Analysis
-
max time kernel
57s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:36
Static task
static1
Behavioral task
behavioral1
Sample
4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe
Resource
win10-20230220-en
General
-
Target
4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe
-
Size
521KB
-
MD5
43c20c897dd2ea192547db181929824e
-
SHA1
16de98bbb4ee24971bcb705d784058a25e7eef00
-
SHA256
4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa
-
SHA512
afab6d10fa760308ff7f412ae1d723e0d9aa41854381ba762605f93b5fdc4dfb55c8910ee99b374684df993f379b0af25c93c9f4b25d888272235fc23ef8b70c
-
SSDEEP
12288:BMrPy90Rj0iDUScj4FcO6SbTNl6bS2kRXw/:2ygUR66SlsbSr8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr221991.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr221991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr221991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr221991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr221991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr221991.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4968-141-0x0000000004990000-0x00000000049D6000-memory.dmp family_redline behavioral1/memory/4968-143-0x0000000004A20000-0x0000000004A64000-memory.dmp family_redline behavioral1/memory/4968-144-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-145-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-147-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-149-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-151-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-153-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-155-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-157-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-159-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-161-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-163-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-165-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-167-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-171-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-173-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-175-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-177-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-179-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-181-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-183-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-185-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-187-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-189-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-191-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-193-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-195-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-197-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-199-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-201-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-203-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-205-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-207-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4968-209-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziQc0552.exejr221991.exeku513710.exelr966552.exepid process 4376 ziQc0552.exe 4456 jr221991.exe 4968 ku513710.exe 2372 lr966552.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr221991.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr221991.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exeziQc0552.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQc0552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQc0552.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr221991.exeku513710.exelr966552.exepid process 4456 jr221991.exe 4456 jr221991.exe 4968 ku513710.exe 4968 ku513710.exe 2372 lr966552.exe 2372 lr966552.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr221991.exeku513710.exelr966552.exedescription pid process Token: SeDebugPrivilege 4456 jr221991.exe Token: SeDebugPrivilege 4968 ku513710.exe Token: SeDebugPrivilege 2372 lr966552.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exeziQc0552.exedescription pid process target process PID 4104 wrote to memory of 4376 4104 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe ziQc0552.exe PID 4104 wrote to memory of 4376 4104 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe ziQc0552.exe PID 4104 wrote to memory of 4376 4104 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe ziQc0552.exe PID 4376 wrote to memory of 4456 4376 ziQc0552.exe jr221991.exe PID 4376 wrote to memory of 4456 4376 ziQc0552.exe jr221991.exe PID 4376 wrote to memory of 4968 4376 ziQc0552.exe ku513710.exe PID 4376 wrote to memory of 4968 4376 ziQc0552.exe ku513710.exe PID 4376 wrote to memory of 4968 4376 ziQc0552.exe ku513710.exe PID 4104 wrote to memory of 2372 4104 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe lr966552.exe PID 4104 wrote to memory of 2372 4104 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe lr966552.exe PID 4104 wrote to memory of 2372 4104 4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe lr966552.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe"C:\Users\Admin\AppData\Local\Temp\4f1d1c4ae6060f14a9f5fb938efdaab86c38007d56259983acdd3873b51348fa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQc0552.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQc0552.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221991.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku513710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku513710.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr966552.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr966552.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr966552.exeFilesize
175KB
MD53be703f40efd7d68e2ddad1c604e206a
SHA16b5b4f2f8aace9fdbecaa8b3142e9ebfa9913306
SHA2568e5a645223a11cb5962fc09c54ed8a6b2e86ebf4ace9b2360b0e02768510c169
SHA512e6a8245a3ea17d59da3cf141f03fcdd4c958ba67ac6f737b2d18bc60439d3d91a8dc6bed88df1dd06842af7095b825ec3a60d82fd5994bad553122e941e6b0ab
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr966552.exeFilesize
175KB
MD53be703f40efd7d68e2ddad1c604e206a
SHA16b5b4f2f8aace9fdbecaa8b3142e9ebfa9913306
SHA2568e5a645223a11cb5962fc09c54ed8a6b2e86ebf4ace9b2360b0e02768510c169
SHA512e6a8245a3ea17d59da3cf141f03fcdd4c958ba67ac6f737b2d18bc60439d3d91a8dc6bed88df1dd06842af7095b825ec3a60d82fd5994bad553122e941e6b0ab
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQc0552.exeFilesize
379KB
MD569263f342fe30d16ee48ffb52a8bf70f
SHA1e5d19e82ec1761787eb8a0c6fe007001c0a3372a
SHA256dff90ee0872ef120226ce15b384d1e7785437b822ad0eff4569a6e3ebc4207ea
SHA512710e8fa1787630df99019a4453d763461fdf5f985148093eecc475735aab815c56e2250fb1487d69651099824dd7124ae0e8081bd9f8b9fe07d1b60a59c1c272
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQc0552.exeFilesize
379KB
MD569263f342fe30d16ee48ffb52a8bf70f
SHA1e5d19e82ec1761787eb8a0c6fe007001c0a3372a
SHA256dff90ee0872ef120226ce15b384d1e7785437b822ad0eff4569a6e3ebc4207ea
SHA512710e8fa1787630df99019a4453d763461fdf5f985148093eecc475735aab815c56e2250fb1487d69651099824dd7124ae0e8081bd9f8b9fe07d1b60a59c1c272
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221991.exeFilesize
11KB
MD599c00d0acec9ede87a1c9e72a5c63d5d
SHA111454a8ec68b43a87cb1c9a133fba8edfdd9085a
SHA25694815237076f78edbf213ac0a7142fbedb2423c5b937be280728c971374fe13d
SHA512d2a7e5b99de2b6665b09ea164b188d60a0e3c64b3f5e88fd8d4d1021d0ea1bd8f85d1afae21dff9f574093738153e369dd7a90bbeb0cf5c08751124f4266d533
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221991.exeFilesize
11KB
MD599c00d0acec9ede87a1c9e72a5c63d5d
SHA111454a8ec68b43a87cb1c9a133fba8edfdd9085a
SHA25694815237076f78edbf213ac0a7142fbedb2423c5b937be280728c971374fe13d
SHA512d2a7e5b99de2b6665b09ea164b188d60a0e3c64b3f5e88fd8d4d1021d0ea1bd8f85d1afae21dff9f574093738153e369dd7a90bbeb0cf5c08751124f4266d533
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku513710.exeFilesize
294KB
MD557ecff24c723a249a3a3c1b491aac38b
SHA14de5b586242760ec66f62dd5075858866ac31542
SHA25628ea121d9ad22eafa2718af2a35ee22f5fc22c09cb8542f2d3a5f0adced4beed
SHA512c3cf399cdc8cc083758fb94b85172b9414b2442a817bb6c49f54c65297eb43f70f6ec8dfbf92fd3d14fb38b7a15fbe3eb9907ec0ae9d62c6da0227e9a4ecc2b2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku513710.exeFilesize
294KB
MD557ecff24c723a249a3a3c1b491aac38b
SHA14de5b586242760ec66f62dd5075858866ac31542
SHA25628ea121d9ad22eafa2718af2a35ee22f5fc22c09cb8542f2d3a5f0adced4beed
SHA512c3cf399cdc8cc083758fb94b85172b9414b2442a817bb6c49f54c65297eb43f70f6ec8dfbf92fd3d14fb38b7a15fbe3eb9907ec0ae9d62c6da0227e9a4ecc2b2
-
memory/2372-1073-0x0000000000D00000-0x0000000000D32000-memory.dmpFilesize
200KB
-
memory/2372-1074-0x0000000005740000-0x000000000578B000-memory.dmpFilesize
300KB
-
memory/2372-1075-0x00000000055C0000-0x00000000055D0000-memory.dmpFilesize
64KB
-
memory/4456-133-0x0000000000620000-0x000000000062A000-memory.dmpFilesize
40KB
-
memory/4968-173-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-187-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-142-0x0000000004B60000-0x000000000505E000-memory.dmpFilesize
5.0MB
-
memory/4968-143-0x0000000004A20000-0x0000000004A64000-memory.dmpFilesize
272KB
-
memory/4968-144-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-145-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-147-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-149-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-151-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-153-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-155-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-157-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-159-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-161-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-163-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-165-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-168-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4968-167-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-171-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-170-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4968-140-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4968-175-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-177-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-179-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-181-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-183-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-185-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-141-0x0000000004990000-0x00000000049D6000-memory.dmpFilesize
280KB
-
memory/4968-189-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-191-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-193-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-195-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-197-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-199-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-201-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-203-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-205-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-207-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-209-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4968-1052-0x0000000005060000-0x0000000005666000-memory.dmpFilesize
6.0MB
-
memory/4968-1053-0x0000000005670000-0x000000000577A000-memory.dmpFilesize
1.0MB
-
memory/4968-1054-0x00000000057A0000-0x00000000057B2000-memory.dmpFilesize
72KB
-
memory/4968-1055-0x00000000057C0000-0x00000000057FE000-memory.dmpFilesize
248KB
-
memory/4968-1056-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4968-1057-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB
-
memory/4968-1059-0x0000000005AA0000-0x0000000005B32000-memory.dmpFilesize
584KB
-
memory/4968-1060-0x0000000005B40000-0x0000000005BA6000-memory.dmpFilesize
408KB
-
memory/4968-1061-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4968-1062-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB
-
memory/4968-1063-0x0000000006250000-0x0000000006412000-memory.dmpFilesize
1.8MB
-
memory/4968-139-0x00000000005C0000-0x000000000060B000-memory.dmpFilesize
300KB
-
memory/4968-1064-0x0000000006430000-0x000000000695C000-memory.dmpFilesize
5.2MB
-
memory/4968-1065-0x0000000006B80000-0x0000000006BF6000-memory.dmpFilesize
472KB
-
memory/4968-1066-0x0000000006C10000-0x0000000006C60000-memory.dmpFilesize
320KB
-
memory/4968-1067-0x0000000004B50000-0x0000000004B60000-memory.dmpFilesize
64KB