Analysis
-
max time kernel
54s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/04/2023, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe
Resource
win10-20230220-en
General
-
Target
9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe
-
Size
537KB
-
MD5
c3faa8874e649b95309fefb75bd1b51e
-
SHA1
6b0d8779714449f874578265f812f13fd3775374
-
SHA256
9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a
-
SHA512
4921eb9d7c4e833ecdb19cadef126a7aeba62fac86d75252d6c9b8bd2e378bce605f57574bbfe96daea988bcecbb9213404a826a73d0f07005d13a539dd0e26f
-
SSDEEP
12288:aMrGy90GccDQP+BDj0UJwxiUc2Hswo7Jbkfzqpx39KU:gyZcsXwxiQMwoZkfmP9X
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr622396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr622396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr622396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr622396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr622396.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4188-140-0x0000000002890000-0x00000000028D6000-memory.dmp family_redline behavioral1/memory/4188-142-0x0000000002910000-0x0000000002954000-memory.dmp family_redline behavioral1/memory/4188-146-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-147-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-149-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-151-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-153-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-155-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-157-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-159-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-161-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-163-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-165-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-167-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-169-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-171-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-173-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-175-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-177-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-179-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-181-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-183-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-185-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-187-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-189-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-191-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-193-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-195-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-197-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-199-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-201-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-203-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-205-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-207-0x0000000002910000-0x000000000294F000-memory.dmp family_redline behavioral1/memory/4188-209-0x0000000002910000-0x000000000294F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1504 ziYE3066.exe 4064 jr622396.exe 4188 ku136001.exe 4764 lr866493.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr622396.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYE3066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYE3066.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4064 jr622396.exe 4064 jr622396.exe 4188 ku136001.exe 4188 ku136001.exe 4764 lr866493.exe 4764 lr866493.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4064 jr622396.exe Token: SeDebugPrivilege 4188 ku136001.exe Token: SeDebugPrivilege 4764 lr866493.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4092 wrote to memory of 1504 4092 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe 66 PID 4092 wrote to memory of 1504 4092 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe 66 PID 4092 wrote to memory of 1504 4092 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe 66 PID 1504 wrote to memory of 4064 1504 ziYE3066.exe 67 PID 1504 wrote to memory of 4064 1504 ziYE3066.exe 67 PID 1504 wrote to memory of 4188 1504 ziYE3066.exe 68 PID 1504 wrote to memory of 4188 1504 ziYE3066.exe 68 PID 1504 wrote to memory of 4188 1504 ziYE3066.exe 68 PID 4092 wrote to memory of 4764 4092 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe 70 PID 4092 wrote to memory of 4764 4092 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe 70 PID 4092 wrote to memory of 4764 4092 9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe"C:\Users\Admin\AppData\Local\Temp\9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYE3066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYE3066.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr622396.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr622396.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136001.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr866493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr866493.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5578a33d37138578896c584a952c00bcf
SHA113f9acf63bb258bc318c31a64f37df52f6109c36
SHA25640321c30cb7d49ad729c3a00717313b5274fd461a4dee41aaa9950e7ff9714f8
SHA512e747059b02d9bdee1ac6eef6ca7d1e67b5936074ace3ef66cba6e1ac6c7fbf6a0818a608289ddab9f9e75385661d611ec26ec9c57fb9e71ffb8802633f547b8b
-
Filesize
176KB
MD5578a33d37138578896c584a952c00bcf
SHA113f9acf63bb258bc318c31a64f37df52f6109c36
SHA25640321c30cb7d49ad729c3a00717313b5274fd461a4dee41aaa9950e7ff9714f8
SHA512e747059b02d9bdee1ac6eef6ca7d1e67b5936074ace3ef66cba6e1ac6c7fbf6a0818a608289ddab9f9e75385661d611ec26ec9c57fb9e71ffb8802633f547b8b
-
Filesize
395KB
MD5d7f926e60afd1b29ae700be95942673c
SHA178065c115f82b8689d387cf1c56b9562c05f208e
SHA25616e1a6bb58c57ad2e888ecc2c6770547bb033665c8183f50cc385c82af1bed04
SHA512dea36ac26bb0d536bf46ec073dba8b98ea65fe06a8d266e4e4e320f6f2e34fe73aef7afd636ab1b2389a82abe063c082af057eae4ed2c87ad5e31d86707e99bd
-
Filesize
395KB
MD5d7f926e60afd1b29ae700be95942673c
SHA178065c115f82b8689d387cf1c56b9562c05f208e
SHA25616e1a6bb58c57ad2e888ecc2c6770547bb033665c8183f50cc385c82af1bed04
SHA512dea36ac26bb0d536bf46ec073dba8b98ea65fe06a8d266e4e4e320f6f2e34fe73aef7afd636ab1b2389a82abe063c082af057eae4ed2c87ad5e31d86707e99bd
-
Filesize
14KB
MD560944c9ba63b8f281422b2c485872a29
SHA11ae76780920176758d1b102a27ef65210ea3f64d
SHA25660b1c6d85cb3ccbbd7219f62cdb4386793ada819482925e410634a2c2b016f3c
SHA51229efaa82d90b2cbce68878fa413c679ff668466c5c6b979ed496365420c8174301a98daecf4721d2976b8c64a088ed0c991c8228aa0d598752ac695880c8b5c4
-
Filesize
14KB
MD560944c9ba63b8f281422b2c485872a29
SHA11ae76780920176758d1b102a27ef65210ea3f64d
SHA25660b1c6d85cb3ccbbd7219f62cdb4386793ada819482925e410634a2c2b016f3c
SHA51229efaa82d90b2cbce68878fa413c679ff668466c5c6b979ed496365420c8174301a98daecf4721d2976b8c64a088ed0c991c8228aa0d598752ac695880c8b5c4
-
Filesize
352KB
MD57bebc18ba50482e17d93116dbb2e6021
SHA1e27ab9d1e2784fadec3d6b91ff60a9f170ce28a4
SHA256011243c981e5040aaa63e9966729bcb752837e6bff5276fb11c284e5106e7bbc
SHA51247c36bf091e67c8e89c9e111a3fbef581f1eac04c0fccc8177e92614055992de52a1392ecee726353c090a10be3090e6267b83acdccb07a08bda5b9a4a96c962
-
Filesize
352KB
MD57bebc18ba50482e17d93116dbb2e6021
SHA1e27ab9d1e2784fadec3d6b91ff60a9f170ce28a4
SHA256011243c981e5040aaa63e9966729bcb752837e6bff5276fb11c284e5106e7bbc
SHA51247c36bf091e67c8e89c9e111a3fbef581f1eac04c0fccc8177e92614055992de52a1392ecee726353c090a10be3090e6267b83acdccb07a08bda5b9a4a96c962