Analysis
-
max time kernel
71s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:43
Static task
static1
Behavioral task
behavioral1
Sample
ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe
Resource
win10-20230220-en
General
-
Target
ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe
-
Size
521KB
-
MD5
4a88fd0cbf518859cc3d10db425b342d
-
SHA1
6581770b039f316b5851695f2b166b3a67dd533d
-
SHA256
ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb
-
SHA512
a0b3e260a9d89687572e64dbf98963eb098c0eff7e2e53d8c59365f845e9fc92bde39bb86bc06d4f39a269e71e716fb18f5e4040e9c6f9ec7cb1e1157a745db4
-
SSDEEP
12288:/Mrvy902zWCnADxSvP6iezoxmyZYITHGB2UM2Tcd:QyLWAXvPKzZybT02UM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr759281.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr759281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr759281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr759281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr759281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr759281.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4900-139-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/4900-145-0x0000000004FB0000-0x0000000004FF4000-memory.dmp family_redline behavioral1/memory/4900-146-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-147-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-149-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-151-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-153-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-155-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-157-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-159-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-161-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-163-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-165-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-167-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-169-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-171-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-173-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-175-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-177-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-179-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-181-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-183-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-185-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-187-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-189-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-191-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-193-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-195-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-197-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-199-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-201-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-203-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-205-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-207-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline behavioral1/memory/4900-209-0x0000000004FB0000-0x0000000004FEF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziJj1617.exejr759281.exeku680035.exelr970089.exepid process 4180 ziJj1617.exe 3916 jr759281.exe 4900 ku680035.exe 1380 lr970089.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr759281.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr759281.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exeziJj1617.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJj1617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJj1617.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr759281.exeku680035.exelr970089.exepid process 3916 jr759281.exe 3916 jr759281.exe 4900 ku680035.exe 4900 ku680035.exe 1380 lr970089.exe 1380 lr970089.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr759281.exeku680035.exelr970089.exedescription pid process Token: SeDebugPrivilege 3916 jr759281.exe Token: SeDebugPrivilege 4900 ku680035.exe Token: SeDebugPrivilege 1380 lr970089.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exeziJj1617.exedescription pid process target process PID 3640 wrote to memory of 4180 3640 ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe ziJj1617.exe PID 3640 wrote to memory of 4180 3640 ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe ziJj1617.exe PID 3640 wrote to memory of 4180 3640 ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe ziJj1617.exe PID 4180 wrote to memory of 3916 4180 ziJj1617.exe jr759281.exe PID 4180 wrote to memory of 3916 4180 ziJj1617.exe jr759281.exe PID 4180 wrote to memory of 4900 4180 ziJj1617.exe ku680035.exe PID 4180 wrote to memory of 4900 4180 ziJj1617.exe ku680035.exe PID 4180 wrote to memory of 4900 4180 ziJj1617.exe ku680035.exe PID 3640 wrote to memory of 1380 3640 ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe lr970089.exe PID 3640 wrote to memory of 1380 3640 ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe lr970089.exe PID 3640 wrote to memory of 1380 3640 ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe lr970089.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe"C:\Users\Admin\AppData\Local\Temp\ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exeFilesize
175KB
MD5e09d77ae676b6a47e957f0c24cd11730
SHA143f72c52a13242f064b721c5f778159efb32a3b0
SHA256a25b44e1fadc8bc776afec4b63b296ca9b39dc9c38c796d3b654848e517c8ca4
SHA51231c220fc6eabe5a577def025ab509039251e0fb86d63b6349758fb99d95b1e1ebca4a5d1bf49696282e9e3fac3d16e2c32108453813dad3172fa5ceb36773b1a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exeFilesize
175KB
MD5e09d77ae676b6a47e957f0c24cd11730
SHA143f72c52a13242f064b721c5f778159efb32a3b0
SHA256a25b44e1fadc8bc776afec4b63b296ca9b39dc9c38c796d3b654848e517c8ca4
SHA51231c220fc6eabe5a577def025ab509039251e0fb86d63b6349758fb99d95b1e1ebca4a5d1bf49696282e9e3fac3d16e2c32108453813dad3172fa5ceb36773b1a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exeFilesize
379KB
MD590b609c9594d0e03d51237c1d8e3eb05
SHA105f7b31028394b503ea77e12f9f9cfcac0366863
SHA2569626267afb98f0687a0a9e58de8ffc2334895c1b5759c7e23612979148841d9f
SHA512ec180f30520e13bcc517a92576a9edcf10e5b83d0efbb37abbc1f5ad12f5b1b7f1333795dcf097b5d75195c8b6cf75015ed5b5be8644a4c6f0be815052ff0912
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exeFilesize
379KB
MD590b609c9594d0e03d51237c1d8e3eb05
SHA105f7b31028394b503ea77e12f9f9cfcac0366863
SHA2569626267afb98f0687a0a9e58de8ffc2334895c1b5759c7e23612979148841d9f
SHA512ec180f30520e13bcc517a92576a9edcf10e5b83d0efbb37abbc1f5ad12f5b1b7f1333795dcf097b5d75195c8b6cf75015ed5b5be8644a4c6f0be815052ff0912
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exeFilesize
11KB
MD5fcba57eb912a7429130882cf3940ccfb
SHA10af826f6a222e0033524f0dab2b1c60d53779def
SHA256fbcd91c7e4806d9d688704776587472211b8a4ed797a19635ea396346ed8307b
SHA51281103e327c575d6373b45e68b48aaa24d3ddab2d736e484a75f54f7a594b9fb8b574f2a47e1ac553c8f0f3d8d608118406d6dc41aa20e8817b94e969dae8e4a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exeFilesize
11KB
MD5fcba57eb912a7429130882cf3940ccfb
SHA10af826f6a222e0033524f0dab2b1c60d53779def
SHA256fbcd91c7e4806d9d688704776587472211b8a4ed797a19635ea396346ed8307b
SHA51281103e327c575d6373b45e68b48aaa24d3ddab2d736e484a75f54f7a594b9fb8b574f2a47e1ac553c8f0f3d8d608118406d6dc41aa20e8817b94e969dae8e4a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exeFilesize
294KB
MD510af2267e442db4274f5e4b473409191
SHA1d2e784b3fa76c8029436fb6bde31188c9ecaa836
SHA2561a25e83fed6414bbbd8781160dcc926d50134a5e016eca673b8d14ec4e5f6240
SHA5129930d367280fcbc6767ec73515313527a4d7bbf9a998d601b71368399e4ec17a8446bbe9071e56505686d24525c45688ed04467df72e7b10e346eb742032efc2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exeFilesize
294KB
MD510af2267e442db4274f5e4b473409191
SHA1d2e784b3fa76c8029436fb6bde31188c9ecaa836
SHA2561a25e83fed6414bbbd8781160dcc926d50134a5e016eca673b8d14ec4e5f6240
SHA5129930d367280fcbc6767ec73515313527a4d7bbf9a998d601b71368399e4ec17a8446bbe9071e56505686d24525c45688ed04467df72e7b10e346eb742032efc2
-
memory/1380-1074-0x0000000000110000-0x0000000000142000-memory.dmpFilesize
200KB
-
memory/1380-1076-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/1380-1077-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/1380-1075-0x0000000004B50000-0x0000000004B9B000-memory.dmpFilesize
300KB
-
memory/3916-133-0x0000000000BE0000-0x0000000000BEA000-memory.dmpFilesize
40KB
-
memory/4900-177-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-189-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-144-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-143-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-145-0x0000000004FB0000-0x0000000004FF4000-memory.dmpFilesize
272KB
-
memory/4900-146-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-147-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-149-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-151-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-153-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-155-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-157-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-159-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-161-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-163-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-165-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-167-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-169-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-171-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-173-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-175-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-140-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/4900-179-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-181-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-183-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-185-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-187-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-142-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-191-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-193-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-195-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-197-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-199-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-201-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-203-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-205-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-207-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-209-0x0000000004FB0000-0x0000000004FEF000-memory.dmpFilesize
252KB
-
memory/4900-1052-0x0000000005600000-0x0000000005C06000-memory.dmpFilesize
6.0MB
-
memory/4900-1053-0x0000000005050000-0x000000000515A000-memory.dmpFilesize
1.0MB
-
memory/4900-1054-0x0000000005190000-0x00000000051A2000-memory.dmpFilesize
72KB
-
memory/4900-1055-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-1056-0x00000000051B0000-0x00000000051EE000-memory.dmpFilesize
248KB
-
memory/4900-1057-0x0000000005300000-0x000000000534B000-memory.dmpFilesize
300KB
-
memory/4900-1059-0x0000000005490000-0x00000000054F6000-memory.dmpFilesize
408KB
-
memory/4900-1060-0x0000000006160000-0x00000000061F2000-memory.dmpFilesize
584KB
-
memory/4900-1061-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-1062-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-1063-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-1064-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/4900-141-0x0000000004AB0000-0x0000000004FAE000-memory.dmpFilesize
5.0MB
-
memory/4900-139-0x00000000023D0000-0x0000000002416000-memory.dmpFilesize
280KB
-
memory/4900-1065-0x0000000006390000-0x0000000006552000-memory.dmpFilesize
1.8MB
-
memory/4900-1066-0x0000000006570000-0x0000000006A9C000-memory.dmpFilesize
5.2MB
-
memory/4900-1067-0x0000000004570000-0x00000000045E6000-memory.dmpFilesize
472KB
-
memory/4900-1068-0x0000000007FA0000-0x0000000007FF0000-memory.dmpFilesize
320KB