Analysis
-
max time kernel
64s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 21:22
Static task
static1
Behavioral task
behavioral1
Sample
71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe
Resource
win10-20230220-en
General
-
Target
71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe
-
Size
522KB
-
MD5
fa38f2fc765f39fa951b4521f56dec11
-
SHA1
b69b5cd8619c5356d90905caff700e0172b5a44d
-
SHA256
71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22
-
SHA512
862a6db1fe8c2043e684231b132ae5b11771ac699156f0b6744ad749bde766e38573b4d1d33bcd993106cfabf7c18c2a2789c5949450ae468f787644f37937cc
-
SSDEEP
12288:kMrBy90rQOHmqOX6s3QpTQuzRW8IF4SmzWKGOxuHuohezTX:Nyx88X6ZpT7VIWSfKGPueGb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr187398.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr187398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr187398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr187398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr187398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr187398.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 38 IoCs
Processes:
resource yara_rule behavioral1/memory/4980-138-0x00000000022D0000-0x0000000002316000-memory.dmp family_redline behavioral1/memory/4980-140-0x0000000004A80000-0x0000000004AC4000-memory.dmp family_redline behavioral1/memory/4980-141-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-142-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-144-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-147-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline behavioral1/memory/4980-146-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-148-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline behavioral1/memory/4980-150-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline behavioral1/memory/4980-151-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-153-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-155-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-157-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-159-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-161-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-163-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-165-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-167-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-169-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-171-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-175-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-177-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-179-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-183-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/4980-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zitL5736.exejr187398.exeku985604.exelr473542.exepid process 4144 zitL5736.exe 4568 jr187398.exe 4980 ku985604.exe 956 lr473542.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr187398.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr187398.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exezitL5736.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitL5736.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitL5736.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr187398.exeku985604.exelr473542.exepid process 4568 jr187398.exe 4568 jr187398.exe 4980 ku985604.exe 4980 ku985604.exe 956 lr473542.exe 956 lr473542.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr187398.exeku985604.exelr473542.exedescription pid process Token: SeDebugPrivilege 4568 jr187398.exe Token: SeDebugPrivilege 4980 ku985604.exe Token: SeDebugPrivilege 956 lr473542.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exezitL5736.exedescription pid process target process PID 3520 wrote to memory of 4144 3520 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe zitL5736.exe PID 3520 wrote to memory of 4144 3520 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe zitL5736.exe PID 3520 wrote to memory of 4144 3520 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe zitL5736.exe PID 4144 wrote to memory of 4568 4144 zitL5736.exe jr187398.exe PID 4144 wrote to memory of 4568 4144 zitL5736.exe jr187398.exe PID 4144 wrote to memory of 4980 4144 zitL5736.exe ku985604.exe PID 4144 wrote to memory of 4980 4144 zitL5736.exe ku985604.exe PID 4144 wrote to memory of 4980 4144 zitL5736.exe ku985604.exe PID 3520 wrote to memory of 956 3520 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe lr473542.exe PID 3520 wrote to memory of 956 3520 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe lr473542.exe PID 3520 wrote to memory of 956 3520 71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe lr473542.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe"C:\Users\Admin\AppData\Local\Temp\71bdd53f99660890f5d617c5f15a94a966983f0409f002282bc924d6e4e3ec22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitL5736.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitL5736.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr187398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr187398.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku985604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku985604.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr473542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr473542.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b615e62083a0cbe30de9f8ecba74abf9
SHA11bbdfbc426420ecc6b9e17f73e5a4cb4878bf7e1
SHA256bae14b66513354d3ce58d5ec02242b2bce69488b295268e64c0ae6be982feff3
SHA512d6b5f79c92cff499983750c9a88fbb64e1286d5d74ec342b250e8581de9ea09075bb600fd117614213068b50f6d5737a5e6ac3bb30dad26b898e2f78950162d1
-
Filesize
175KB
MD5b615e62083a0cbe30de9f8ecba74abf9
SHA11bbdfbc426420ecc6b9e17f73e5a4cb4878bf7e1
SHA256bae14b66513354d3ce58d5ec02242b2bce69488b295268e64c0ae6be982feff3
SHA512d6b5f79c92cff499983750c9a88fbb64e1286d5d74ec342b250e8581de9ea09075bb600fd117614213068b50f6d5737a5e6ac3bb30dad26b898e2f78950162d1
-
Filesize
379KB
MD53f808c208aa5e084fa8a9227a138555c
SHA1d92e3ed59962dea6b423c7ee64ca509829f97a30
SHA256582f28e15ceadee4bcc7283414e6f0866dc3b15cf5ee290f6852aff2b870fe88
SHA5125ecebb4cc878e4e5852cf3072331318b350947b2ac46a2b9a63906e4d4a49ea14c317686bc311588c1acf7ec4612eb646a4506bdc2c2dc91b87adb41f8b1315f
-
Filesize
379KB
MD53f808c208aa5e084fa8a9227a138555c
SHA1d92e3ed59962dea6b423c7ee64ca509829f97a30
SHA256582f28e15ceadee4bcc7283414e6f0866dc3b15cf5ee290f6852aff2b870fe88
SHA5125ecebb4cc878e4e5852cf3072331318b350947b2ac46a2b9a63906e4d4a49ea14c317686bc311588c1acf7ec4612eb646a4506bdc2c2dc91b87adb41f8b1315f
-
Filesize
15KB
MD530af13d4ba9671741a2349c77dc6da61
SHA1fb0a5d6693af8f7877bde30865de08d5bc929628
SHA256bfbddbfc382d6e84010ee4ce911391ef8516d4b9da1fb0115c7b01f649c990f7
SHA512de0c676cbc2bdc8edc75b9374c364e8eb758df71f997d915d55fc26ab27ada8ec152db7324e787de72d04607ef45652abf73bdccab2a074a6383f8992a783383
-
Filesize
15KB
MD530af13d4ba9671741a2349c77dc6da61
SHA1fb0a5d6693af8f7877bde30865de08d5bc929628
SHA256bfbddbfc382d6e84010ee4ce911391ef8516d4b9da1fb0115c7b01f649c990f7
SHA512de0c676cbc2bdc8edc75b9374c364e8eb758df71f997d915d55fc26ab27ada8ec152db7324e787de72d04607ef45652abf73bdccab2a074a6383f8992a783383
-
Filesize
294KB
MD5779e2a47616a4ea24b506cac55a88150
SHA1c06f23da4e81b3abe97beab76095dd302d85b2d6
SHA2565b7a5f4e986d765fb3dee0b1b855e6bf74c74bbf87c030e378b0a45d2f600961
SHA51248bc2cb343308e0202e1e0348b96d532e810764155c498df4dd1b4f7dc011a0f5ddac2572fd791fa618fc559bfab9304ccf2c6a4b257cca2a8ed9610151c184a
-
Filesize
294KB
MD5779e2a47616a4ea24b506cac55a88150
SHA1c06f23da4e81b3abe97beab76095dd302d85b2d6
SHA2565b7a5f4e986d765fb3dee0b1b855e6bf74c74bbf87c030e378b0a45d2f600961
SHA51248bc2cb343308e0202e1e0348b96d532e810764155c498df4dd1b4f7dc011a0f5ddac2572fd791fa618fc559bfab9304ccf2c6a4b257cca2a8ed9610151c184a