Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 03:15
Static task
static1
Behavioral task
behavioral1
Sample
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe
Resource
win10-20230220-en
General
-
Target
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe
-
Size
537KB
-
MD5
eaba220c7b7d3dac46bcd8a48499e708
-
SHA1
1d3bc5ceddcd179983fbe32a37ffe865ef91aad5
-
SHA256
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6
-
SHA512
ee360bfb49f6a737ab932eeae43b372d9143d9b9789b6d9528c296bdd6f5228f2bec9ada6d854a32971dc29d99747c8e818317d1991fb7f38e6877b5bb8c4a03
-
SSDEEP
12288:8MrEy90un9FwmEBu5prV5fWVrUdGHs8wooaP7bG6FjhFZFi:4yBwmnpkrXLw987Nxi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr453076.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4472-142-0x0000000004D40000-0x0000000004D86000-memory.dmp family_redline behavioral1/memory/4472-145-0x0000000004DC0000-0x0000000004E04000-memory.dmp family_redline behavioral1/memory/4472-146-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-153-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-151-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-163-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-161-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-167-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-173-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-181-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-189-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-201-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-209-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-207-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-205-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-203-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-199-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-197-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-195-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-193-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-191-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-187-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-185-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-183-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-179-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-177-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-175-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-171-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-169-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-165-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-159-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-157-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-155-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-149-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/4472-147-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1000 zinv4256.exe 3364 jr453076.exe 4472 ku119437.exe 4492 lr153251.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr453076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zinv4256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinv4256.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3364 jr453076.exe 3364 jr453076.exe 4472 ku119437.exe 4472 ku119437.exe 4492 lr153251.exe 4492 lr153251.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3364 jr453076.exe Token: SeDebugPrivilege 4472 ku119437.exe Token: SeDebugPrivilege 4492 lr153251.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1000 3208 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe 66 PID 3208 wrote to memory of 1000 3208 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe 66 PID 3208 wrote to memory of 1000 3208 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe 66 PID 1000 wrote to memory of 3364 1000 zinv4256.exe 67 PID 1000 wrote to memory of 3364 1000 zinv4256.exe 67 PID 1000 wrote to memory of 4472 1000 zinv4256.exe 68 PID 1000 wrote to memory of 4472 1000 zinv4256.exe 68 PID 1000 wrote to memory of 4472 1000 zinv4256.exe 68 PID 3208 wrote to memory of 4492 3208 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe 70 PID 3208 wrote to memory of 4492 3208 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe 70 PID 3208 wrote to memory of 4492 3208 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe"C:\Users\Admin\AppData\Local\Temp\ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinv4256.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinv4256.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr453076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr453076.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku119437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku119437.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr153251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr153251.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD55b9f61d1dcfb038ac10bcbe674b1eaaf
SHA17750e925d79ce8c6f7236d3dd052d566d0473d50
SHA256e569182c7ace9c014aa877c473a7438e168e20d5c6d521b5de4445f36f483774
SHA512f3c8b8d7067246d2b5a1492ddb0d4b271bce130600758238c3c17afe2c4af7c4279e0c527bf1b22a8cd027a014b6ac7b10f3ac7214fe8820f9583d6cb1cd4dfe
-
Filesize
176KB
MD55b9f61d1dcfb038ac10bcbe674b1eaaf
SHA17750e925d79ce8c6f7236d3dd052d566d0473d50
SHA256e569182c7ace9c014aa877c473a7438e168e20d5c6d521b5de4445f36f483774
SHA512f3c8b8d7067246d2b5a1492ddb0d4b271bce130600758238c3c17afe2c4af7c4279e0c527bf1b22a8cd027a014b6ac7b10f3ac7214fe8820f9583d6cb1cd4dfe
-
Filesize
395KB
MD51b545aad1f9485d8c86e1e061d65815c
SHA1dac244595ffe9f5dcdd12622b5df418089a8f6ca
SHA25609e2a40ef61073ee123a7d9153c6a0e1add26c3f65260c48f9bec1e7c19935f7
SHA5126a78212ca2a12e77c12793c33d79c0ec15a865961deae6c2cd15f8bc27e7139bbde853f192f22203d9a430aa891a48ed064b7b8836739bac52e6cdcc84cce255
-
Filesize
395KB
MD51b545aad1f9485d8c86e1e061d65815c
SHA1dac244595ffe9f5dcdd12622b5df418089a8f6ca
SHA25609e2a40ef61073ee123a7d9153c6a0e1add26c3f65260c48f9bec1e7c19935f7
SHA5126a78212ca2a12e77c12793c33d79c0ec15a865961deae6c2cd15f8bc27e7139bbde853f192f22203d9a430aa891a48ed064b7b8836739bac52e6cdcc84cce255
-
Filesize
14KB
MD5477974078f61539d33857e4e347d1c12
SHA149e77dd5813765a7eef08ecead29e3351c2a60f9
SHA256ccb79ec034cf9415940e864838a34df0bc448d040e2c3f06aafa6a2841540f5d
SHA5124bad5129940fefb999a84a1e7f844e32d489a13d7c1cf60789912b1bcd0f85b6405e788eca2a2ed890f87392e359e286bbadff71fb30863b36767a8d5ddf7a4e
-
Filesize
14KB
MD5477974078f61539d33857e4e347d1c12
SHA149e77dd5813765a7eef08ecead29e3351c2a60f9
SHA256ccb79ec034cf9415940e864838a34df0bc448d040e2c3f06aafa6a2841540f5d
SHA5124bad5129940fefb999a84a1e7f844e32d489a13d7c1cf60789912b1bcd0f85b6405e788eca2a2ed890f87392e359e286bbadff71fb30863b36767a8d5ddf7a4e
-
Filesize
352KB
MD5b6020f8f3334b099c6a6e035443e403d
SHA1a66eb46e9c558951cda232e24488f5e1817eb425
SHA256c44cbd79e6ebcaef0325400b059f92f45b4c420bdfe5c7e85603c1717371a87e
SHA512cfae1a5e6df5b28e02944e70982b19918b33b7f7374c177095118efb14a8a50e5714201c9a49422ddbd703813d522ec49bcd555de2842d266bf48aec313c082a
-
Filesize
352KB
MD5b6020f8f3334b099c6a6e035443e403d
SHA1a66eb46e9c558951cda232e24488f5e1817eb425
SHA256c44cbd79e6ebcaef0325400b059f92f45b4c420bdfe5c7e85603c1717371a87e
SHA512cfae1a5e6df5b28e02944e70982b19918b33b7f7374c177095118efb14a8a50e5714201c9a49422ddbd703813d522ec49bcd555de2842d266bf48aec313c082a