Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe
Resource
win10-20230220-en
General
-
Target
e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe
-
Size
536KB
-
MD5
29cdd4e791dd11e53190eb7f9dd70806
-
SHA1
f0fc909f2388f9e6e75903544afde0af0d786929
-
SHA256
e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63
-
SHA512
9011d7ceefbde7c7ef9aed72c7d565577615082badce4faa460841d67b6da992f027753500765c85d31ef504210747704f0d88f81a487b20fd3a1db6c330c378
-
SSDEEP
12288:SMrGy90fL2hmMYqBcL/Nl7xiOKU7yFH08H/o/cn5j4N:gyWzMYacL1H4U+0atn5MN
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw44OS01Et48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw44OS01Et48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw44OS01Et48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw44OS01Et48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw44OS01Et48.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1004-137-0x0000000002650000-0x0000000002696000-memory.dmp family_redline behavioral1/memory/1004-143-0x0000000004B50000-0x0000000004B94000-memory.dmp family_redline behavioral1/memory/1004-144-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-145-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-147-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-149-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-151-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-153-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-155-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-157-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-159-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-161-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-163-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-165-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-167-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-169-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-171-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-173-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-175-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-177-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-179-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-181-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-183-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-185-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-187-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-189-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-191-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-193-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-195-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-197-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-199-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-201-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-203-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-205-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline behavioral1/memory/1004-207-0x0000000004B50000-0x0000000004B8E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 352 vtI8429Ow.exe 3508 sw44OS01Et48.exe 1004 tUe38tq50.exe 2200 uHc03sz82.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw44OS01Et48.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vtI8429Ow.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vtI8429Ow.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3508 sw44OS01Et48.exe 3508 sw44OS01Et48.exe 1004 tUe38tq50.exe 1004 tUe38tq50.exe 2200 uHc03sz82.exe 2200 uHc03sz82.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3508 sw44OS01Et48.exe Token: SeDebugPrivilege 1004 tUe38tq50.exe Token: SeDebugPrivilege 2200 uHc03sz82.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3480 wrote to memory of 352 3480 e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe 66 PID 3480 wrote to memory of 352 3480 e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe 66 PID 3480 wrote to memory of 352 3480 e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe 66 PID 352 wrote to memory of 3508 352 vtI8429Ow.exe 67 PID 352 wrote to memory of 3508 352 vtI8429Ow.exe 67 PID 352 wrote to memory of 1004 352 vtI8429Ow.exe 68 PID 352 wrote to memory of 1004 352 vtI8429Ow.exe 68 PID 352 wrote to memory of 1004 352 vtI8429Ow.exe 68 PID 3480 wrote to memory of 2200 3480 e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe 70 PID 3480 wrote to memory of 2200 3480 e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe 70 PID 3480 wrote to memory of 2200 3480 e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe"C:\Users\Admin\AppData\Local\Temp\e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtI8429Ow.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtI8429Ow.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw44OS01Et48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw44OS01Et48.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUe38tq50.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUe38tq50.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHc03sz82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHc03sz82.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD572a8e04545cf9c5371848dc03b4db79c
SHA1cf0078dfdc140aa1ac0936a485018a915cf7152f
SHA256e94fbb2351219d2c14fc2d61a81786793036d21b993386ba095cf3f5914909f2
SHA512bab6ec840b7913e462abd7a452f388c959f828acc2cade582e91056f89b44186c94ebcddc91a280a94cc235affa7fba6f6f36663be57e98f5f6533886c8635d8
-
Filesize
175KB
MD572a8e04545cf9c5371848dc03b4db79c
SHA1cf0078dfdc140aa1ac0936a485018a915cf7152f
SHA256e94fbb2351219d2c14fc2d61a81786793036d21b993386ba095cf3f5914909f2
SHA512bab6ec840b7913e462abd7a452f388c959f828acc2cade582e91056f89b44186c94ebcddc91a280a94cc235affa7fba6f6f36663be57e98f5f6533886c8635d8
-
Filesize
392KB
MD5275273fc1e5d5a3cac7fe4ae85764ca8
SHA1d047cf72e096c194a8f45dd45796ad2fb479d370
SHA2560aa5f47b75393857f60f1ef6326aa9d2a246cf857724f1889970df7b39bb20f6
SHA5121c03a64e30cb8e0cbca9912ecd5ec980e71fe987c5b1eb8fd22fea4c2802b225b9bc3fbf9bbae6a4d74bf03b4922c1fa838122c42c808bd9ff91599e61de81ca
-
Filesize
392KB
MD5275273fc1e5d5a3cac7fe4ae85764ca8
SHA1d047cf72e096c194a8f45dd45796ad2fb479d370
SHA2560aa5f47b75393857f60f1ef6326aa9d2a246cf857724f1889970df7b39bb20f6
SHA5121c03a64e30cb8e0cbca9912ecd5ec980e71fe987c5b1eb8fd22fea4c2802b225b9bc3fbf9bbae6a4d74bf03b4922c1fa838122c42c808bd9ff91599e61de81ca
-
Filesize
12KB
MD5d53189fe5a9f5a18daec60aae9e1425e
SHA1d1eb1ca0498bca6266bc59a807b36383c32258e3
SHA2569d4976da7f505b246980b0108aba89902f0b35097ae18d20612f2a0801136833
SHA5121db176014db9b3fcf3ddb7a47a4153de7e018b369cb4e77fcfd528ec3e8aa5a783b27de8672785a15e7d6eb8d83c0e59720a0e63ab271a73d3bcbd8aeaba1c50
-
Filesize
12KB
MD5d53189fe5a9f5a18daec60aae9e1425e
SHA1d1eb1ca0498bca6266bc59a807b36383c32258e3
SHA2569d4976da7f505b246980b0108aba89902f0b35097ae18d20612f2a0801136833
SHA5121db176014db9b3fcf3ddb7a47a4153de7e018b369cb4e77fcfd528ec3e8aa5a783b27de8672785a15e7d6eb8d83c0e59720a0e63ab271a73d3bcbd8aeaba1c50
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06