Analysis
-
max time kernel
144s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 19:35
Static task
static1
General
-
Target
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe
-
Size
801KB
-
MD5
e02f44a7a0fed53f967b5e23dc6397ea
-
SHA1
db93bd057a6b03e308878d35bce52ca4b5ffa5e9
-
SHA256
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80
-
SHA512
2e8093344e60dd66aea0ff7b7106b4327a302d1a87fa682d4894e80b432511fe23bf26f29c9da8217576ca5be5f51fc97b6c989b94aa785e8b03658dc3e2e752
-
SSDEEP
12288:IMrMy90/oq7l3pk/hlmmV4ACJftSxK7CX8l74PtpGxYxCbPhHg2aX:UyqoqlUBV4AEfQxfs4PuxYxUHgHX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it456948.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it456948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it456948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it456948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it456948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it456948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4964-146-0x0000000002570000-0x00000000025B6000-memory.dmp family_redline behavioral1/memory/4964-150-0x0000000004F60000-0x0000000004FA4000-memory.dmp family_redline behavioral1/memory/4964-151-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-152-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-154-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-156-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-158-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-160-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-162-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-164-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-166-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-168-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-170-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-172-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-174-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-176-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-178-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-180-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-182-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-184-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-186-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-188-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-190-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-192-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-194-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-196-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-198-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-200-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-202-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-204-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-206-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-208-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-210-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-212-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/4964-214-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
ziJj5529.exeziCr2383.exeit456948.exejr793309.exekp257838.exelr781267.exepid process 2980 ziJj5529.exe 4140 ziCr2383.exe 4164 it456948.exe 4964 jr793309.exe 4788 kp257838.exe 3728 lr781267.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it456948.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it456948.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exeziJj5529.exeziCr2383.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJj5529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJj5529.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziCr2383.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziCr2383.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2908 3728 WerFault.exe lr781267.exe 4820 3728 WerFault.exe lr781267.exe 2084 3728 WerFault.exe lr781267.exe 752 3728 WerFault.exe lr781267.exe 4736 3728 WerFault.exe lr781267.exe 2556 3728 WerFault.exe lr781267.exe 2168 3728 WerFault.exe lr781267.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it456948.exejr793309.exekp257838.exepid process 4164 it456948.exe 4164 it456948.exe 4964 jr793309.exe 4964 jr793309.exe 4788 kp257838.exe 4788 kp257838.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it456948.exejr793309.exekp257838.exedescription pid process Token: SeDebugPrivilege 4164 it456948.exe Token: SeDebugPrivilege 4964 jr793309.exe Token: SeDebugPrivilege 4788 kp257838.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exeziJj5529.exeziCr2383.exedescription pid process target process PID 2984 wrote to memory of 2980 2984 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe ziJj5529.exe PID 2984 wrote to memory of 2980 2984 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe ziJj5529.exe PID 2984 wrote to memory of 2980 2984 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe ziJj5529.exe PID 2980 wrote to memory of 4140 2980 ziJj5529.exe ziCr2383.exe PID 2980 wrote to memory of 4140 2980 ziJj5529.exe ziCr2383.exe PID 2980 wrote to memory of 4140 2980 ziJj5529.exe ziCr2383.exe PID 4140 wrote to memory of 4164 4140 ziCr2383.exe it456948.exe PID 4140 wrote to memory of 4164 4140 ziCr2383.exe it456948.exe PID 4140 wrote to memory of 4964 4140 ziCr2383.exe jr793309.exe PID 4140 wrote to memory of 4964 4140 ziCr2383.exe jr793309.exe PID 4140 wrote to memory of 4964 4140 ziCr2383.exe jr793309.exe PID 2980 wrote to memory of 4788 2980 ziJj5529.exe kp257838.exe PID 2980 wrote to memory of 4788 2980 ziJj5529.exe kp257838.exe PID 2980 wrote to memory of 4788 2980 ziJj5529.exe kp257838.exe PID 2984 wrote to memory of 3728 2984 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe lr781267.exe PID 2984 wrote to memory of 3728 2984 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe lr781267.exe PID 2984 wrote to memory of 3728 2984 011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe lr781267.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe"C:\Users\Admin\AppData\Local\Temp\011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj5529.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj5529.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCr2383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCr2383.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it456948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it456948.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793309.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793309.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp257838.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp257838.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr781267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr781267.exe2⤵
- Executes dropped EXE
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 6163⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 6963⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 7683⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 8443⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 8723⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 9163⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 10803⤵
- Program crash
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
536KB
MD5071170fa24c161e8aa84d1c0d76a2cb2
SHA1eeea046b62a72ebfb7df70019f827fa4ca979118
SHA25604d416b94ab59cd46a2fe7b14342aa560d720fe3f6267a4bd5bbf5e5abf0201a
SHA5122e293f62c15662f45405617e86e21bd8030317b602b77d461b755b6041ffce83c374d2f104a660dc6f149e55813e61a33556870286e9165c265fdd18bb9a4ff1
-
Filesize
536KB
MD5071170fa24c161e8aa84d1c0d76a2cb2
SHA1eeea046b62a72ebfb7df70019f827fa4ca979118
SHA25604d416b94ab59cd46a2fe7b14342aa560d720fe3f6267a4bd5bbf5e5abf0201a
SHA5122e293f62c15662f45405617e86e21bd8030317b602b77d461b755b6041ffce83c374d2f104a660dc6f149e55813e61a33556870286e9165c265fdd18bb9a4ff1
-
Filesize
168KB
MD5c32710c11743bbf67102ca76141eda6f
SHA1f3ac63ad91f246707be00442f9f914ba847bc186
SHA256d823704a4d6ff2f7c9bad0a9325363a81b986d1b51b3715121c8753af7f73fa5
SHA5127d1dab6e08dd26553bbc3066a02583678190a4bb4f239efa67ff48cc70491e6253664081ef951f1f2fab0c9bb71886de0afd435d1ca40bbaf3203d7939625d2b
-
Filesize
168KB
MD5c32710c11743bbf67102ca76141eda6f
SHA1f3ac63ad91f246707be00442f9f914ba847bc186
SHA256d823704a4d6ff2f7c9bad0a9325363a81b986d1b51b3715121c8753af7f73fa5
SHA5127d1dab6e08dd26553bbc3066a02583678190a4bb4f239efa67ff48cc70491e6253664081ef951f1f2fab0c9bb71886de0afd435d1ca40bbaf3203d7939625d2b
-
Filesize
382KB
MD5b4603ae6759f4b71610312255b66b590
SHA18926a9b21701b69fb3a773a2c5ee9e3817ebc869
SHA256c4d7891438ea6e55c513dcbf1602fa52b605993e7bf6afd2428212864a001f2b
SHA5124c8ca4b56843ebbf3e4f027a77ff118f8f29fc5fae051243329d28f47bc8ab0694e002920bef7d57f238351933442ea7fba709bea36807af85456bdd0cbf2c47
-
Filesize
382KB
MD5b4603ae6759f4b71610312255b66b590
SHA18926a9b21701b69fb3a773a2c5ee9e3817ebc869
SHA256c4d7891438ea6e55c513dcbf1602fa52b605993e7bf6afd2428212864a001f2b
SHA5124c8ca4b56843ebbf3e4f027a77ff118f8f29fc5fae051243329d28f47bc8ab0694e002920bef7d57f238351933442ea7fba709bea36807af85456bdd0cbf2c47
-
Filesize
11KB
MD5ffa806fcde598c40288f7dedcf1f3687
SHA1205b34112f10fb73813018f5e44c744386e1a96b
SHA25683ee008e83c0ab56a531c5ff7c7aefb9dee303aa02e7e81c8cf407d4dee617a0
SHA5126dbaaf246c6ea4246b5ca168e5effaa6fc9663668888250d232754ea48c14f6ba95c43e8b49480f46ba0d614b13a971a308b6a109b684c02b6d529af66769c67
-
Filesize
11KB
MD5ffa806fcde598c40288f7dedcf1f3687
SHA1205b34112f10fb73813018f5e44c744386e1a96b
SHA25683ee008e83c0ab56a531c5ff7c7aefb9dee303aa02e7e81c8cf407d4dee617a0
SHA5126dbaaf246c6ea4246b5ca168e5effaa6fc9663668888250d232754ea48c14f6ba95c43e8b49480f46ba0d614b13a971a308b6a109b684c02b6d529af66769c67
-
Filesize
297KB
MD5183de026b335b611061ee8a0beaeae53
SHA175f5752ab937d9dfff96dfbd71dc140801610819
SHA25650fffe1b2220fc50a22e0c7376a91985929ec65cfd5ec023cf468ef450fcb903
SHA5129a44054e72d65772d1c07b0a37f874b89c0ab618f3015542d756c49bc90fe07c4e67290623484002fc371ddc2202ac14180377f9821753ed77cf5cbd60e1be6d
-
Filesize
297KB
MD5183de026b335b611061ee8a0beaeae53
SHA175f5752ab937d9dfff96dfbd71dc140801610819
SHA25650fffe1b2220fc50a22e0c7376a91985929ec65cfd5ec023cf468ef450fcb903
SHA5129a44054e72d65772d1c07b0a37f874b89c0ab618f3015542d756c49bc90fe07c4e67290623484002fc371ddc2202ac14180377f9821753ed77cf5cbd60e1be6d