Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe
Resource
win10-20230220-en
General
-
Target
5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe
-
Size
521KB
-
MD5
1977bb6592b7c48dbaf104b2e8f4812f
-
SHA1
3cdfee1e9054294803eeadef2c2d4eca5763e558
-
SHA256
5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f
-
SHA512
36c3eca51200ff3709bb85c35de9f6a8b5803983beb2571a28c16790ccd560c7203ce2ead8059a1019fe7524a5a67c7a28f20b3a805d3cc619540fbc97f156b8
-
SSDEEP
12288:tMrLy90A+RW0rVBhX2fHHn8BPompYfmIyb4:+yirbZucBPowQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr695552.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr695552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr695552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr695552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr695552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr695552.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1588-141-0x0000000002240000-0x0000000002286000-memory.dmp family_redline behavioral1/memory/1588-147-0x00000000023D0000-0x0000000002414000-memory.dmp family_redline behavioral1/memory/1588-148-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-149-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-151-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-153-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-155-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-157-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-159-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-161-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-163-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-165-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-167-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-169-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-171-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-173-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-175-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-177-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-179-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-181-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-183-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-185-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-187-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-189-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-191-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-193-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-195-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-197-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-199-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-201-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-203-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-205-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-207-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-209-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline behavioral1/memory/1588-211-0x00000000023D0000-0x000000000240F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziBB1531.exejr695552.exeku956009.exelr557699.exepid process 1168 ziBB1531.exe 4972 jr695552.exe 1588 ku956009.exe 1076 lr557699.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr695552.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr695552.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziBB1531.exe5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziBB1531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBB1531.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr695552.exeku956009.exelr557699.exepid process 4972 jr695552.exe 4972 jr695552.exe 1588 ku956009.exe 1588 ku956009.exe 1076 lr557699.exe 1076 lr557699.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr695552.exeku956009.exelr557699.exedescription pid process Token: SeDebugPrivilege 4972 jr695552.exe Token: SeDebugPrivilege 1588 ku956009.exe Token: SeDebugPrivilege 1076 lr557699.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exeziBB1531.exedescription pid process target process PID 708 wrote to memory of 1168 708 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe ziBB1531.exe PID 708 wrote to memory of 1168 708 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe ziBB1531.exe PID 708 wrote to memory of 1168 708 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe ziBB1531.exe PID 1168 wrote to memory of 4972 1168 ziBB1531.exe jr695552.exe PID 1168 wrote to memory of 4972 1168 ziBB1531.exe jr695552.exe PID 1168 wrote to memory of 1588 1168 ziBB1531.exe ku956009.exe PID 1168 wrote to memory of 1588 1168 ziBB1531.exe ku956009.exe PID 1168 wrote to memory of 1588 1168 ziBB1531.exe ku956009.exe PID 708 wrote to memory of 1076 708 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe lr557699.exe PID 708 wrote to memory of 1076 708 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe lr557699.exe PID 708 wrote to memory of 1076 708 5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe lr557699.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe"C:\Users\Admin\AppData\Local\Temp\5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBB1531.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBB1531.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr695552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr695552.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956009.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557699.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5585250fbd34b21e84c46b2de0f43dded
SHA18f2e17ade0bc19690d66290df9c261dbaddc5224
SHA256f07451b2edb347203b6f247369cd3575db750be968bd113011bb94e08cf82541
SHA512b8465d478c85359815b86cebf0f4f6d191c9b956a09aef497daba34b9bec54cc26d8b495ed6c235c16d0dde57361fde301e9a877dbe77b1beaa446394c27dd48
-
Filesize
175KB
MD5585250fbd34b21e84c46b2de0f43dded
SHA18f2e17ade0bc19690d66290df9c261dbaddc5224
SHA256f07451b2edb347203b6f247369cd3575db750be968bd113011bb94e08cf82541
SHA512b8465d478c85359815b86cebf0f4f6d191c9b956a09aef497daba34b9bec54cc26d8b495ed6c235c16d0dde57361fde301e9a877dbe77b1beaa446394c27dd48
-
Filesize
379KB
MD58e39c53fa9f63915e0ca731e4788e47d
SHA167dac1509d14b48e3583f671e98dbc9213f6432f
SHA25630232078751e20de173d75bea4f83137db2d0dbeea54297260bd38d750682b21
SHA512a5d4fc40bbfd8357a544ff87906f9dea4b14d035b7347675c7efc63615fba96e0da27789208c007a6fa00e53a8a1692f5c21f8eaf46e36dd5171cfe8e4903171
-
Filesize
379KB
MD58e39c53fa9f63915e0ca731e4788e47d
SHA167dac1509d14b48e3583f671e98dbc9213f6432f
SHA25630232078751e20de173d75bea4f83137db2d0dbeea54297260bd38d750682b21
SHA512a5d4fc40bbfd8357a544ff87906f9dea4b14d035b7347675c7efc63615fba96e0da27789208c007a6fa00e53a8a1692f5c21f8eaf46e36dd5171cfe8e4903171
-
Filesize
11KB
MD511a1ba6e28be263b50495e9a47f16a19
SHA1850f8ef1d5f2f175139d2695527b2a5df884dc22
SHA256a54c0739c864ce9abf353c292826393288656323ee726abf1e5ac365970f1039
SHA512ad70264fb2b4b20b6c46a8994ad6dd263c10d5be0e615abdc50fa65a144c8707a1e461933ed895b02b342aecb6395a16fa5ea714a760333573b8d19dc6c54e3d
-
Filesize
11KB
MD511a1ba6e28be263b50495e9a47f16a19
SHA1850f8ef1d5f2f175139d2695527b2a5df884dc22
SHA256a54c0739c864ce9abf353c292826393288656323ee726abf1e5ac365970f1039
SHA512ad70264fb2b4b20b6c46a8994ad6dd263c10d5be0e615abdc50fa65a144c8707a1e461933ed895b02b342aecb6395a16fa5ea714a760333573b8d19dc6c54e3d
-
Filesize
294KB
MD5a7fbd9625f9141a21737c4ad241ffa55
SHA106293c158b3982a85a6a98bc8250e723bf04c785
SHA256a94850263c9725faa14f8ecf610435aed013085a3ddacfd4dfb0c4c3a71040ad
SHA51259541bf6703a37f605664f52ef5d207cd7d5dbca2fd6a1457a4f394588389f7468a7bade4e9fcb32cf71eb187db3b4c04b7bd50ca4f29b666287168acfb6f10b
-
Filesize
294KB
MD5a7fbd9625f9141a21737c4ad241ffa55
SHA106293c158b3982a85a6a98bc8250e723bf04c785
SHA256a94850263c9725faa14f8ecf610435aed013085a3ddacfd4dfb0c4c3a71040ad
SHA51259541bf6703a37f605664f52ef5d207cd7d5dbca2fd6a1457a4f394588389f7468a7bade4e9fcb32cf71eb187db3b4c04b7bd50ca4f29b666287168acfb6f10b