Analysis
-
max time kernel
53s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 20:50
Static task
static1
Behavioral task
behavioral1
Sample
675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe
Resource
win10-20230220-en
General
-
Target
675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe
-
Size
522KB
-
MD5
814b13fed951a935ca0dd0c69da7ec18
-
SHA1
d8b4789da0dde535151747db5ecfd68bdfd3b2b0
-
SHA256
675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3
-
SHA512
1c493d9b3222f4aa2d2e88f2694666bd3fd66c1490fe453c6f5d48aa6d83528cb51fdfa515f582fadda632fd1a237a06e6a36415ea750cd77b7a42127e831016
-
SSDEEP
12288:VMr6y90bwoIpIpROAzubOmJPd8Nw44OzWKaq4KgFJDa:vy5AlzATaNZ4XKaxva
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr217936.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr217936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr217936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr217936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr217936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr217936.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
Processes:
resource yara_rule behavioral1/memory/2080-137-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/2080-141-0x0000000004FA0000-0x0000000004FE4000-memory.dmp family_redline behavioral1/memory/2080-142-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-143-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-145-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-147-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-149-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-151-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-153-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-155-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-157-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-159-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-161-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-163-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-165-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-167-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-169-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-173-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-175-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-177-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-179-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-181-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-183-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-185-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-187-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-191-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-189-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-193-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-195-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-197-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-199-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-201-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-203-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-205-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-207-0x0000000004FA0000-0x0000000004FDF000-memory.dmp family_redline behavioral1/memory/2080-1059-0x0000000004A90000-0x0000000004AA0000-memory.dmp family_redline behavioral1/memory/2080-1058-0x0000000004A90000-0x0000000004AA0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
zihj7785.exejr217936.exeku376630.exelr428252.exepid process 4188 zihj7785.exe 4376 jr217936.exe 2080 ku376630.exe 2748 lr428252.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr217936.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr217936.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exezihj7785.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihj7785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihj7785.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr217936.exeku376630.exelr428252.exepid process 4376 jr217936.exe 4376 jr217936.exe 2080 ku376630.exe 2080 ku376630.exe 2748 lr428252.exe 2748 lr428252.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr217936.exeku376630.exelr428252.exedescription pid process Token: SeDebugPrivilege 4376 jr217936.exe Token: SeDebugPrivilege 2080 ku376630.exe Token: SeDebugPrivilege 2748 lr428252.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exezihj7785.exedescription pid process target process PID 3540 wrote to memory of 4188 3540 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe zihj7785.exe PID 3540 wrote to memory of 4188 3540 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe zihj7785.exe PID 3540 wrote to memory of 4188 3540 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe zihj7785.exe PID 4188 wrote to memory of 4376 4188 zihj7785.exe jr217936.exe PID 4188 wrote to memory of 4376 4188 zihj7785.exe jr217936.exe PID 4188 wrote to memory of 2080 4188 zihj7785.exe ku376630.exe PID 4188 wrote to memory of 2080 4188 zihj7785.exe ku376630.exe PID 4188 wrote to memory of 2080 4188 zihj7785.exe ku376630.exe PID 3540 wrote to memory of 2748 3540 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe lr428252.exe PID 3540 wrote to memory of 2748 3540 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe lr428252.exe PID 3540 wrote to memory of 2748 3540 675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe lr428252.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe"C:\Users\Admin\AppData\Local\Temp\675a140da4a74ead9fb1aa31dbf727aa25e375f05169c430f74316995a1731b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihj7785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihj7785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr217936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr217936.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku376630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku376630.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr428252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr428252.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f4367bc5a67ef352ed852f02a6c17f6a
SHA10c9fd4f3ce6592874a7da4cd63afcdeef4f0485e
SHA2567605bf216f8e6ee8a5ee0d4189e91a2277252d2e425824cfb58bcb7bf6bc123f
SHA512852f661da9bc26178d093c2d593832c941bff16b70f596f61f45d223b44851c867d1accda4aa25a4e2e5651c42f545720e55d5e8ea0ee8246e3b1128a8000bd6
-
Filesize
175KB
MD5f4367bc5a67ef352ed852f02a6c17f6a
SHA10c9fd4f3ce6592874a7da4cd63afcdeef4f0485e
SHA2567605bf216f8e6ee8a5ee0d4189e91a2277252d2e425824cfb58bcb7bf6bc123f
SHA512852f661da9bc26178d093c2d593832c941bff16b70f596f61f45d223b44851c867d1accda4aa25a4e2e5651c42f545720e55d5e8ea0ee8246e3b1128a8000bd6
-
Filesize
380KB
MD5da81667bb1c33fddb187d3ec2a3d2b01
SHA1ec2b5feec9c7d441c40c7b59d7cb61948262d32f
SHA256473c33b855120c0e92a7619ae285a93fe517105dd6b05aab77f39ab076be2567
SHA512927e9c3b0f97960b3d6b30fe5fe30f90e0f69991393f399a3333a9d3cdcfacc8d02d5bbb9d15e00726e611983f042493ea73dc769ba97aee4480ad726e7a53a4
-
Filesize
380KB
MD5da81667bb1c33fddb187d3ec2a3d2b01
SHA1ec2b5feec9c7d441c40c7b59d7cb61948262d32f
SHA256473c33b855120c0e92a7619ae285a93fe517105dd6b05aab77f39ab076be2567
SHA512927e9c3b0f97960b3d6b30fe5fe30f90e0f69991393f399a3333a9d3cdcfacc8d02d5bbb9d15e00726e611983f042493ea73dc769ba97aee4480ad726e7a53a4
-
Filesize
15KB
MD500aa4ab8ee8484da7fa4dc0ddd0b35a8
SHA1b717d31675852f125c5e19285faf35da8c746bd8
SHA2569911bc9a0622448542e29e6043c1dc6dbf252947f679aff45a1018da4c782c8b
SHA512f8d1ad681e7f1e8bec464bfcc76b54d4bd527fe80944a6a7e8dc7c687f1fd9bf908d9e1fb45602f320028c9d24e9f67bbdb57087fdb3363b256ccf1562aa731d
-
Filesize
15KB
MD500aa4ab8ee8484da7fa4dc0ddd0b35a8
SHA1b717d31675852f125c5e19285faf35da8c746bd8
SHA2569911bc9a0622448542e29e6043c1dc6dbf252947f679aff45a1018da4c782c8b
SHA512f8d1ad681e7f1e8bec464bfcc76b54d4bd527fe80944a6a7e8dc7c687f1fd9bf908d9e1fb45602f320028c9d24e9f67bbdb57087fdb3363b256ccf1562aa731d
-
Filesize
294KB
MD5b1cd31d09d2f1af54bc47e5bcaa6e48e
SHA1a50768a25fda6deb653b20c2b392df1e82fb3d5b
SHA25604b2bd0b0ebaa55e64d857033b5b2fe298f2f8b2f2c31dc0a5e7bc27cd6032b6
SHA512c37282dd23d12bbdcdb1016837187ad293c479932a2ac7e365e6be03cdc05272a81ad3f171c47941eebe384ffc40c7709022c19b3dcb7dff98bd2c6674882aaf
-
Filesize
294KB
MD5b1cd31d09d2f1af54bc47e5bcaa6e48e
SHA1a50768a25fda6deb653b20c2b392df1e82fb3d5b
SHA25604b2bd0b0ebaa55e64d857033b5b2fe298f2f8b2f2c31dc0a5e7bc27cd6032b6
SHA512c37282dd23d12bbdcdb1016837187ad293c479932a2ac7e365e6be03cdc05272a81ad3f171c47941eebe384ffc40c7709022c19b3dcb7dff98bd2c6674882aaf