Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:32
Static task
static1
Behavioral task
behavioral1
Sample
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe
Resource
win10-20230220-en
General
-
Target
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe
-
Size
522KB
-
MD5
31a1ee1cab9bf1c1eb59e6037b82ac3c
-
SHA1
c2d425801ce4a579752db058f92d52284f6e7a9f
-
SHA256
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69
-
SHA512
a970333c38f333268c480ad6f1897b776047fd958ee47c0de7f32a8a845d06ee4702032feafdcb85ae8fc5f08e4b1cef508fff9d93ffc64c0d37147c3985780f
-
SSDEEP
12288:1Mriy90lXc+tQNsTzKyvKib4vl6IAWPYv53mA:3yicYNKiMsI6h/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr488774.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr488774.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3236-142-0x0000000002060000-0x00000000020A6000-memory.dmp family_redline behavioral1/memory/3236-144-0x0000000004A50000-0x0000000004A94000-memory.dmp family_redline behavioral1/memory/3236-145-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-146-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-148-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-150-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-156-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-152-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-159-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-161-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-163-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-165-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-167-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-169-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-171-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-173-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-175-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-177-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-179-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-181-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-183-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-185-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-187-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-189-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-191-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-193-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-195-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-197-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-199-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-201-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-203-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-205-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-207-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-209-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/3236-211-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zieq1714.exejr488774.exeku026854.exelr632927.exepid process 4268 zieq1714.exe 2396 jr488774.exe 3236 ku026854.exe 4852 lr632927.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr488774.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr488774.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zieq1714.exec581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieq1714.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieq1714.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr488774.exeku026854.exelr632927.exepid process 2396 jr488774.exe 2396 jr488774.exe 3236 ku026854.exe 3236 ku026854.exe 4852 lr632927.exe 4852 lr632927.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr488774.exeku026854.exelr632927.exedescription pid process Token: SeDebugPrivilege 2396 jr488774.exe Token: SeDebugPrivilege 3236 ku026854.exe Token: SeDebugPrivilege 4852 lr632927.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exezieq1714.exedescription pid process target process PID 2040 wrote to memory of 4268 2040 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe zieq1714.exe PID 2040 wrote to memory of 4268 2040 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe zieq1714.exe PID 2040 wrote to memory of 4268 2040 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe zieq1714.exe PID 4268 wrote to memory of 2396 4268 zieq1714.exe jr488774.exe PID 4268 wrote to memory of 2396 4268 zieq1714.exe jr488774.exe PID 4268 wrote to memory of 3236 4268 zieq1714.exe ku026854.exe PID 4268 wrote to memory of 3236 4268 zieq1714.exe ku026854.exe PID 4268 wrote to memory of 3236 4268 zieq1714.exe ku026854.exe PID 2040 wrote to memory of 4852 2040 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe lr632927.exe PID 2040 wrote to memory of 4852 2040 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe lr632927.exe PID 2040 wrote to memory of 4852 2040 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe lr632927.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe"C:\Users\Admin\AppData\Local\Temp\c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieq1714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieq1714.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026854.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr632927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr632927.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr632927.exeFilesize
175KB
MD57ea7f60a19b79bc51d026f76efa80ce4
SHA1c18290661be3d25a9b2ec86ce7d62626d02f14e2
SHA256fda21817b7eb1d85401ca7e750b80141c908c0c5967021ac364c01ed5b2976ee
SHA5129e382d39538f2812e25fa722e1a701c64e3d717c02fdb51d42cf12a3247ffc8dad8c84819cf60cb3b67729499af4204e2ecd2d54e4b91841e8da9228f7b335ee
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr632927.exeFilesize
175KB
MD57ea7f60a19b79bc51d026f76efa80ce4
SHA1c18290661be3d25a9b2ec86ce7d62626d02f14e2
SHA256fda21817b7eb1d85401ca7e750b80141c908c0c5967021ac364c01ed5b2976ee
SHA5129e382d39538f2812e25fa722e1a701c64e3d717c02fdb51d42cf12a3247ffc8dad8c84819cf60cb3b67729499af4204e2ecd2d54e4b91841e8da9228f7b335ee
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieq1714.exeFilesize
379KB
MD5f5bdcf71d160518833ae1712191bdb67
SHA1fb6147f49f6c743deb80f78e29923e58258c4216
SHA25612540d2edcd78e7a57e31081dbee5f607bf42571176c14082ef0b61ee20a19d9
SHA512651bd12d827dd69e9196909251121b07da92bf44e0d3fb1d98df021f89ae856ab9e6c9b603b27697ced27fd2dac15038aaa949f4f2370c9e2d9245d4c7ae1161
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieq1714.exeFilesize
379KB
MD5f5bdcf71d160518833ae1712191bdb67
SHA1fb6147f49f6c743deb80f78e29923e58258c4216
SHA25612540d2edcd78e7a57e31081dbee5f607bf42571176c14082ef0b61ee20a19d9
SHA512651bd12d827dd69e9196909251121b07da92bf44e0d3fb1d98df021f89ae856ab9e6c9b603b27697ced27fd2dac15038aaa949f4f2370c9e2d9245d4c7ae1161
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exeFilesize
11KB
MD53980b618ff21d8baeeadddebb90911c3
SHA16d8715ba96900b25420b079bee6dad97c05b655c
SHA256e56621e7053a7d7ae74116a68fd38f6577c86f9dd1e74933c05c47d70ac802a8
SHA512e4a2b6aa79a1a856bbe0b87707e1cae03a23c3a8b389fa58a4e28a7af889a776cfe52e34db5aac33dc81160c66bae9296ecdb66d30aa885200c3c5768fe36d99
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exeFilesize
11KB
MD53980b618ff21d8baeeadddebb90911c3
SHA16d8715ba96900b25420b079bee6dad97c05b655c
SHA256e56621e7053a7d7ae74116a68fd38f6577c86f9dd1e74933c05c47d70ac802a8
SHA512e4a2b6aa79a1a856bbe0b87707e1cae03a23c3a8b389fa58a4e28a7af889a776cfe52e34db5aac33dc81160c66bae9296ecdb66d30aa885200c3c5768fe36d99
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026854.exeFilesize
294KB
MD57f8a3951bc8301931b50f587c602c8b8
SHA1eb3b5ea515fbd2e57047404cd14b7d21c5d69f87
SHA256a26716fec9df7807bac477d3fc330049c29aee079a42d81c662fe9fc0c894c30
SHA512a42cb452c30c4ece5e0173ee2e6783915b84b384bb295f6b43f5e2b176ba4b9e1677a1ee82e6fae9b1a6311a3503bce80952409eec895d662ffc892be49de3f3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026854.exeFilesize
294KB
MD57f8a3951bc8301931b50f587c602c8b8
SHA1eb3b5ea515fbd2e57047404cd14b7d21c5d69f87
SHA256a26716fec9df7807bac477d3fc330049c29aee079a42d81c662fe9fc0c894c30
SHA512a42cb452c30c4ece5e0173ee2e6783915b84b384bb295f6b43f5e2b176ba4b9e1677a1ee82e6fae9b1a6311a3503bce80952409eec895d662ffc892be49de3f3
-
memory/2396-135-0x00000000004C0000-0x00000000004CA000-memory.dmpFilesize
40KB
-
memory/3236-141-0x0000000001EB0000-0x0000000001EFB000-memory.dmpFilesize
300KB
-
memory/3236-142-0x0000000002060000-0x00000000020A6000-memory.dmpFilesize
280KB
-
memory/3236-143-0x0000000004B20000-0x000000000501E000-memory.dmpFilesize
5.0MB
-
memory/3236-144-0x0000000004A50000-0x0000000004A94000-memory.dmpFilesize
272KB
-
memory/3236-145-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-146-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-148-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-150-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-153-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-156-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-152-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-155-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-157-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-159-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-161-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-163-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-165-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-167-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-169-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-171-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-173-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-175-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-177-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-179-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-181-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-183-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-185-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-187-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-189-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-191-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-193-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-195-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-197-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-199-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-201-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-203-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-205-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-207-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-209-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-211-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/3236-1054-0x0000000005630000-0x0000000005C36000-memory.dmpFilesize
6.0MB
-
memory/3236-1055-0x0000000005050000-0x000000000515A000-memory.dmpFilesize
1.0MB
-
memory/3236-1056-0x0000000005190000-0x00000000051A2000-memory.dmpFilesize
72KB
-
memory/3236-1057-0x00000000051B0000-0x00000000051EE000-memory.dmpFilesize
248KB
-
memory/3236-1058-0x0000000005300000-0x000000000534B000-memory.dmpFilesize
300KB
-
memory/3236-1059-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-1061-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/3236-1062-0x0000000005530000-0x0000000005596000-memory.dmpFilesize
408KB
-
memory/3236-1063-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-1064-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-1065-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-1066-0x0000000006340000-0x0000000006502000-memory.dmpFilesize
1.8MB
-
memory/3236-1067-0x0000000006520000-0x0000000006A4C000-memory.dmpFilesize
5.2MB
-
memory/3236-1068-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/3236-1069-0x0000000007E50000-0x0000000007EC6000-memory.dmpFilesize
472KB
-
memory/3236-1070-0x0000000007ED0000-0x0000000007F20000-memory.dmpFilesize
320KB
-
memory/4852-1076-0x0000000000B50000-0x0000000000B82000-memory.dmpFilesize
200KB
-
memory/4852-1077-0x0000000005590000-0x00000000055DB000-memory.dmpFilesize
300KB
-
memory/4852-1078-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB