Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:42
Static task
static1
Behavioral task
behavioral1
Sample
1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe
Resource
win10-20230220-en
General
-
Target
1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe
-
Size
521KB
-
MD5
ef328fa4568a2ad89ed6794d20168461
-
SHA1
aa440580a465b49abdbc5da6a19fa0ebc4b1773b
-
SHA256
1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a
-
SHA512
85d205f33d36bbbcdf2f5ef9affca452bd9663dfe42aeec9cf9fd1aeb695d4148461d422b2cf21c950ec8da3ecf4f9e7d4160db4a65a85d8eac93c1574209dff
-
SSDEEP
12288:kMrHy90E3ZFm0B/DTAtkQpJ5kgK87rTSHjwRa:Ly93Cm/DUSZgjPNRa
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr887463.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr887463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr887463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr887463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr887463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr887463.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3916-141-0x0000000002070000-0x00000000020B6000-memory.dmp family_redline behavioral1/memory/3916-143-0x0000000004A20000-0x0000000004A64000-memory.dmp family_redline behavioral1/memory/3916-144-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-145-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-149-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-159-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-157-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-173-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-175-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-181-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-179-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-183-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-187-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-195-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-193-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-205-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-209-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-207-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-203-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-201-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-199-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-197-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-191-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-189-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-185-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-177-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-171-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-169-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-167-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-165-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-163-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-161-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-155-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-153-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/3916-151-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziWD7696.exejr887463.exeku943519.exelr495310.exepid process 3016 ziWD7696.exe 2968 jr887463.exe 3916 ku943519.exe 3128 lr495310.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr887463.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr887463.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exeziWD7696.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWD7696.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWD7696.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr887463.exeku943519.exelr495310.exepid process 2968 jr887463.exe 2968 jr887463.exe 3916 ku943519.exe 3916 ku943519.exe 3128 lr495310.exe 3128 lr495310.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr887463.exeku943519.exelr495310.exedescription pid process Token: SeDebugPrivilege 2968 jr887463.exe Token: SeDebugPrivilege 3916 ku943519.exe Token: SeDebugPrivilege 3128 lr495310.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exeziWD7696.exedescription pid process target process PID 2408 wrote to memory of 3016 2408 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe ziWD7696.exe PID 2408 wrote to memory of 3016 2408 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe ziWD7696.exe PID 2408 wrote to memory of 3016 2408 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe ziWD7696.exe PID 3016 wrote to memory of 2968 3016 ziWD7696.exe jr887463.exe PID 3016 wrote to memory of 2968 3016 ziWD7696.exe jr887463.exe PID 3016 wrote to memory of 3916 3016 ziWD7696.exe ku943519.exe PID 3016 wrote to memory of 3916 3016 ziWD7696.exe ku943519.exe PID 3016 wrote to memory of 3916 3016 ziWD7696.exe ku943519.exe PID 2408 wrote to memory of 3128 2408 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe lr495310.exe PID 2408 wrote to memory of 3128 2408 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe lr495310.exe PID 2408 wrote to memory of 3128 2408 1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe lr495310.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe"C:\Users\Admin\AppData\Local\Temp\1d9bcc591aca6daea7bf85c9d61b951d962a8b45b4a9ade62010f65aec9af04a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWD7696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWD7696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr887463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr887463.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku943519.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku943519.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr495310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr495310.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr495310.exeFilesize
175KB
MD541a4d7781733f38cbe34d777a406a697
SHA150d349d52edcf6e776dc85e658b146229d1924ec
SHA256645ac92966f370a9da077e2e7c8a8bb54cd38227e988210ddab16b8dbe62837e
SHA512ff5ecac8193c7798304abc4bf4afbaa84cba58e4213b30bf94f249e7af3c09c74c056eb179412ed16bbef4f2f2a2b6c215abc7b0ce9e012944845ac100bfc3ff
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr495310.exeFilesize
175KB
MD541a4d7781733f38cbe34d777a406a697
SHA150d349d52edcf6e776dc85e658b146229d1924ec
SHA256645ac92966f370a9da077e2e7c8a8bb54cd38227e988210ddab16b8dbe62837e
SHA512ff5ecac8193c7798304abc4bf4afbaa84cba58e4213b30bf94f249e7af3c09c74c056eb179412ed16bbef4f2f2a2b6c215abc7b0ce9e012944845ac100bfc3ff
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWD7696.exeFilesize
379KB
MD51991473e9e866d2e7b676f321bbfee5d
SHA1580e57ccdf8ba7fb257402f20492ac404df88563
SHA2561162551110b8c552543f70d367046b0999e312a396ed0bc1f82526fef3ef13d0
SHA5127567dda226eb512d33366368ffab233bce7defa631dc90cbef1f421c83d9582b1db26e72b442a850a994149ec26b0a064ecfa2d3d78fe38e2fb0aaad1dec7d81
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWD7696.exeFilesize
379KB
MD51991473e9e866d2e7b676f321bbfee5d
SHA1580e57ccdf8ba7fb257402f20492ac404df88563
SHA2561162551110b8c552543f70d367046b0999e312a396ed0bc1f82526fef3ef13d0
SHA5127567dda226eb512d33366368ffab233bce7defa631dc90cbef1f421c83d9582b1db26e72b442a850a994149ec26b0a064ecfa2d3d78fe38e2fb0aaad1dec7d81
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr887463.exeFilesize
11KB
MD5a4f89f8dc8ca3450dc0240359e4c002c
SHA15b23c62b34d9adcfdb997a039b29115ba117fd1b
SHA25603454e8aad3ebc11c3a0662fe85773cec8e85d456313438a94f99afc1c2fc42e
SHA5129e8427ac8d39272ffdfed294238fdbfdd3a54ae379ed5a2d3d9acbe9a62ba19cf5b082b11b6f295ecb75da0f15aeb5c377f95198508c5e406e39406b1383bcab
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr887463.exeFilesize
11KB
MD5a4f89f8dc8ca3450dc0240359e4c002c
SHA15b23c62b34d9adcfdb997a039b29115ba117fd1b
SHA25603454e8aad3ebc11c3a0662fe85773cec8e85d456313438a94f99afc1c2fc42e
SHA5129e8427ac8d39272ffdfed294238fdbfdd3a54ae379ed5a2d3d9acbe9a62ba19cf5b082b11b6f295ecb75da0f15aeb5c377f95198508c5e406e39406b1383bcab
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku943519.exeFilesize
294KB
MD5ca8d36bb7a7bf359f20557c5c8408aa7
SHA19f5ac1264f467d95583f363e6bb99267ca39edde
SHA256db9248a8ed7023dd5aea72b91ca57e26f6a44aae943d6cf07c92785c86142d35
SHA51262246165de0db6fc2c86fb5e1527c75816f8dc01ec6c4db2c7ff4082fc107063393aaf48551265c5c649731b79353a67daf7bcd34c62dea2a7b5a037b263e82f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku943519.exeFilesize
294KB
MD5ca8d36bb7a7bf359f20557c5c8408aa7
SHA19f5ac1264f467d95583f363e6bb99267ca39edde
SHA256db9248a8ed7023dd5aea72b91ca57e26f6a44aae943d6cf07c92785c86142d35
SHA51262246165de0db6fc2c86fb5e1527c75816f8dc01ec6c4db2c7ff4082fc107063393aaf48551265c5c649731b79353a67daf7bcd34c62dea2a7b5a037b263e82f
-
memory/2968-135-0x00000000002B0000-0x00000000002BA000-memory.dmpFilesize
40KB
-
memory/3128-1073-0x0000000000420000-0x0000000000452000-memory.dmpFilesize
200KB
-
memory/3128-1074-0x0000000004E60000-0x0000000004EAB000-memory.dmpFilesize
300KB
-
memory/3128-1075-0x0000000004F90000-0x0000000004FA0000-memory.dmpFilesize
64KB
-
memory/3916-203-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-177-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-144-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-145-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-146-0x00000000006D0000-0x000000000071B000-memory.dmpFilesize
300KB
-
memory/3916-148-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/3916-149-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-159-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-157-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-173-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-175-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-181-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-179-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-183-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-187-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-195-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-193-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-205-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-209-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-207-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-142-0x0000000004A70000-0x0000000004F6E000-memory.dmpFilesize
5.0MB
-
memory/3916-201-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-199-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-197-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-191-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-189-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-185-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-143-0x0000000004A20000-0x0000000004A64000-memory.dmpFilesize
272KB
-
memory/3916-171-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-169-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-167-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-165-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-163-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-161-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-155-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-153-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-151-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/3916-1052-0x00000000055E0000-0x0000000005BE6000-memory.dmpFilesize
6.0MB
-
memory/3916-1053-0x0000000005050000-0x000000000515A000-memory.dmpFilesize
1.0MB
-
memory/3916-1054-0x0000000005190000-0x00000000051A2000-memory.dmpFilesize
72KB
-
memory/3916-1055-0x00000000051B0000-0x00000000051EE000-memory.dmpFilesize
248KB
-
memory/3916-1056-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/3916-1057-0x0000000005300000-0x000000000534B000-memory.dmpFilesize
300KB
-
memory/3916-1059-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/3916-1060-0x0000000005530000-0x0000000005596000-memory.dmpFilesize
408KB
-
memory/3916-1061-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/3916-1062-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB
-
memory/3916-1063-0x0000000006340000-0x0000000006502000-memory.dmpFilesize
1.8MB
-
memory/3916-141-0x0000000002070000-0x00000000020B6000-memory.dmpFilesize
280KB
-
memory/3916-1064-0x0000000006520000-0x0000000006A4C000-memory.dmpFilesize
5.2MB
-
memory/3916-1065-0x0000000006B80000-0x0000000006BF6000-memory.dmpFilesize
472KB
-
memory/3916-1066-0x0000000006C10000-0x0000000006C60000-memory.dmpFilesize
320KB
-
memory/3916-1067-0x0000000004A60000-0x0000000004A70000-memory.dmpFilesize
64KB