Analysis
-
max time kernel
142s -
max time network
109s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 21:22
Static task
static1
General
-
Target
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe
-
Size
801KB
-
MD5
dcd5801b10da4fd62c37277d63c2d325
-
SHA1
40f70eb32def75d4d5c35b6b1d9a220bb5914bca
-
SHA256
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd
-
SHA512
907631659c4465546869e2fabcdf52e1510ba0b6d4c93c4dd7d2051b0e98ea434e4d3c90b59bb474d66da4d62b56c51c140667654209e1c32e07c90cd1bf2d4e
-
SSDEEP
24576:LyKJptPSMvT72HUDxfy4R0Sl/Fh3nownbxHH8Qk6bwi:+KbtS05Dx64eSl9KQd8XYw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
it393249.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it393249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it393249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it393249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it393249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it393249.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4076-149-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/4076-151-0x0000000004A50000-0x0000000004A94000-memory.dmp family_redline behavioral1/memory/4076-152-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-153-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-155-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-157-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-159-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-161-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-163-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-167-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-170-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-172-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-174-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-176-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-178-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-180-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-182-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-184-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-186-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-188-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-190-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-192-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-194-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-196-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-198-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-200-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-202-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-204-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-206-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-208-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-210-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-212-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-214-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-216-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline behavioral1/memory/4076-218-0x0000000004A50000-0x0000000004A8F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
zitu4001.exeziEX1756.exeit393249.exejr070755.exekp675250.exelr224589.exepid process 2452 zitu4001.exe 2592 ziEX1756.exe 2820 it393249.exe 4076 jr070755.exe 2960 kp675250.exe 3584 lr224589.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it393249.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it393249.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exezitu4001.exeziEX1756.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitu4001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitu4001.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEX1756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziEX1756.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3732 3584 WerFault.exe lr224589.exe 3720 3584 WerFault.exe lr224589.exe 3756 3584 WerFault.exe lr224589.exe 364 3584 WerFault.exe lr224589.exe 1700 3584 WerFault.exe lr224589.exe 4792 3584 WerFault.exe lr224589.exe 2068 3584 WerFault.exe lr224589.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it393249.exejr070755.exekp675250.exepid process 2820 it393249.exe 2820 it393249.exe 4076 jr070755.exe 4076 jr070755.exe 2960 kp675250.exe 2960 kp675250.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it393249.exejr070755.exekp675250.exedescription pid process Token: SeDebugPrivilege 2820 it393249.exe Token: SeDebugPrivilege 4076 jr070755.exe Token: SeDebugPrivilege 2960 kp675250.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exezitu4001.exeziEX1756.exedescription pid process target process PID 2132 wrote to memory of 2452 2132 e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe zitu4001.exe PID 2132 wrote to memory of 2452 2132 e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe zitu4001.exe PID 2132 wrote to memory of 2452 2132 e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe zitu4001.exe PID 2452 wrote to memory of 2592 2452 zitu4001.exe ziEX1756.exe PID 2452 wrote to memory of 2592 2452 zitu4001.exe ziEX1756.exe PID 2452 wrote to memory of 2592 2452 zitu4001.exe ziEX1756.exe PID 2592 wrote to memory of 2820 2592 ziEX1756.exe it393249.exe PID 2592 wrote to memory of 2820 2592 ziEX1756.exe it393249.exe PID 2592 wrote to memory of 4076 2592 ziEX1756.exe jr070755.exe PID 2592 wrote to memory of 4076 2592 ziEX1756.exe jr070755.exe PID 2592 wrote to memory of 4076 2592 ziEX1756.exe jr070755.exe PID 2452 wrote to memory of 2960 2452 zitu4001.exe kp675250.exe PID 2452 wrote to memory of 2960 2452 zitu4001.exe kp675250.exe PID 2452 wrote to memory of 2960 2452 zitu4001.exe kp675250.exe PID 2132 wrote to memory of 3584 2132 e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe lr224589.exe PID 2132 wrote to memory of 3584 2132 e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe lr224589.exe PID 2132 wrote to memory of 3584 2132 e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe lr224589.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe"C:\Users\Admin\AppData\Local\Temp\e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitu4001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitu4001.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEX1756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziEX1756.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it393249.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it393249.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr070755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr070755.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp675250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp675250.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr224589.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr224589.exe2⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 6203⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7003⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7723⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 8683⤵
- Program crash
PID:364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 9163⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7563⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 10843⤵
- Program crash
PID:2068
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
Filesize
536KB
MD523c4082c393bd1c4e270d3a2f24adbcf
SHA11cce404c96a08c8bf2c0b701543616a0ca22f1c5
SHA256540ee7dd946685f143d5fe3a0b5405829a557133ea2aa6349e114bf868848fed
SHA512a3404c95693fd375fa32749d63f0e89cb838c285ab4fa969dcfc480a0ee390fdcfbfd067f4edf1b0d6a99d9a7d6abffb6d34284f3aa7adb16aada2e8dcb6a6a1
-
Filesize
536KB
MD523c4082c393bd1c4e270d3a2f24adbcf
SHA11cce404c96a08c8bf2c0b701543616a0ca22f1c5
SHA256540ee7dd946685f143d5fe3a0b5405829a557133ea2aa6349e114bf868848fed
SHA512a3404c95693fd375fa32749d63f0e89cb838c285ab4fa969dcfc480a0ee390fdcfbfd067f4edf1b0d6a99d9a7d6abffb6d34284f3aa7adb16aada2e8dcb6a6a1
-
Filesize
169KB
MD58b2dfa8b7b7d7aba6c6bf5b9a1a1c35e
SHA180b10ba4e020dc7e209b079800ccf012b0a7b554
SHA256f0c309879ee4031317d748ac1e5d773b67a27af5550fc47007fedca149ea589c
SHA512b4776d8a7d7cbb0ed7beda73febf9d226dc081d8892d43fd8ec035215d8c0640e13343a0bed67e042d8ff727c446d7321e64b8d6835006866e8eb8a649887017
-
Filesize
169KB
MD58b2dfa8b7b7d7aba6c6bf5b9a1a1c35e
SHA180b10ba4e020dc7e209b079800ccf012b0a7b554
SHA256f0c309879ee4031317d748ac1e5d773b67a27af5550fc47007fedca149ea589c
SHA512b4776d8a7d7cbb0ed7beda73febf9d226dc081d8892d43fd8ec035215d8c0640e13343a0bed67e042d8ff727c446d7321e64b8d6835006866e8eb8a649887017
-
Filesize
382KB
MD5e059e1a486116cf8a33cc8556d622809
SHA12c2aece26deb1cacd405e35a47e3a2272a78ac04
SHA2567a64676ca0bb2e358fe20943d94841dd1da74dbbf0b14e14a26105682ab0efa6
SHA51207bdccde8218c5af561200b3edb84b6766539444a9065b6aaa2ee968a42804e005e9cf6c375f14e7e8921f8ec6296250a476c639c89639754d9d1ba286a41b7c
-
Filesize
382KB
MD5e059e1a486116cf8a33cc8556d622809
SHA12c2aece26deb1cacd405e35a47e3a2272a78ac04
SHA2567a64676ca0bb2e358fe20943d94841dd1da74dbbf0b14e14a26105682ab0efa6
SHA51207bdccde8218c5af561200b3edb84b6766539444a9065b6aaa2ee968a42804e005e9cf6c375f14e7e8921f8ec6296250a476c639c89639754d9d1ba286a41b7c
-
Filesize
11KB
MD596453ece97c4c73df430e1fa169562ea
SHA11005f54616f3988b12b221e6341315ada7ced16c
SHA256bf5b62087ff64770f2f41daf976861918250912e5a03dd38c8fb9d91b79eb263
SHA512b5a4b4ac2ac2831160a3df3c28151303b42a2573aed1b423ea1fcd622f5965a85e98388e68b01ff184441960d7ab2c93275f0d081001d0b2205d51616f475725
-
Filesize
11KB
MD596453ece97c4c73df430e1fa169562ea
SHA11005f54616f3988b12b221e6341315ada7ced16c
SHA256bf5b62087ff64770f2f41daf976861918250912e5a03dd38c8fb9d91b79eb263
SHA512b5a4b4ac2ac2831160a3df3c28151303b42a2573aed1b423ea1fcd622f5965a85e98388e68b01ff184441960d7ab2c93275f0d081001d0b2205d51616f475725
-
Filesize
297KB
MD5e02162a348c25afdb875a1405fb7e4d7
SHA15b254b012f94edf242046458dfd929142ce902f4
SHA256986249ace2ee197880b4a19e0cba399c4a8f8fa7fc0b9e5d59be24b548360844
SHA512168583fece9094134403fcd024298258fd3bbee37a99d4e1f79770176e3525eb481b026fefd751bdba48b5096944925ada68d7a9cea770d78bd657fd2d943df7
-
Filesize
297KB
MD5e02162a348c25afdb875a1405fb7e4d7
SHA15b254b012f94edf242046458dfd929142ce902f4
SHA256986249ace2ee197880b4a19e0cba399c4a8f8fa7fc0b9e5d59be24b548360844
SHA512168583fece9094134403fcd024298258fd3bbee37a99d4e1f79770176e3525eb481b026fefd751bdba48b5096944925ada68d7a9cea770d78bd657fd2d943df7