a921735e1ceaa1b0482efc15e5013a86eeddee9d1c60ce7aa30a419d8ccbfb9476048ecfe2d80666f579a9d5b27100a540d12e80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exeFilesize
175KB
MD5f13c2dcb65d6b00dd6b8bc3d5103b9d1
SHA1e7bc371130752f77f5a11e572c8071965f0b8e28
SHA256d48021ab5d2266f014c68761192b44bdbe4557547b51014636149b5d8fa5e1ec
SHA5129533041603cc08342df3a893a921735e1ceaa1b0482efc15e5013a86eeddee9d1c60ce7aa30a419d8ccbfb9476048ecfe2d80666f579a9d5b27100a540d12e80
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exeFilesize
380KB
MD5708dfd4b77b6d348aa08bfb38676d71a
SHA18aca9e91ae86996680606ed489efbfcaa48023aa
SHA25675e152fe9c5ef6eaa9cfe804d6520c5128b3f6919bc1dabd682db8577ed7f806
SHA51286a256486c4950ad4814f7e9f49d56c895a655dcf4fe8570ff2a82742b5178fc028295128f708412668d7f7d7c593d03aa75ee97bc3e7d0d229a9be4820c72ec
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exeFilesize
380KB
MD5708dfd4b77b6d348aa08bfb38676d71a
SHA18aca9e91ae86996680606ed489efbfcaa48023aa
SHA25675e152fe9c5ef6eaa9cfe804d6520c5128b3f6919bc1dabd682db8577ed7f806
SHA51286a256486c4950ad4814f7e9f49d56c895a655dcf4fe8570ff2a82742b5178fc028295128f708412668d7f7d7c593d03aa75ee97bc3e7d0d229a9be4820c72ec
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exeFilesize
15KB
MD56f63d2536a49fc38c22d1e2a87a6fa4c
SHA1f590e9a17e6dc17b626be1d35769d5f4b8817ee7
SHA256f2ba94f87e838a2beb93afc4916f7277026da19b1ec1cb8d1a275853bc46237a
SHA51221ea2394cc9ecdd44be73550260600f098a17416fe3cc9ee5f6decf1d920f93f66697c15937a2db28340e4a10c4b2437759ad7b96477a0c66b7d4a1205f67269
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exeFilesize
15KB
MD56f63d2536a49fc38c22d1e2a87a6fa4c
SHA1f590e9a17e6dc17b626be1d35769d5f4b8817ee7
SHA256f2ba94f87e838a2beb93afc4916f7277026da19b1ec1cb8d1a275853bc46237a
SHA51221ea2394cc9ecdd44be73550260600f098a17416fe3cc9ee5f6decf1d920f93f66697c15937a2db28340e4a10c4b2437759ad7b96477a0c66b7d4a1205f67269
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exeFilesize
295KB
MD5085084ac2d5227ef97aab9b4f86132c9
SHA13b9e715f54f173643666451ed032d5aa546cd9bd
SHA2569a8d3a9024c8ce9d61d82f33fa0a4690d162d667afe09eebc62a4c9a0a537b69
SHA512e7813203c3ae84262e52604de977735bd153a53a0d90f9265867eb2567905c64cd3b5c56b3939b73ddb82f4f64053bb470efba3dc6623e5fe8352c73498f9c34
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exeFilesize
295KB
MD5085084ac2d5227ef97aab9b4f86132c9
SHA13b9e715f54f173643666451ed032d5aa546cd9bd
SHA2569a8d3a9024c8ce9d61d82f33fa0a4690d162d667afe09eebc62a4c9a0a537b69
SHA512e7813203c3ae84262e52604de977735bd153a53a0d90f9265867eb2567905c64cd3b5c56b3939b73ddb82f4f64053bb470efba3dc6623e5fe8352c73498f9c34
-
memory/4444-1075-0x0000000000FE0000-0x0000000001012000-memory.dmpFilesize
200KB
-
memory/4444-1076-0x0000000005900000-0x0000000005910000-memory.dmpFilesize
64KB
-
memory/4444-1077-0x0000000005A20000-0x0000000005A6B000-memory.dmpFilesize
300KB
-
memory/4752-134-0x0000000000740000-0x000000000074A000-memory.dmpFilesize
40KB
-
memory/4824-178-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-190-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-143-0x00000000005E0000-0x000000000062B000-memory.dmpFilesize
300KB
-
memory/4824-144-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-145-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-146-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-147-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-148-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-150-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-152-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-154-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-156-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-158-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-160-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-162-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-164-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-166-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-168-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-170-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-172-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-174-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-176-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-141-0x0000000004BE0000-0x00000000050DE000-memory.dmpFilesize
5.0MB
-
memory/4824-180-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-182-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-184-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-188-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-142-0x00000000026E0000-0x0000000002724000-memory.dmpFilesize
272KB
-
memory/4824-186-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-192-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-194-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-196-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-200-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-202-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-198-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-204-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-206-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-208-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-210-0x00000000026E0000-0x000000000271F000-memory.dmpFilesize
252KB
-
memory/4824-1053-0x00000000051E0000-0x00000000057E6000-memory.dmpFilesize
6.0MB
-
memory/4824-1054-0x00000000057F0000-0x00000000058FA000-memory.dmpFilesize
1.0MB
-
memory/4824-1056-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-1055-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/4824-1057-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/4824-1058-0x0000000005A50000-0x0000000005A9B000-memory.dmpFilesize
300KB
-
memory/4824-1060-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-1061-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-1062-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-1063-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/4824-1064-0x00000000062B0000-0x0000000006342000-memory.dmpFilesize
584KB
-
memory/4824-1065-0x0000000004BD0000-0x0000000004BE0000-memory.dmpFilesize
64KB
-
memory/4824-140-0x0000000002520000-0x0000000002566000-memory.dmpFilesize
280KB
-
memory/4824-1066-0x0000000006480000-0x0000000006642000-memory.dmpFilesize
1.8MB
-
memory/4824-1067-0x0000000006670000-0x0000000006B9C000-memory.dmpFilesize
5.2MB
-
memory/4824-1068-0x0000000006CD0000-0x0000000006D46000-memory.dmpFilesize
472KB
-
memory/4824-1069-0x0000000006D60000-0x0000000006DB0000-memory.dmpFilesize
320KB