Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-03-2023 06:56
Static task
static1
Behavioral task
behavioral1
Sample
078c888df5a4c8b2cf3b7a1bbe64a9c3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
078c888df5a4c8b2cf3b7a1bbe64a9c3.exe
Resource
win10v2004-20230220-en
General
-
Target
078c888df5a4c8b2cf3b7a1bbe64a9c3.exe
-
Size
535KB
-
MD5
078c888df5a4c8b2cf3b7a1bbe64a9c3
-
SHA1
63bd4f6e0a067e9e29f148dcc22f1dac7a53aeaf
-
SHA256
c057850344a23fddd2577d073c708dfb8effda80821b5e1426b9efc5456caecc
-
SHA512
ff486800bda3b049940cfff2bfb6d090e4bd95665144b318a9267456e0a75daa977fcae1b755d969508a29e73b7c7531bdd5907190255edb236eb53465c30325
-
SSDEEP
12288:aMrvy90ep2DVtivsckZMi5GFahCZZ/JoE1vWLfv+Eovm3xEI:ByRpMVtqkBX8iE9OvTpmI
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw60Db41Ei29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw60Db41Ei29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw60Db41Ei29.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw60Db41Ei29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw60Db41Ei29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw60Db41Ei29.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 38 IoCs
resource yara_rule behavioral1/memory/564-84-0x0000000000C70000-0x0000000000CB6000-memory.dmp family_redline behavioral1/memory/564-85-0x0000000002210000-0x0000000002254000-memory.dmp family_redline behavioral1/memory/564-86-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-87-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-89-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-91-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-93-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-95-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-97-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-99-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-101-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-103-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-105-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-107-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-109-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-111-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-113-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-115-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-117-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-119-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-121-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-123-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-125-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-127-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-129-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-131-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-133-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-135-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-137-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-139-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-141-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-143-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-145-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-147-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-149-0x0000000002210000-0x000000000224E000-memory.dmp family_redline behavioral1/memory/564-205-0x0000000004E90000-0x0000000004ED0000-memory.dmp family_redline behavioral1/memory/564-207-0x0000000004E90000-0x0000000004ED0000-memory.dmp family_redline behavioral1/memory/564-995-0x0000000004E90000-0x0000000004ED0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1960 vYG3911Nv.exe 1944 sw60Db41Ei29.exe 564 tIb49bm59.exe 1560 uix56kB52.exe -
Loads dropped DLL 8 IoCs
pid Process 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 1960 vYG3911Nv.exe 1960 vYG3911Nv.exe 1960 vYG3911Nv.exe 1960 vYG3911Nv.exe 564 tIb49bm59.exe 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 1560 uix56kB52.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw60Db41Ei29.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features sw60Db41Ei29.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vYG3911Nv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vYG3911Nv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1944 sw60Db41Ei29.exe 1944 sw60Db41Ei29.exe 564 tIb49bm59.exe 564 tIb49bm59.exe 1560 uix56kB52.exe 1560 uix56kB52.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1944 sw60Db41Ei29.exe Token: SeDebugPrivilege 564 tIb49bm59.exe Token: SeDebugPrivilege 1560 uix56kB52.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 2016 wrote to memory of 1960 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 28 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 1944 1960 vYG3911Nv.exe 29 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 1960 wrote to memory of 564 1960 vYG3911Nv.exe 30 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32 PID 2016 wrote to memory of 1560 2016 078c888df5a4c8b2cf3b7a1bbe64a9c3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\078c888df5a4c8b2cf3b7a1bbe64a9c3.exe"C:\Users\Admin\AppData\Local\Temp\078c888df5a4c8b2cf3b7a1bbe64a9c3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYG3911Nv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYG3911Nv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw60Db41Ei29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw60Db41Ei29.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIb49bm59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIb49bm59.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uix56kB52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uix56kB52.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD576ba6fda17d19c0f98befbd4cc9e8e04
SHA10528c911a501eacac58b61a92a19ffa53b6a6c7b
SHA25638acb2eb810935a42e3dfb051694855f34f80b1cde5a7e0ba094caccc751fc94
SHA512116ffa49e046363cf538b81b33c082683d21f4cad5de9a2f13e5e0fabf2fd12dbacf3dcf1c09e88a46b8ff45563e3a196e40a3a2d71012ad677945986ba2c081
-
Filesize
175KB
MD576ba6fda17d19c0f98befbd4cc9e8e04
SHA10528c911a501eacac58b61a92a19ffa53b6a6c7b
SHA25638acb2eb810935a42e3dfb051694855f34f80b1cde5a7e0ba094caccc751fc94
SHA512116ffa49e046363cf538b81b33c082683d21f4cad5de9a2f13e5e0fabf2fd12dbacf3dcf1c09e88a46b8ff45563e3a196e40a3a2d71012ad677945986ba2c081
-
Filesize
391KB
MD576cbdc3dc3ab0b07152254c0600d588a
SHA129d62515ca97c313c07f786519bb5243485f98d1
SHA25640e36e3d334d9691f90617a475488cd988f3ec4863014ad92526d144bb885958
SHA512c8568d1e7d454d1ffdf72d61a5edb10e92834b14b82e32f1064efbe52c29735f06d546a750a60f9b733d7197e2b8e0694c0dae3a769f201f55abf90984381bcf
-
Filesize
391KB
MD576cbdc3dc3ab0b07152254c0600d588a
SHA129d62515ca97c313c07f786519bb5243485f98d1
SHA25640e36e3d334d9691f90617a475488cd988f3ec4863014ad92526d144bb885958
SHA512c8568d1e7d454d1ffdf72d61a5edb10e92834b14b82e32f1064efbe52c29735f06d546a750a60f9b733d7197e2b8e0694c0dae3a769f201f55abf90984381bcf
-
Filesize
11KB
MD55bf6bc3d5a8523694995b75a9a2f132f
SHA1ad56cb421bc1e1fb54f6328d79a3c8fab167d72d
SHA2561750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2
SHA51241e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302
-
Filesize
11KB
MD55bf6bc3d5a8523694995b75a9a2f132f
SHA1ad56cb421bc1e1fb54f6328d79a3c8fab167d72d
SHA2561750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2
SHA51241e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
175KB
MD576ba6fda17d19c0f98befbd4cc9e8e04
SHA10528c911a501eacac58b61a92a19ffa53b6a6c7b
SHA25638acb2eb810935a42e3dfb051694855f34f80b1cde5a7e0ba094caccc751fc94
SHA512116ffa49e046363cf538b81b33c082683d21f4cad5de9a2f13e5e0fabf2fd12dbacf3dcf1c09e88a46b8ff45563e3a196e40a3a2d71012ad677945986ba2c081
-
Filesize
175KB
MD576ba6fda17d19c0f98befbd4cc9e8e04
SHA10528c911a501eacac58b61a92a19ffa53b6a6c7b
SHA25638acb2eb810935a42e3dfb051694855f34f80b1cde5a7e0ba094caccc751fc94
SHA512116ffa49e046363cf538b81b33c082683d21f4cad5de9a2f13e5e0fabf2fd12dbacf3dcf1c09e88a46b8ff45563e3a196e40a3a2d71012ad677945986ba2c081
-
Filesize
391KB
MD576cbdc3dc3ab0b07152254c0600d588a
SHA129d62515ca97c313c07f786519bb5243485f98d1
SHA25640e36e3d334d9691f90617a475488cd988f3ec4863014ad92526d144bb885958
SHA512c8568d1e7d454d1ffdf72d61a5edb10e92834b14b82e32f1064efbe52c29735f06d546a750a60f9b733d7197e2b8e0694c0dae3a769f201f55abf90984381bcf
-
Filesize
391KB
MD576cbdc3dc3ab0b07152254c0600d588a
SHA129d62515ca97c313c07f786519bb5243485f98d1
SHA25640e36e3d334d9691f90617a475488cd988f3ec4863014ad92526d144bb885958
SHA512c8568d1e7d454d1ffdf72d61a5edb10e92834b14b82e32f1064efbe52c29735f06d546a750a60f9b733d7197e2b8e0694c0dae3a769f201f55abf90984381bcf
-
Filesize
11KB
MD55bf6bc3d5a8523694995b75a9a2f132f
SHA1ad56cb421bc1e1fb54f6328d79a3c8fab167d72d
SHA2561750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2
SHA51241e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd