Analysis
-
max time kernel
49s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 19:41
Static task
static1
Behavioral task
behavioral1
Sample
05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe
Resource
win10-20230220-en
General
-
Target
05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe
-
Size
521KB
-
MD5
9bc8a158876f9dccb9992e68856c8265
-
SHA1
5e983d0a48702f1e151933c49ffb27b60c9357fa
-
SHA256
05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29
-
SHA512
173718cc0e7298df5b9fd602493abe2c091a3d1b042654b1b156b2653a2b62c32eefbe8efbdae2a3f6d38289b02852f2a58c935f5ccb8c2e547082f3e992d543
-
SSDEEP
12288:/Mr5y90zjHL8LFoATYQ8jQ0WzgH8Xyt86x4b/zWKbPGHiyz:WyWHLeZ8k0WzsZK66bKKiCyz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr032348.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr032348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr032348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr032348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr032348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr032348.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2144-136-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral1/memory/2144-138-0x0000000004F30000-0x0000000004F74000-memory.dmp family_redline behavioral1/memory/2144-143-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-144-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-146-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-148-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-150-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-152-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-154-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-156-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-158-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-160-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-162-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-164-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-166-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-168-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-170-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-172-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-174-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-176-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-178-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-180-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-182-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-184-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-186-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-188-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-190-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-192-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-194-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-196-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-198-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-200-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-202-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-204-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2144-206-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zidX1477.exejr032348.exeku109480.exelr575838.exepid process 4440 zidX1477.exe 4860 jr032348.exe 2144 ku109480.exe 4700 lr575838.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr032348.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr032348.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exezidX1477.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidX1477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidX1477.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr032348.exeku109480.exelr575838.exepid process 4860 jr032348.exe 4860 jr032348.exe 2144 ku109480.exe 2144 ku109480.exe 4700 lr575838.exe 4700 lr575838.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr032348.exeku109480.exelr575838.exedescription pid process Token: SeDebugPrivilege 4860 jr032348.exe Token: SeDebugPrivilege 2144 ku109480.exe Token: SeDebugPrivilege 4700 lr575838.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exezidX1477.exedescription pid process target process PID 2568 wrote to memory of 4440 2568 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe zidX1477.exe PID 2568 wrote to memory of 4440 2568 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe zidX1477.exe PID 2568 wrote to memory of 4440 2568 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe zidX1477.exe PID 4440 wrote to memory of 4860 4440 zidX1477.exe jr032348.exe PID 4440 wrote to memory of 4860 4440 zidX1477.exe jr032348.exe PID 4440 wrote to memory of 2144 4440 zidX1477.exe ku109480.exe PID 4440 wrote to memory of 2144 4440 zidX1477.exe ku109480.exe PID 4440 wrote to memory of 2144 4440 zidX1477.exe ku109480.exe PID 2568 wrote to memory of 4700 2568 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe lr575838.exe PID 2568 wrote to memory of 4700 2568 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe lr575838.exe PID 2568 wrote to memory of 4700 2568 05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe lr575838.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe"C:\Users\Admin\AppData\Local\Temp\05fe1807eab970572d56c755955dd2f0231d6b3f5fb0baab6be15b77c99a3f29.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidX1477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidX1477.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032348.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku109480.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku109480.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr575838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr575838.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53aab8b534a12ba84f0e87d13245ace0d
SHA178559997b83643ba519d9b4e1a5e7156edf439f6
SHA2560d504e3cb35e2b917f8eeb1ed30663ef6dced8af2d07b1a677db686e30787265
SHA5123f46d5a295333db475dceaf8218a72eb3966797dbe87f70ee19bf7e3a3cb4e29cecfa0489538a58bdd663533cf737c26c5758821c4b407af3c7c24ec48428b09
-
Filesize
175KB
MD53aab8b534a12ba84f0e87d13245ace0d
SHA178559997b83643ba519d9b4e1a5e7156edf439f6
SHA2560d504e3cb35e2b917f8eeb1ed30663ef6dced8af2d07b1a677db686e30787265
SHA5123f46d5a295333db475dceaf8218a72eb3966797dbe87f70ee19bf7e3a3cb4e29cecfa0489538a58bdd663533cf737c26c5758821c4b407af3c7c24ec48428b09
-
Filesize
379KB
MD56dddef64b59f299f0270974e4fed4673
SHA1bc8b468dbc7f61a25d5984998410191394f2cb71
SHA2564ef4e23450da3fc04ca7c10840c3828165dd6168fc697842e9e783da22905142
SHA512f8adff650973664d0bd64832a763bfed6fed53f7151d74579d2e060b25ae54b4da4ef58965f3ee2a19d24ce9a83979c02d270f7885bed4356dfdd01ae36331b4
-
Filesize
379KB
MD56dddef64b59f299f0270974e4fed4673
SHA1bc8b468dbc7f61a25d5984998410191394f2cb71
SHA2564ef4e23450da3fc04ca7c10840c3828165dd6168fc697842e9e783da22905142
SHA512f8adff650973664d0bd64832a763bfed6fed53f7151d74579d2e060b25ae54b4da4ef58965f3ee2a19d24ce9a83979c02d270f7885bed4356dfdd01ae36331b4
-
Filesize
11KB
MD56fd0be63aa8a65b2493c4b3603bce8d0
SHA18c863c4fdbec6bba661c64d9029a1a33f69b5abc
SHA256a072db61cc4dbd41317f758378435870693812c3f2d431ef69188d49bb01bb5c
SHA5128efed7997bc25b4b3949b7dd588ba872b17dc8d01d43a60c8fcb32b9380a165765389ecae5389c1305be494044aa63ccb024566938820523dd0bd50bbcc1be1b
-
Filesize
11KB
MD56fd0be63aa8a65b2493c4b3603bce8d0
SHA18c863c4fdbec6bba661c64d9029a1a33f69b5abc
SHA256a072db61cc4dbd41317f758378435870693812c3f2d431ef69188d49bb01bb5c
SHA5128efed7997bc25b4b3949b7dd588ba872b17dc8d01d43a60c8fcb32b9380a165765389ecae5389c1305be494044aa63ccb024566938820523dd0bd50bbcc1be1b
-
Filesize
294KB
MD5e7072026328977d37fa1ba97cc1a1283
SHA1b4697bc8108a0c069e97ae796768562cfaeb0097
SHA256ed78d18d538be29cefc1bc4e257c986423e01322bd5e75037d84a2be9cd24a71
SHA512c4f94bfab26cf7783ba8409bfa803010b6510d791e2922a8470676ddd1fdc99360e39a91b5ce1e1358dbeb36341e1f1d291f64af3712e7d71873f0cd70fc7bf2
-
Filesize
294KB
MD5e7072026328977d37fa1ba97cc1a1283
SHA1b4697bc8108a0c069e97ae796768562cfaeb0097
SHA256ed78d18d538be29cefc1bc4e257c986423e01322bd5e75037d84a2be9cd24a71
SHA512c4f94bfab26cf7783ba8409bfa803010b6510d791e2922a8470676ddd1fdc99360e39a91b5ce1e1358dbeb36341e1f1d291f64af3712e7d71873f0cd70fc7bf2