Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 19:09
Static task
static1
General
-
Target
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe
-
Size
801KB
-
MD5
cd5e28fc1d6ff681fb019650c78b1872
-
SHA1
e69cf6988db840394aeba4b6c8a52f81e3260a92
-
SHA256
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca
-
SHA512
52f895ef65f20db5a6b5bf247e8a86f7e136dae7e027f1b960cd3c75feace6a8d13ea8c2ad5ff0f575efb57643764318b48fec59e6a3a2f7340c57d5a02e0c56
-
SSDEEP
12288:RMrCy901b0WyeiPjG0jkkz7xHE5BOwchsn3EdEaFvtZz+noi+s1E:ny+XiPjG0jxtCOwbYFZIoi3E
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it235452.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it235452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it235452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it235452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it235452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it235452.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-146-0x0000000004A00000-0x0000000004A46000-memory.dmp family_redline behavioral1/memory/2036-150-0x0000000004A80000-0x0000000004AC4000-memory.dmp family_redline behavioral1/memory/2036-151-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-152-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-156-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-154-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/2036-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
ziPb6300.exezirZ3718.exeit235452.exejr607687.exekp292588.exelr937643.exepid process 4076 ziPb6300.exe 4680 zirZ3718.exe 5060 it235452.exe 2036 jr607687.exe 4916 kp292588.exe 2964 lr937643.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it235452.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it235452.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
zirZ3718.exe871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exeziPb6300.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zirZ3718.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziPb6300.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPb6300.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zirZ3718.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4852 2964 WerFault.exe lr937643.exe 4164 2964 WerFault.exe lr937643.exe 4928 2964 WerFault.exe lr937643.exe 4388 2964 WerFault.exe lr937643.exe 4436 2964 WerFault.exe lr937643.exe 4496 2964 WerFault.exe lr937643.exe 3896 2964 WerFault.exe lr937643.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it235452.exejr607687.exekp292588.exepid process 5060 it235452.exe 5060 it235452.exe 2036 jr607687.exe 2036 jr607687.exe 4916 kp292588.exe 4916 kp292588.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it235452.exejr607687.exekp292588.exedescription pid process Token: SeDebugPrivilege 5060 it235452.exe Token: SeDebugPrivilege 2036 jr607687.exe Token: SeDebugPrivilege 4916 kp292588.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exeziPb6300.exezirZ3718.exedescription pid process target process PID 3520 wrote to memory of 4076 3520 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe ziPb6300.exe PID 3520 wrote to memory of 4076 3520 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe ziPb6300.exe PID 3520 wrote to memory of 4076 3520 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe ziPb6300.exe PID 4076 wrote to memory of 4680 4076 ziPb6300.exe zirZ3718.exe PID 4076 wrote to memory of 4680 4076 ziPb6300.exe zirZ3718.exe PID 4076 wrote to memory of 4680 4076 ziPb6300.exe zirZ3718.exe PID 4680 wrote to memory of 5060 4680 zirZ3718.exe it235452.exe PID 4680 wrote to memory of 5060 4680 zirZ3718.exe it235452.exe PID 4680 wrote to memory of 2036 4680 zirZ3718.exe jr607687.exe PID 4680 wrote to memory of 2036 4680 zirZ3718.exe jr607687.exe PID 4680 wrote to memory of 2036 4680 zirZ3718.exe jr607687.exe PID 4076 wrote to memory of 4916 4076 ziPb6300.exe kp292588.exe PID 4076 wrote to memory of 4916 4076 ziPb6300.exe kp292588.exe PID 4076 wrote to memory of 4916 4076 ziPb6300.exe kp292588.exe PID 3520 wrote to memory of 2964 3520 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe lr937643.exe PID 3520 wrote to memory of 2964 3520 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe lr937643.exe PID 3520 wrote to memory of 2964 3520 871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe lr937643.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe"C:\Users\Admin\AppData\Local\Temp\871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPb6300.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPb6300.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zirZ3718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zirZ3718.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235452.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235452.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr607687.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr607687.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp292588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp292588.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937643.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937643.exe2⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 6163⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 7283⤵
- Program crash
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 6043⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 7123⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 8723⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 7843⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 10603⤵
- Program crash
PID:3896
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5af7fca55ea436503f0fb684c1c158383
SHA1c6e2a00e5a4854b2c103748d47ae18356e7efa0d
SHA256cb3b7bdaee641f2225640efc12d83f616526cc985a22e0dfb6bed041d84a8c60
SHA512f6d2b00dc84a58db17080766b05fe831d08fbf0f85750b611fcea55069622964d71473a40de64cd8fbcee7f39487e9087c632645d550f63d3ec87e2f3a36fe84
-
Filesize
231KB
MD5af7fca55ea436503f0fb684c1c158383
SHA1c6e2a00e5a4854b2c103748d47ae18356e7efa0d
SHA256cb3b7bdaee641f2225640efc12d83f616526cc985a22e0dfb6bed041d84a8c60
SHA512f6d2b00dc84a58db17080766b05fe831d08fbf0f85750b611fcea55069622964d71473a40de64cd8fbcee7f39487e9087c632645d550f63d3ec87e2f3a36fe84
-
Filesize
535KB
MD53b2dd7476a4edab226a194e5879e3ad9
SHA12c711bcd3d4c4f8217988a3dd680992fa5356e75
SHA256cf366ebcda631c6857f60ae8edb278dda21abcf1443c2394248799d18090b72e
SHA512c19b6bb2f8070ce8c0f83256b65401b6efa3ac3e0cf6eab9e89025735201edf3b788ad2fd3ec0b828d685842bb2a54ee3b1a68052645f17f090d3b2143aa0e5e
-
Filesize
535KB
MD53b2dd7476a4edab226a194e5879e3ad9
SHA12c711bcd3d4c4f8217988a3dd680992fa5356e75
SHA256cf366ebcda631c6857f60ae8edb278dda21abcf1443c2394248799d18090b72e
SHA512c19b6bb2f8070ce8c0f83256b65401b6efa3ac3e0cf6eab9e89025735201edf3b788ad2fd3ec0b828d685842bb2a54ee3b1a68052645f17f090d3b2143aa0e5e
-
Filesize
168KB
MD5478148e5f60728b79726cdf181211659
SHA15f7276b74becead4dfa98c1e6305497c840e89db
SHA2564e74fd0ccf69443a0eb9734c9045cbc2989d347efd619f21d0abd0a3b4e0cfb5
SHA5129ec5a2dea11ada98d710126b1180ba00233c56b4ee7e9b31190b062cdd7e4b4a9c1db07b9484770d01c22d67a395419421ddb76dc2277f2e8ec366e4780a5282
-
Filesize
168KB
MD5478148e5f60728b79726cdf181211659
SHA15f7276b74becead4dfa98c1e6305497c840e89db
SHA2564e74fd0ccf69443a0eb9734c9045cbc2989d347efd619f21d0abd0a3b4e0cfb5
SHA5129ec5a2dea11ada98d710126b1180ba00233c56b4ee7e9b31190b062cdd7e4b4a9c1db07b9484770d01c22d67a395419421ddb76dc2277f2e8ec366e4780a5282
-
Filesize
382KB
MD50eb7e292c58e5713eeefb54d16c905b1
SHA1e8bc1121cc7eca6e76da98ab19f9abe9c655bb28
SHA256601ae9db17ce7019512af60cfc0451288cdad302ff63a249190da84faad5468f
SHA512ace57d45ef7e95ebd276a93486594daaa074076767b991760e53a24833726e5e6ab33d4f63085375968716e9e3269b529392ef2ff67b346441e668f65d7543a6
-
Filesize
382KB
MD50eb7e292c58e5713eeefb54d16c905b1
SHA1e8bc1121cc7eca6e76da98ab19f9abe9c655bb28
SHA256601ae9db17ce7019512af60cfc0451288cdad302ff63a249190da84faad5468f
SHA512ace57d45ef7e95ebd276a93486594daaa074076767b991760e53a24833726e5e6ab33d4f63085375968716e9e3269b529392ef2ff67b346441e668f65d7543a6
-
Filesize
11KB
MD53d408716834736ed12d9638e2e477df8
SHA1a6ac21609ad6c20caf50aaadfd6f4f547435e75e
SHA2566a50eca253cb440b7cabef534a21bae755ac6b7e814c5fabd9309ce30271bb7c
SHA512a345c14da445dd2bd0ff74180d7a0595d132c05af51f17fb0ce79ae4b74b1da878c5e5553c56ab4fa728fa57d419c14cc50ca14c9591759cd4e52d709f4de7df
-
Filesize
11KB
MD53d408716834736ed12d9638e2e477df8
SHA1a6ac21609ad6c20caf50aaadfd6f4f547435e75e
SHA2566a50eca253cb440b7cabef534a21bae755ac6b7e814c5fabd9309ce30271bb7c
SHA512a345c14da445dd2bd0ff74180d7a0595d132c05af51f17fb0ce79ae4b74b1da878c5e5553c56ab4fa728fa57d419c14cc50ca14c9591759cd4e52d709f4de7df
-
Filesize
297KB
MD504dc8f146bd297eeca6b9987692c4bf2
SHA1433d7c3b50cccdbe3d8ff3673598a2b71b789905
SHA256b93291ca21bfc06375f47c5bd67fe3168a45651eb0ec3f95543c87fc64bf90ed
SHA512e62aecf6dc765b5d5d4d25d719292f5e55fc9432eb79d4cc2f07d2bf351c5685639f2b2ec42f2b2c20f658e4ac900abcbeb7f7045bd250a44f697208d4104893
-
Filesize
297KB
MD504dc8f146bd297eeca6b9987692c4bf2
SHA1433d7c3b50cccdbe3d8ff3673598a2b71b789905
SHA256b93291ca21bfc06375f47c5bd67fe3168a45651eb0ec3f95543c87fc64bf90ed
SHA512e62aecf6dc765b5d5d4d25d719292f5e55fc9432eb79d4cc2f07d2bf351c5685639f2b2ec42f2b2c20f658e4ac900abcbeb7f7045bd250a44f697208d4104893