Analysis
-
max time kernel
146s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 19:42
Static task
static1
General
-
Target
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe
-
Size
801KB
-
MD5
dde9198f8ae10cc89681066e964d22f4
-
SHA1
9a640a75770d2938b40f05eddf1360a665537919
-
SHA256
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877
-
SHA512
83b4f2aa1e1878dfad62cbd0c2909ddbac15a7c78297011cc48051efcb57f007131f4312d15bba160414a1ae054006f820cc8f74798836ff3f7fde4026055a11
-
SSDEEP
12288:rMrLy90+pc6r2ppxlI5rjj7+Nyy48U7wVaxK7C4g+cfJyk83ZKmdeMcHkbWoIyt:wyHp/rUIdSyNb84xf/DfJ2NsMcHkbHt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it329030.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it329030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it329030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it329030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it329030.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it329030.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4316-149-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/4316-151-0x0000000004A40000-0x0000000004A84000-memory.dmp family_redline behavioral1/memory/4316-154-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-155-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-157-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-159-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-161-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-163-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-165-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-167-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-169-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-171-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-173-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-175-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-177-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-179-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-181-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-183-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-185-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-187-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-189-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-191-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-193-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-195-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-197-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-199-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-201-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-203-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-205-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-207-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-209-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-211-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-213-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-215-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline behavioral1/memory/4316-217-0x0000000004A40000-0x0000000004A7F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
zihh9865.exeziRY5832.exeit329030.exejr495984.exekp793534.exelr882043.exepid process 4212 zihh9865.exe 3652 ziRY5832.exe 5012 it329030.exe 4316 jr495984.exe 2948 kp793534.exe 3720 lr882043.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it329030.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it329030.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziRY5832.exeea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exezihh9865.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRY5832.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziRY5832.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihh9865.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihh9865.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3964 3720 WerFault.exe lr882043.exe 3860 3720 WerFault.exe lr882043.exe 4864 3720 WerFault.exe lr882043.exe 4880 3720 WerFault.exe lr882043.exe 2840 3720 WerFault.exe lr882043.exe 4856 3720 WerFault.exe lr882043.exe 4156 3720 WerFault.exe lr882043.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it329030.exejr495984.exekp793534.exepid process 5012 it329030.exe 5012 it329030.exe 4316 jr495984.exe 4316 jr495984.exe 2948 kp793534.exe 2948 kp793534.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it329030.exejr495984.exekp793534.exedescription pid process Token: SeDebugPrivilege 5012 it329030.exe Token: SeDebugPrivilege 4316 jr495984.exe Token: SeDebugPrivilege 2948 kp793534.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exezihh9865.exeziRY5832.exedescription pid process target process PID 3748 wrote to memory of 4212 3748 ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe zihh9865.exe PID 3748 wrote to memory of 4212 3748 ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe zihh9865.exe PID 3748 wrote to memory of 4212 3748 ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe zihh9865.exe PID 4212 wrote to memory of 3652 4212 zihh9865.exe ziRY5832.exe PID 4212 wrote to memory of 3652 4212 zihh9865.exe ziRY5832.exe PID 4212 wrote to memory of 3652 4212 zihh9865.exe ziRY5832.exe PID 3652 wrote to memory of 5012 3652 ziRY5832.exe it329030.exe PID 3652 wrote to memory of 5012 3652 ziRY5832.exe it329030.exe PID 3652 wrote to memory of 4316 3652 ziRY5832.exe jr495984.exe PID 3652 wrote to memory of 4316 3652 ziRY5832.exe jr495984.exe PID 3652 wrote to memory of 4316 3652 ziRY5832.exe jr495984.exe PID 4212 wrote to memory of 2948 4212 zihh9865.exe kp793534.exe PID 4212 wrote to memory of 2948 4212 zihh9865.exe kp793534.exe PID 4212 wrote to memory of 2948 4212 zihh9865.exe kp793534.exe PID 3748 wrote to memory of 3720 3748 ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe lr882043.exe PID 3748 wrote to memory of 3720 3748 ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe lr882043.exe PID 3748 wrote to memory of 3720 3748 ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe lr882043.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe"C:\Users\Admin\AppData\Local\Temp\ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihh9865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihh9865.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRY5832.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRY5832.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it329030.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it329030.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr495984.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr495984.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp793534.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp793534.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr882043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr882043.exe2⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 6163⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 6963⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 7723⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 8443⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 8723⤵
- Program crash
PID:2840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 8883⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 10603⤵
- Program crash
PID:4156
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
Filesize
536KB
MD55a47fa33aafeeaa5a4b7f972aaed327e
SHA1b3a057dcda113e9316edfee23deff9fe235300ff
SHA2563385511c851997816a6f34272a78acd0ee4d0ae0c43c0f1024e1399dffeb5621
SHA51260a46c459b9f4dbd703e4d529e8edd45894f126ac0c4bb97932a6e1ea913b870e75c17bb6f17a06563c57ee170607ecdaa1ca6461dc9854ae76cada6285f03f4
-
Filesize
536KB
MD55a47fa33aafeeaa5a4b7f972aaed327e
SHA1b3a057dcda113e9316edfee23deff9fe235300ff
SHA2563385511c851997816a6f34272a78acd0ee4d0ae0c43c0f1024e1399dffeb5621
SHA51260a46c459b9f4dbd703e4d529e8edd45894f126ac0c4bb97932a6e1ea913b870e75c17bb6f17a06563c57ee170607ecdaa1ca6461dc9854ae76cada6285f03f4
-
Filesize
169KB
MD5ab0163e821734ec8417c90e8bf290f79
SHA1bae22f2a9eed21e88939963b483a92bd943b613e
SHA25665bcde7d2af815cb39c26360c9972029709480a2fae51af0d3b649f2e0da9cbc
SHA51247a6d87fbb38cbd6925499b473a7c850cf3398dc4958d5ae41708f89c1ae47c7fdca6063f4a42521d5cd217684a5c74c3801c6131c7cd367f8d00093cf63a3e9
-
Filesize
169KB
MD5ab0163e821734ec8417c90e8bf290f79
SHA1bae22f2a9eed21e88939963b483a92bd943b613e
SHA25665bcde7d2af815cb39c26360c9972029709480a2fae51af0d3b649f2e0da9cbc
SHA51247a6d87fbb38cbd6925499b473a7c850cf3398dc4958d5ae41708f89c1ae47c7fdca6063f4a42521d5cd217684a5c74c3801c6131c7cd367f8d00093cf63a3e9
-
Filesize
382KB
MD5d75fcd60b488453995018b001378754b
SHA1cc5ca3f37204af2cdc8204bac42190702a37565e
SHA2562dd6959aa45c246a02bfffeb165abc367aae81f932bd038e411182e261d9374f
SHA512056eff0933c4835a7f7ebc60e4a6f64c58a4bf80dce8dd3eb9531e8c3af5a423aca7a0d84a4c4374d64d025b1b43fad3428b57eada17cb94aa5d2304d46d6399
-
Filesize
382KB
MD5d75fcd60b488453995018b001378754b
SHA1cc5ca3f37204af2cdc8204bac42190702a37565e
SHA2562dd6959aa45c246a02bfffeb165abc367aae81f932bd038e411182e261d9374f
SHA512056eff0933c4835a7f7ebc60e4a6f64c58a4bf80dce8dd3eb9531e8c3af5a423aca7a0d84a4c4374d64d025b1b43fad3428b57eada17cb94aa5d2304d46d6399
-
Filesize
11KB
MD536e4199125d0a8125ec82c17fbc52a11
SHA1d673675f65012e724bec7e600504d64e064289b2
SHA2562155f567171ae099ba31264d097466d07e7f7661499ead4cff53a6045d0d4270
SHA5123615d745516e92304b6ce73ee40273510d88c7d288742413032505f1e1266250356fe23181cd3bd314b026c18538359451168da98d669ae4e8cbf8ae89b1a559
-
Filesize
11KB
MD536e4199125d0a8125ec82c17fbc52a11
SHA1d673675f65012e724bec7e600504d64e064289b2
SHA2562155f567171ae099ba31264d097466d07e7f7661499ead4cff53a6045d0d4270
SHA5123615d745516e92304b6ce73ee40273510d88c7d288742413032505f1e1266250356fe23181cd3bd314b026c18538359451168da98d669ae4e8cbf8ae89b1a559
-
Filesize
297KB
MD569cadcf28e3d4cb429fe8fc7b91570c6
SHA1303d386d42a0a9b22812a507a4c9c25522680f27
SHA256bca2ccc0975646403b117e5a1510cca56b7f236299979b83048037ba23d7100e
SHA512acba16632f87d83cbaf832d167f99d46a6cc67438c85750c42d905829fd091e5d102ffbe292ba00bea627e1362611a2c0b58eea90d8f2f7b88f0a211514d2827
-
Filesize
297KB
MD569cadcf28e3d4cb429fe8fc7b91570c6
SHA1303d386d42a0a9b22812a507a4c9c25522680f27
SHA256bca2ccc0975646403b117e5a1510cca56b7f236299979b83048037ba23d7100e
SHA512acba16632f87d83cbaf832d167f99d46a6cc67438c85750c42d905829fd091e5d102ffbe292ba00bea627e1362611a2c0b58eea90d8f2f7b88f0a211514d2827