Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 19:36
Static task
static1
Behavioral task
behavioral1
Sample
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe
Resource
win10-20230220-en
General
-
Target
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe
-
Size
522KB
-
MD5
d48698d44239f63c8cb139db6051cb8d
-
SHA1
9e9e24ca9fca36f16d075f390020730a392055cd
-
SHA256
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
SHA512
69fe4d28d0202253c04e383ba0f88134d6ec5e7d8decc68fffa4917b6695fef371ed6bc5768d14ced367f328d916a96cb922d0fd451f27bdda2bf9e4e4a3fd99
-
SSDEEP
12288:LMrny90+w/2HnZ4VBUBgz+Cpmy87c4UlzWK/bU28XlgL:8yA2HOVIn79UYKoDeL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr775088.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr775088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr775088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr775088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr775088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr775088.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4896-142-0x0000000002220000-0x0000000002266000-memory.dmp family_redline behavioral1/memory/4896-144-0x00000000022B0000-0x00000000022F4000-memory.dmp family_redline behavioral1/memory/4896-148-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-149-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-151-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-153-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-155-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-157-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-159-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-161-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-163-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-165-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-167-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-169-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-171-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-175-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-173-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-177-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-179-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-181-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-183-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-185-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-187-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-189-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-191-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-195-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-193-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-197-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-199-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-201-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-203-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-205-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-207-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-209-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline behavioral1/memory/4896-211-0x00000000022B0000-0x00000000022EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziud5676.exejr775088.exeku816328.exelr526584.exepid process 4468 ziud5676.exe 4824 jr775088.exe 4896 ku816328.exe 4296 lr526584.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr775088.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr775088.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exeziud5676.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziud5676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziud5676.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr775088.exeku816328.exelr526584.exepid process 4824 jr775088.exe 4824 jr775088.exe 4896 ku816328.exe 4896 ku816328.exe 4296 lr526584.exe 4296 lr526584.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr775088.exeku816328.exelr526584.exedescription pid process Token: SeDebugPrivilege 4824 jr775088.exe Token: SeDebugPrivilege 4896 ku816328.exe Token: SeDebugPrivilege 4296 lr526584.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exeziud5676.exedescription pid process target process PID 3272 wrote to memory of 4468 3272 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe ziud5676.exe PID 3272 wrote to memory of 4468 3272 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe ziud5676.exe PID 3272 wrote to memory of 4468 3272 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe ziud5676.exe PID 4468 wrote to memory of 4824 4468 ziud5676.exe jr775088.exe PID 4468 wrote to memory of 4824 4468 ziud5676.exe jr775088.exe PID 4468 wrote to memory of 4896 4468 ziud5676.exe ku816328.exe PID 4468 wrote to memory of 4896 4468 ziud5676.exe ku816328.exe PID 4468 wrote to memory of 4896 4468 ziud5676.exe ku816328.exe PID 3272 wrote to memory of 4296 3272 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe lr526584.exe PID 3272 wrote to memory of 4296 3272 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe lr526584.exe PID 3272 wrote to memory of 4296 3272 5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe lr526584.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe"C:\Users\Admin\AppData\Local\Temp\5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud5676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud5676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr775088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr775088.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku816328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku816328.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr526584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr526584.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5897f5936b612000146dcd4cb3c734b12
SHA1769e4ffb002ea541758e1629c5fd7579699d4933
SHA25673c11e687267cfbb561c0933ebce9138e256e211c672f0d3bec8904625e2d5a7
SHA5122b777a376c7e726455a1df125280db7802aa01842983c035a0dccff007ff393117948e22c1856058396837a5b50674ccaa324e7bcb44ccaa9e0b8cde8995d02d
-
Filesize
175KB
MD5897f5936b612000146dcd4cb3c734b12
SHA1769e4ffb002ea541758e1629c5fd7579699d4933
SHA25673c11e687267cfbb561c0933ebce9138e256e211c672f0d3bec8904625e2d5a7
SHA5122b777a376c7e726455a1df125280db7802aa01842983c035a0dccff007ff393117948e22c1856058396837a5b50674ccaa324e7bcb44ccaa9e0b8cde8995d02d
-
Filesize
380KB
MD52149c3d0a560ea3801b8377a41a88478
SHA14069287de369d45b42c8e672b888bc9f1db31365
SHA256948f8b8298d86c7e2de4bad55fa8aa7e251a681971a4ef6f73224fcdc700f658
SHA5128163cd0ed9e4c73da32f951a0d6ec1cbaba27d07f966dcd5102e68a8dc06db6758c1c1054896432563340bac0929278b53b67d029a4d5f2fcb6d2577162e45a0
-
Filesize
380KB
MD52149c3d0a560ea3801b8377a41a88478
SHA14069287de369d45b42c8e672b888bc9f1db31365
SHA256948f8b8298d86c7e2de4bad55fa8aa7e251a681971a4ef6f73224fcdc700f658
SHA5128163cd0ed9e4c73da32f951a0d6ec1cbaba27d07f966dcd5102e68a8dc06db6758c1c1054896432563340bac0929278b53b67d029a4d5f2fcb6d2577162e45a0
-
Filesize
11KB
MD5b604b3149b727efa1d0e58752192d1b1
SHA1a252641a98daf0fa4ab673ce00766062620bacf8
SHA256704a18785d3c052cb6a5c66c3bf458774edd33caac5755f1fb14c8a17192feb2
SHA5122266cf3b4f2355cf936e5bda2fdc2d292e616efffac35b631fc253dfec2a59562fe99ae12415029a5151a333e71233822993b5a3c85233a58ee68d0f653e8275
-
Filesize
11KB
MD5b604b3149b727efa1d0e58752192d1b1
SHA1a252641a98daf0fa4ab673ce00766062620bacf8
SHA256704a18785d3c052cb6a5c66c3bf458774edd33caac5755f1fb14c8a17192feb2
SHA5122266cf3b4f2355cf936e5bda2fdc2d292e616efffac35b631fc253dfec2a59562fe99ae12415029a5151a333e71233822993b5a3c85233a58ee68d0f653e8275
-
Filesize
294KB
MD54db968cb537d603dfa9ad9121385c90d
SHA1e0f5e9f7dc64e018fa650647430751606b17d67d
SHA25618ff60db495ecc35605c0974511950adc8e9a2f756a43ef0b58d9c2c343ae82b
SHA512397ec4f35a11bf5188020765cdcb9275f466e6afbedb79c42465c52ae4613153686e3e3383566403aea06287db897324dcb052c0a68f1a97eac698928dc82e74
-
Filesize
294KB
MD54db968cb537d603dfa9ad9121385c90d
SHA1e0f5e9f7dc64e018fa650647430751606b17d67d
SHA25618ff60db495ecc35605c0974511950adc8e9a2f756a43ef0b58d9c2c343ae82b
SHA512397ec4f35a11bf5188020765cdcb9275f466e6afbedb79c42465c52ae4613153686e3e3383566403aea06287db897324dcb052c0a68f1a97eac698928dc82e74