Analysis
-
max time kernel
53s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 19:38
Static task
static1
Behavioral task
behavioral1
Sample
b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe
Resource
win10-20230220-en
General
-
Target
b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe
-
Size
521KB
-
MD5
b6d82a516e43db23915cc559cd1d8e10
-
SHA1
ba0da324aab98830c740e1ce4d652fe758fd482f
-
SHA256
b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089
-
SHA512
d64f6ed43d3e8e03fbcfc4c795771dd49b26b80807a3d14133b2f455b1f4a6a28e4ad6552ed435dfc332f8237cc86c7efb7aec4d72a602acc11ee6ebf6ed8ba7
-
SSDEEP
12288:DMrJy907r1qz2hXkEH9sJtY8yu44vzWa+bzzh1iATu:eyEgqhvH65yH46a+Xj6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr637139.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr637139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr637139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr637139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr637139.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr637139.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2080-140-0x0000000002060000-0x00000000020A6000-memory.dmp family_redline behavioral1/memory/2080-142-0x0000000002250000-0x0000000002294000-memory.dmp family_redline behavioral1/memory/2080-143-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-144-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-148-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-146-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-150-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-152-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-154-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-156-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-158-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-160-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-162-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-164-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-171-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-173-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-169-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-175-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-177-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-179-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-181-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-183-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-185-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-189-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-187-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-191-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-193-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-195-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-197-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-199-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-201-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-203-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-205-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-207-0x0000000002250000-0x000000000228F000-memory.dmp family_redline behavioral1/memory/2080-209-0x0000000002250000-0x000000000228F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziRU7286.exejr637139.exeku629072.exelr931035.exepid process 3984 ziRU7286.exe 4924 jr637139.exe 2080 ku629072.exe 4828 lr931035.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr637139.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr637139.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ziRU7286.exeb4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRU7286.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRU7286.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr637139.exeku629072.exelr931035.exepid process 4924 jr637139.exe 4924 jr637139.exe 2080 ku629072.exe 2080 ku629072.exe 4828 lr931035.exe 4828 lr931035.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr637139.exeku629072.exelr931035.exedescription pid process Token: SeDebugPrivilege 4924 jr637139.exe Token: SeDebugPrivilege 2080 ku629072.exe Token: SeDebugPrivilege 4828 lr931035.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exeziRU7286.exedescription pid process target process PID 376 wrote to memory of 3984 376 b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe ziRU7286.exe PID 376 wrote to memory of 3984 376 b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe ziRU7286.exe PID 376 wrote to memory of 3984 376 b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe ziRU7286.exe PID 3984 wrote to memory of 4924 3984 ziRU7286.exe jr637139.exe PID 3984 wrote to memory of 4924 3984 ziRU7286.exe jr637139.exe PID 3984 wrote to memory of 2080 3984 ziRU7286.exe ku629072.exe PID 3984 wrote to memory of 2080 3984 ziRU7286.exe ku629072.exe PID 3984 wrote to memory of 2080 3984 ziRU7286.exe ku629072.exe PID 376 wrote to memory of 4828 376 b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe lr931035.exe PID 376 wrote to memory of 4828 376 b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe lr931035.exe PID 376 wrote to memory of 4828 376 b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe lr931035.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe"C:\Users\Admin\AppData\Local\Temp\b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRU7286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRU7286.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr637139.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr637139.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku629072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku629072.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr931035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr931035.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bd754101b178f5dcb67f47eff40887f0
SHA1ba8b8de34afc48f2e9557482fb2096887b5a341e
SHA2561086e0b6d21a4450b133598c6e6e096db654257b851b003558b9abeafa2b1355
SHA512d965e6fa93f1f89a90a74fb58c43e7f4ecbf826fe67b65bdbdad73fa940d326af353aebebd5877a9e4b392c88e539a234a8a8f032c72553cab2070c6dda79723
-
Filesize
175KB
MD5bd754101b178f5dcb67f47eff40887f0
SHA1ba8b8de34afc48f2e9557482fb2096887b5a341e
SHA2561086e0b6d21a4450b133598c6e6e096db654257b851b003558b9abeafa2b1355
SHA512d965e6fa93f1f89a90a74fb58c43e7f4ecbf826fe67b65bdbdad73fa940d326af353aebebd5877a9e4b392c88e539a234a8a8f032c72553cab2070c6dda79723
-
Filesize
379KB
MD5fca8c274b8a2af67af5ba35fcc385539
SHA1d7f827832d8a724f6337f0eea48b9a66c7615241
SHA256336489a3002c9b58ff37583afdcb0169309b7fdc0aacc26a69b7580956b8a8da
SHA512e599b9f8f2687a93ae5d49b50f7e0bce9266380cce40a4caeb92d92c64daf94624064e752b6d90e7f38f9ccf95c5d2eea7812723016c3abb0c5a6119d1f9d75c
-
Filesize
379KB
MD5fca8c274b8a2af67af5ba35fcc385539
SHA1d7f827832d8a724f6337f0eea48b9a66c7615241
SHA256336489a3002c9b58ff37583afdcb0169309b7fdc0aacc26a69b7580956b8a8da
SHA512e599b9f8f2687a93ae5d49b50f7e0bce9266380cce40a4caeb92d92c64daf94624064e752b6d90e7f38f9ccf95c5d2eea7812723016c3abb0c5a6119d1f9d75c
-
Filesize
11KB
MD58b6ba4a9bce622ab6c2382f237094790
SHA15aa259129e10b8aebcc3901f358d7691a9c7b489
SHA2565f45ef1c639aa7a86920811f451d3dfd28dda4072095a33f45211a948697f863
SHA51224323f4e99ce982f339585ee3fd38557d17d75082e73db51b98cc07e65486c0a25e917282147123c7f65c5ec472fd4a42fffc7a47c5e6017880635d112bdd7c3
-
Filesize
11KB
MD58b6ba4a9bce622ab6c2382f237094790
SHA15aa259129e10b8aebcc3901f358d7691a9c7b489
SHA2565f45ef1c639aa7a86920811f451d3dfd28dda4072095a33f45211a948697f863
SHA51224323f4e99ce982f339585ee3fd38557d17d75082e73db51b98cc07e65486c0a25e917282147123c7f65c5ec472fd4a42fffc7a47c5e6017880635d112bdd7c3
-
Filesize
294KB
MD56d02a549d095d481f21f71d5ccc34194
SHA16125d0d28dd7943c1eb90b97f4808d2abadf4f47
SHA25605591487d6da44b60e8e8b1e4659f8ebd5e8516b5be6e2c0cf73dac6b62c9a14
SHA5127fc48ac37cc1b50412689aa9d8d2ef0eb7fea751afe8845da338aee894af19108bbe1b2bbda01c41c30e7ffa5c4210be6bad8a3fbe9c1e0c65ebebb88fcb122a
-
Filesize
294KB
MD56d02a549d095d481f21f71d5ccc34194
SHA16125d0d28dd7943c1eb90b97f4808d2abadf4f47
SHA25605591487d6da44b60e8e8b1e4659f8ebd5e8516b5be6e2c0cf73dac6b62c9a14
SHA5127fc48ac37cc1b50412689aa9d8d2ef0eb7fea751afe8845da338aee894af19108bbe1b2bbda01c41c30e7ffa5c4210be6bad8a3fbe9c1e0c65ebebb88fcb122a