Analysis
-
max time kernel
57s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:08
Static task
static1
Behavioral task
behavioral1
Sample
997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe
Resource
win10-20230220-en
General
-
Target
997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe
-
Size
522KB
-
MD5
6e9d80e595894d47480002eec06ea0dc
-
SHA1
eb2b7cff84e49f85b8770c914a3a80d50bc512dc
-
SHA256
997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4
-
SHA512
4e3f91b348ac893c3e2513d150be3c61c152d0091c1465bf0b68d1094932ec7136f1a8b7595cfd3abeac87aad7ff045f3dffed753a9b87528142c96d50e8f105
-
SSDEEP
12288:kMrSy90B8MRYKdYIfCDDoofwaLgKIchsCwMHWa7cV7a:GyGdRCDDoGwmIch2+wA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr512964.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr512964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr512964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr512964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr512964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr512964.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2612-143-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/2612-145-0x0000000004A50000-0x0000000004A94000-memory.dmp family_redline behavioral1/memory/2612-147-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-146-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-149-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-151-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-153-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-155-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-157-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-159-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-161-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-163-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-165-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-169-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-171-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-173-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-175-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-177-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-179-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-181-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-183-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-185-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-187-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-189-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-191-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-193-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-201-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-199-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-197-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-195-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-203-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-205-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-207-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-209-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/2612-211-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziiR3860.exejr512964.exeku487718.exelr660344.exepid process 2508 ziiR3860.exe 2576 jr512964.exe 2612 ku487718.exe 1372 lr660344.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr512964.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr512964.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exeziiR3860.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiR3860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiR3860.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr512964.exeku487718.exelr660344.exepid process 2576 jr512964.exe 2576 jr512964.exe 2612 ku487718.exe 2612 ku487718.exe 1372 lr660344.exe 1372 lr660344.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr512964.exeku487718.exelr660344.exedescription pid process Token: SeDebugPrivilege 2576 jr512964.exe Token: SeDebugPrivilege 2612 ku487718.exe Token: SeDebugPrivilege 1372 lr660344.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exeziiR3860.exedescription pid process target process PID 2236 wrote to memory of 2508 2236 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe ziiR3860.exe PID 2236 wrote to memory of 2508 2236 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe ziiR3860.exe PID 2236 wrote to memory of 2508 2236 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe ziiR3860.exe PID 2508 wrote to memory of 2576 2508 ziiR3860.exe jr512964.exe PID 2508 wrote to memory of 2576 2508 ziiR3860.exe jr512964.exe PID 2508 wrote to memory of 2612 2508 ziiR3860.exe ku487718.exe PID 2508 wrote to memory of 2612 2508 ziiR3860.exe ku487718.exe PID 2508 wrote to memory of 2612 2508 ziiR3860.exe ku487718.exe PID 2236 wrote to memory of 1372 2236 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe lr660344.exe PID 2236 wrote to memory of 1372 2236 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe lr660344.exe PID 2236 wrote to memory of 1372 2236 997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe lr660344.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe"C:\Users\Admin\AppData\Local\Temp\997a47d0217e7f8d8db9784a6ecc8f77aa578d7299c43a35df707ee12b46d4b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiR3860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiR3860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr512964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr512964.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku487718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku487718.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr660344.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr660344.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr660344.exeFilesize
175KB
MD5e09d77ae676b6a47e957f0c24cd11730
SHA143f72c52a13242f064b721c5f778159efb32a3b0
SHA256a25b44e1fadc8bc776afec4b63b296ca9b39dc9c38c796d3b654848e517c8ca4
SHA51231c220fc6eabe5a577def025ab509039251e0fb86d63b6349758fb99d95b1e1ebca4a5d1bf49696282e9e3fac3d16e2c32108453813dad3172fa5ceb36773b1a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr660344.exeFilesize
175KB
MD5e09d77ae676b6a47e957f0c24cd11730
SHA143f72c52a13242f064b721c5f778159efb32a3b0
SHA256a25b44e1fadc8bc776afec4b63b296ca9b39dc9c38c796d3b654848e517c8ca4
SHA51231c220fc6eabe5a577def025ab509039251e0fb86d63b6349758fb99d95b1e1ebca4a5d1bf49696282e9e3fac3d16e2c32108453813dad3172fa5ceb36773b1a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiR3860.exeFilesize
379KB
MD58e6569b692d72c35c6d88a7d13fb66fb
SHA166fe4828a8b6e800f2b3305c592c9e28f6989471
SHA256c0e6df66591414d31b7d05c95f541e3030e72beb7bf5f7464214811f49c17175
SHA512c4cf4d527be787d07efc1745dc7698e60acbbc3d33e60d2abcbdad24fae5aa5f646a32ff4467e87feed2e9ef584bb1169f5ce7681089057ec645a4a8ad3342f3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiR3860.exeFilesize
379KB
MD58e6569b692d72c35c6d88a7d13fb66fb
SHA166fe4828a8b6e800f2b3305c592c9e28f6989471
SHA256c0e6df66591414d31b7d05c95f541e3030e72beb7bf5f7464214811f49c17175
SHA512c4cf4d527be787d07efc1745dc7698e60acbbc3d33e60d2abcbdad24fae5aa5f646a32ff4467e87feed2e9ef584bb1169f5ce7681089057ec645a4a8ad3342f3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr512964.exeFilesize
15KB
MD5c18dd27f6af4968589bc3d28313c014c
SHA122f4b800c946e58d054388df780f7c38d6d193aa
SHA25653c7e98b95f2d2b24fe9de6479f073b02827302d0263f5e2b856096f0bda9d68
SHA51217478bb873bf6b11e7193f5652f75b68bbca2df48b5e93e80391322eabe414eb49637d33ff1e71f95d0c3e8876678211fe12002d0b7a4503c9580b77930b9390
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr512964.exeFilesize
15KB
MD5c18dd27f6af4968589bc3d28313c014c
SHA122f4b800c946e58d054388df780f7c38d6d193aa
SHA25653c7e98b95f2d2b24fe9de6479f073b02827302d0263f5e2b856096f0bda9d68
SHA51217478bb873bf6b11e7193f5652f75b68bbca2df48b5e93e80391322eabe414eb49637d33ff1e71f95d0c3e8876678211fe12002d0b7a4503c9580b77930b9390
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku487718.exeFilesize
294KB
MD564a40d3e43422df3487ad2482f354cb2
SHA1a1ff3c9ed413d4a67e7da89cffd5fce451e3333a
SHA2565516892ea6832b30b485fc7d57e164a39d4e07d046c1bb29350949571af7e0f4
SHA512b7ccd1c777f5a0a90c135e09699c6d5cf4342093de875702dc49239be76b94ea54c29cd342b7581455868900b11dcc61420f8fc785ab5a0527eb3a2ece99fe34
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku487718.exeFilesize
294KB
MD564a40d3e43422df3487ad2482f354cb2
SHA1a1ff3c9ed413d4a67e7da89cffd5fce451e3333a
SHA2565516892ea6832b30b485fc7d57e164a39d4e07d046c1bb29350949571af7e0f4
SHA512b7ccd1c777f5a0a90c135e09699c6d5cf4342093de875702dc49239be76b94ea54c29cd342b7581455868900b11dcc61420f8fc785ab5a0527eb3a2ece99fe34
-
memory/1372-1075-0x00000000005D0000-0x0000000000602000-memory.dmpFilesize
200KB
-
memory/1372-1076-0x0000000005010000-0x000000000505B000-memory.dmpFilesize
300KB
-
memory/1372-1077-0x00000000051B0000-0x00000000051C0000-memory.dmpFilesize
64KB
-
memory/2576-135-0x0000000000010000-0x000000000001A000-memory.dmpFilesize
40KB
-
memory/2612-175-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-189-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-144-0x0000000004AD0000-0x0000000004FCE000-memory.dmpFilesize
5.0MB
-
memory/2612-145-0x0000000004A50000-0x0000000004A94000-memory.dmpFilesize
272KB
-
memory/2612-147-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-146-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-149-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-151-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-153-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-155-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-157-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-159-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-161-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-163-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-165-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-167-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/2612-169-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-168-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/2612-171-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-173-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-142-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/2612-177-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-179-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-181-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-183-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-185-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-187-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-143-0x0000000002420000-0x0000000002466000-memory.dmpFilesize
280KB
-
memory/2612-191-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-193-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-201-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-199-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-197-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-195-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-203-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-205-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-207-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-209-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-211-0x0000000004A50000-0x0000000004A8F000-memory.dmpFilesize
252KB
-
memory/2612-1054-0x0000000004FD0000-0x00000000055D6000-memory.dmpFilesize
6.0MB
-
memory/2612-1055-0x0000000005660000-0x000000000576A000-memory.dmpFilesize
1.0MB
-
memory/2612-1056-0x00000000057A0000-0x00000000057B2000-memory.dmpFilesize
72KB
-
memory/2612-1057-0x00000000057C0000-0x00000000057FE000-memory.dmpFilesize
248KB
-
memory/2612-1058-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB
-
memory/2612-1059-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/2612-1061-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/2612-1062-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/2612-1063-0x0000000005AA0000-0x0000000005B32000-memory.dmpFilesize
584KB
-
memory/2612-1064-0x0000000005B40000-0x0000000005BA6000-memory.dmpFilesize
408KB
-
memory/2612-1065-0x0000000006240000-0x0000000006402000-memory.dmpFilesize
1.8MB
-
memory/2612-141-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/2612-1066-0x0000000006410000-0x000000000693C000-memory.dmpFilesize
5.2MB
-
memory/2612-1067-0x0000000006CC0000-0x0000000006D36000-memory.dmpFilesize
472KB
-
memory/2612-1068-0x0000000006D40000-0x0000000006D90000-memory.dmpFilesize
320KB
-
memory/2612-1069-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB