Analysis
-
max time kernel
70s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 20:15
Static task
static1
Behavioral task
behavioral1
Sample
d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe
Resource
win10-20230220-en
General
-
Target
d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe
-
Size
522KB
-
MD5
450d62e09fc7f8932c284759a91821b7
-
SHA1
95502d5a441623052b6ebd86188eb3ba2bcd1a52
-
SHA256
d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb
-
SHA512
1c35bfcce4e09323917a3a711ab8ae13363c5db99de6b8c55855062149ee89d90096be7b57c7bc4126b56ee48a1fc72adfc242bb103996d3f05c99d69d8f11e2
-
SSDEEP
12288:ZMr7y90TXZGplPFQln8AN4sYzWKOVxvWdpO:qyIZGbdAOsRKBpO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr918378.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr918378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr918378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr918378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr918378.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr918378.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-140-0x0000000002640000-0x0000000002686000-memory.dmp family_redline behavioral1/memory/4824-142-0x0000000004A20000-0x0000000004A64000-memory.dmp family_redline behavioral1/memory/4824-147-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-150-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-152-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-154-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-148-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-156-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-158-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-160-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-162-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-164-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-166-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-172-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-170-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-168-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-174-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-176-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-178-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-180-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-182-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-184-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-186-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-188-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-190-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-192-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-194-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-196-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-198-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-200-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-202-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-204-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-206-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-208-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline behavioral1/memory/4824-210-0x0000000004A20000-0x0000000004A5F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziJC6595.exejr918378.exeku427726.exelr141946.exepid process 3980 ziJC6595.exe 4684 jr918378.exe 4824 ku427726.exe 4444 lr141946.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr918378.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr918378.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exeziJC6595.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJC6595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJC6595.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr918378.exeku427726.exelr141946.exepid process 4684 jr918378.exe 4684 jr918378.exe 4824 ku427726.exe 4824 ku427726.exe 4444 lr141946.exe 4444 lr141946.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr918378.exeku427726.exelr141946.exedescription pid process Token: SeDebugPrivilege 4684 jr918378.exe Token: SeDebugPrivilege 4824 ku427726.exe Token: SeDebugPrivilege 4444 lr141946.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exeziJC6595.exedescription pid process target process PID 4136 wrote to memory of 3980 4136 d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe ziJC6595.exe PID 4136 wrote to memory of 3980 4136 d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe ziJC6595.exe PID 4136 wrote to memory of 3980 4136 d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe ziJC6595.exe PID 3980 wrote to memory of 4684 3980 ziJC6595.exe jr918378.exe PID 3980 wrote to memory of 4684 3980 ziJC6595.exe jr918378.exe PID 3980 wrote to memory of 4824 3980 ziJC6595.exe ku427726.exe PID 3980 wrote to memory of 4824 3980 ziJC6595.exe ku427726.exe PID 3980 wrote to memory of 4824 3980 ziJC6595.exe ku427726.exe PID 4136 wrote to memory of 4444 4136 d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe lr141946.exe PID 4136 wrote to memory of 4444 4136 d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe lr141946.exe PID 4136 wrote to memory of 4444 4136 d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe lr141946.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe"C:\Users\Admin\AppData\Local\Temp\d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exeFilesize
175KB
MD59770df88484fb6ea91fdadf5c7f3efb5
SHA14923f243fba5b8c3a41d7e27b9840527d778be35
SHA256274b57cd281fe6632d0152574b6e35e9a7f2ee00e624faba7e4f555f8c445ea3
SHA51240f1ab4fe210cdd66481873af927025ea5a40473f93a51613786d500b753dfe57774ca408709ebafb4f3f32763699fa414a8a8d4f2ce53f33aff0628fef09aa6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exeFilesize
175KB
MD59770df88484fb6ea91fdadf5c7f3efb5
SHA14923f243fba5b8c3a41d7e27b9840527d778be35
SHA256274b57cd281fe6632d0152574b6e35e9a7f2ee00e624faba7e4f555f8c445ea3
SHA51240f1ab4fe210cdd66481873af927025ea5a40473f93a51613786d500b753dfe57774ca408709ebafb4f3f32763699fa414a8a8d4f2ce53f33aff0628fef09aa6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exeFilesize
380KB
MD59cdc8d060990703f3297401007436648
SHA1c72a46519929a8337a2daec8b3df717dcac15f95
SHA256ce906ba112598361f240fb98c9618e2d54720b9cda5535cda75f90731de74200
SHA512aaa91e17908c73980b5517a99446b527278b7d7b632d33d4ff8d62b2bab3e60ef5b1fa382ea107fb33eb5dc3c49c906ea6cf995c03a1d8fc22ad88371e9bd5c7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exeFilesize
380KB
MD59cdc8d060990703f3297401007436648
SHA1c72a46519929a8337a2daec8b3df717dcac15f95
SHA256ce906ba112598361f240fb98c9618e2d54720b9cda5535cda75f90731de74200
SHA512aaa91e17908c73980b5517a99446b527278b7d7b632d33d4ff8d62b2bab3e60ef5b1fa382ea107fb33eb5dc3c49c906ea6cf995c03a1d8fc22ad88371e9bd5c7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exeFilesize
15KB
MD51a95f5ee01ce7a6d4851887e8694e2fd
SHA1d6f2cce7e7090d53081dea2f86e4071d43da6a50
SHA256237db52ece87f127f6d81244560ebd2b7ce5e56ea1fd988124fc61cf20abf469
SHA512f9eb8ecffdc507203612d4d98fa57effd2253e59eee40a53391ae12ab5f8abfce83e7d29fd22a94a43b3ef77aa7784c79c0a786516c5a5bcb7f1ce0ff036ef6c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exeFilesize
15KB
MD51a95f5ee01ce7a6d4851887e8694e2fd
SHA1d6f2cce7e7090d53081dea2f86e4071d43da6a50
SHA256237db52ece87f127f6d81244560ebd2b7ce5e56ea1fd988124fc61cf20abf469
SHA512f9eb8ecffdc507203612d4d98fa57effd2253e59eee40a53391ae12ab5f8abfce83e7d29fd22a94a43b3ef77aa7784c79c0a786516c5a5bcb7f1ce0ff036ef6c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exeFilesize
294KB
MD588ee114179aa0a4a065926de816921f0
SHA1f0eb680ef4ce04ea9167c8ebefa7bcb215b5747e
SHA256f29d2758862b2b6aa759ca01679f3c930f4da28775d31124a62b75bb2b58831c
SHA512a2edc44bbeda7bac62907befd96d02b099cae4d41bf530d0648a6e7943e8ddf859610a90256c708e7d47e92f15c8330ba491ad80299354118afc07381f2340d0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exeFilesize
294KB
MD588ee114179aa0a4a065926de816921f0
SHA1f0eb680ef4ce04ea9167c8ebefa7bcb215b5747e
SHA256f29d2758862b2b6aa759ca01679f3c930f4da28775d31124a62b75bb2b58831c
SHA512a2edc44bbeda7bac62907befd96d02b099cae4d41bf530d0648a6e7943e8ddf859610a90256c708e7d47e92f15c8330ba491ad80299354118afc07381f2340d0
-
memory/4444-1075-0x00000000007C0000-0x00000000007F2000-memory.dmpFilesize
200KB
-
memory/4444-1076-0x0000000005200000-0x000000000524B000-memory.dmpFilesize
300KB
-
memory/4444-1077-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB
-
memory/4684-134-0x0000000000690000-0x000000000069A000-memory.dmpFilesize
40KB
-
memory/4824-178-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-188-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-143-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/4824-145-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-144-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-146-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-147-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-150-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-152-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-154-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-148-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-156-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-158-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-160-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-162-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-164-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-166-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-172-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-170-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-168-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-174-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-176-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-141-0x0000000004BA0000-0x000000000509E000-memory.dmpFilesize
5.0MB
-
memory/4824-180-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-182-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-184-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-186-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-142-0x0000000004A20000-0x0000000004A64000-memory.dmpFilesize
272KB
-
memory/4824-190-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-192-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-194-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-196-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-198-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-200-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-202-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-204-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-206-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-208-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-210-0x0000000004A20000-0x0000000004A5F000-memory.dmpFilesize
252KB
-
memory/4824-1053-0x00000000051A0000-0x00000000057A6000-memory.dmpFilesize
6.0MB
-
memory/4824-1054-0x00000000057B0000-0x00000000058BA000-memory.dmpFilesize
1.0MB
-
memory/4824-1055-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/4824-1056-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-1057-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/4824-1058-0x0000000005A50000-0x0000000005A9B000-memory.dmpFilesize
300KB
-
memory/4824-1060-0x0000000005BE0000-0x0000000005C72000-memory.dmpFilesize
584KB
-
memory/4824-1061-0x0000000005C80000-0x0000000005CE6000-memory.dmpFilesize
408KB
-
memory/4824-1063-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-1062-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-1064-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-1065-0x0000000006480000-0x00000000064F6000-memory.dmpFilesize
472KB
-
memory/4824-140-0x0000000002640000-0x0000000002686000-memory.dmpFilesize
280KB
-
memory/4824-1066-0x0000000006510000-0x0000000006560000-memory.dmpFilesize
320KB
-
memory/4824-1067-0x0000000004B90000-0x0000000004BA0000-memory.dmpFilesize
64KB
-
memory/4824-1068-0x0000000006580000-0x0000000006742000-memory.dmpFilesize
1.8MB
-
memory/4824-1069-0x0000000006750000-0x0000000006C7C000-memory.dmpFilesize
5.2MB