Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/03/2023, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
e53fe3e975b1efb5b0087526a4bf57b1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e53fe3e975b1efb5b0087526a4bf57b1.exe
Resource
win10v2004-20230220-en
General
-
Target
e53fe3e975b1efb5b0087526a4bf57b1.exe
-
Size
551KB
-
MD5
e53fe3e975b1efb5b0087526a4bf57b1
-
SHA1
37bc67970f9d74a0dd9024d062086aed4d81af55
-
SHA256
80ab0bb9c21d958b5f5d784c50e31cc2565a097fb07af33ac409baa13691dd9a
-
SHA512
c2506dd4ebea6dd9c47d674f1c99770fc630dd5c0488f5dd83fb3ef372a98489e6fe4b1be444a51f1f18a0eaa65ad4f251f8961d36242a3258a1a32ec7e60fb2
-
SSDEEP
12288:eMryy90GZvcVk8EHw6c53ygq3lEAdX/0an2bGVB/WiphtWkMPtz2iEIu:EyQeQt54lEAtpLLhXGt/Ev
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw14AF47mi86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw14AF47mi86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw14AF47mi86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw14AF47mi86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw14AF47mi86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw14AF47mi86.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/768-83-0x00000000046F0000-0x0000000004736000-memory.dmp family_redline behavioral1/memory/768-84-0x0000000004850000-0x0000000004894000-memory.dmp family_redline behavioral1/memory/768-87-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-88-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-90-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-92-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-94-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-96-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-98-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-100-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-102-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-104-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-106-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-108-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-110-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-112-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-114-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-116-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-118-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-120-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-122-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-124-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-126-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-128-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-130-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-132-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-134-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-136-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-138-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-140-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-142-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-144-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-146-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-148-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-150-0x0000000004850000-0x000000000488E000-memory.dmp family_redline behavioral1/memory/768-993-0x0000000007100000-0x0000000007140000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2036 vzW5757WK.exe 1748 sw14AF47mi86.exe 768 tbv09ma38.exe 964 uWU12tq75.exe -
Loads dropped DLL 8 IoCs
pid Process 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 2036 vzW5757WK.exe 2036 vzW5757WK.exe 2036 vzW5757WK.exe 2036 vzW5757WK.exe 768 tbv09ma38.exe 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 964 uWU12tq75.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features sw14AF47mi86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw14AF47mi86.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e53fe3e975b1efb5b0087526a4bf57b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e53fe3e975b1efb5b0087526a4bf57b1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vzW5757WK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vzW5757WK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1748 sw14AF47mi86.exe 1748 sw14AF47mi86.exe 768 tbv09ma38.exe 768 tbv09ma38.exe 964 uWU12tq75.exe 964 uWU12tq75.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1748 sw14AF47mi86.exe Token: SeDebugPrivilege 768 tbv09ma38.exe Token: SeDebugPrivilege 964 uWU12tq75.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 1472 wrote to memory of 2036 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 28 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 1748 2036 vzW5757WK.exe 29 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 2036 wrote to memory of 768 2036 vzW5757WK.exe 30 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32 PID 1472 wrote to memory of 964 1472 e53fe3e975b1efb5b0087526a4bf57b1.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e53fe3e975b1efb5b0087526a4bf57b1.exe"C:\Users\Admin\AppData\Local\Temp\e53fe3e975b1efb5b0087526a4bf57b1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vzW5757WK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vzW5757WK.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14AF47mi86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14AF47mi86.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tbv09ma38.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tbv09ma38.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWU12tq75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWU12tq75.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5814dc764c7064bac840feb145fdda45a
SHA115a5a0eeba1de09fa75d95b4d26c1cff0bf0051e
SHA256a3b2168e9e1d788ea9e68943f5e03b4815e5c6c64ee70c2a01cf323667764d22
SHA512565c4f5878d19c7b79a83a64f6898d7a3811f5a30a0b3cd1d3677ee4a06e0ae48612db65d48d35999a2e9c00d16765a021cfbe514202a452845aaa01ea55abb1
-
Filesize
175KB
MD5814dc764c7064bac840feb145fdda45a
SHA115a5a0eeba1de09fa75d95b4d26c1cff0bf0051e
SHA256a3b2168e9e1d788ea9e68943f5e03b4815e5c6c64ee70c2a01cf323667764d22
SHA512565c4f5878d19c7b79a83a64f6898d7a3811f5a30a0b3cd1d3677ee4a06e0ae48612db65d48d35999a2e9c00d16765a021cfbe514202a452845aaa01ea55abb1
-
Filesize
406KB
MD50caddff7ff7f0eed8515b3cd2fd7c7af
SHA13a90853bf7a7fd6bf7ffb0b13809578ba3af9a4f
SHA2565b6c8193f754cc465e69262cfa7a7d587427e50b7f7823062a9a62b22886f07b
SHA51202d5740a77485c8ea4b7e9694a723af796d0c1d9a8e3027044927662dff1415ecf1090fd933d16fc727b53debc2d0a63385e77837f503a51eccd0abfe1eef462
-
Filesize
406KB
MD50caddff7ff7f0eed8515b3cd2fd7c7af
SHA13a90853bf7a7fd6bf7ffb0b13809578ba3af9a4f
SHA2565b6c8193f754cc465e69262cfa7a7d587427e50b7f7823062a9a62b22886f07b
SHA51202d5740a77485c8ea4b7e9694a723af796d0c1d9a8e3027044927662dff1415ecf1090fd933d16fc727b53debc2d0a63385e77837f503a51eccd0abfe1eef462
-
Filesize
12KB
MD5e09ca1e56bc1c5b4090e5f00f6006308
SHA16c3a8e59f5b6d26b91f4d7ac7e6455fa2aa3b8d4
SHA25627e445a9eda7053df702a4443c1d016d876c51a6e7f125756a8d4ca922131640
SHA5126db4659d8ad927b16d6b9c0f831f2668c16add95142b515a85470ad84cddcaa4d1353763c61543e06077442c5909d81902335a7a9bbc01b55b1443ce2eabacad
-
Filesize
12KB
MD5e09ca1e56bc1c5b4090e5f00f6006308
SHA16c3a8e59f5b6d26b91f4d7ac7e6455fa2aa3b8d4
SHA25627e445a9eda7053df702a4443c1d016d876c51a6e7f125756a8d4ca922131640
SHA5126db4659d8ad927b16d6b9c0f831f2668c16add95142b515a85470ad84cddcaa4d1353763c61543e06077442c5909d81902335a7a9bbc01b55b1443ce2eabacad
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c
-
Filesize
175KB
MD5814dc764c7064bac840feb145fdda45a
SHA115a5a0eeba1de09fa75d95b4d26c1cff0bf0051e
SHA256a3b2168e9e1d788ea9e68943f5e03b4815e5c6c64ee70c2a01cf323667764d22
SHA512565c4f5878d19c7b79a83a64f6898d7a3811f5a30a0b3cd1d3677ee4a06e0ae48612db65d48d35999a2e9c00d16765a021cfbe514202a452845aaa01ea55abb1
-
Filesize
175KB
MD5814dc764c7064bac840feb145fdda45a
SHA115a5a0eeba1de09fa75d95b4d26c1cff0bf0051e
SHA256a3b2168e9e1d788ea9e68943f5e03b4815e5c6c64ee70c2a01cf323667764d22
SHA512565c4f5878d19c7b79a83a64f6898d7a3811f5a30a0b3cd1d3677ee4a06e0ae48612db65d48d35999a2e9c00d16765a021cfbe514202a452845aaa01ea55abb1
-
Filesize
406KB
MD50caddff7ff7f0eed8515b3cd2fd7c7af
SHA13a90853bf7a7fd6bf7ffb0b13809578ba3af9a4f
SHA2565b6c8193f754cc465e69262cfa7a7d587427e50b7f7823062a9a62b22886f07b
SHA51202d5740a77485c8ea4b7e9694a723af796d0c1d9a8e3027044927662dff1415ecf1090fd933d16fc727b53debc2d0a63385e77837f503a51eccd0abfe1eef462
-
Filesize
406KB
MD50caddff7ff7f0eed8515b3cd2fd7c7af
SHA13a90853bf7a7fd6bf7ffb0b13809578ba3af9a4f
SHA2565b6c8193f754cc465e69262cfa7a7d587427e50b7f7823062a9a62b22886f07b
SHA51202d5740a77485c8ea4b7e9694a723af796d0c1d9a8e3027044927662dff1415ecf1090fd933d16fc727b53debc2d0a63385e77837f503a51eccd0abfe1eef462
-
Filesize
12KB
MD5e09ca1e56bc1c5b4090e5f00f6006308
SHA16c3a8e59f5b6d26b91f4d7ac7e6455fa2aa3b8d4
SHA25627e445a9eda7053df702a4443c1d016d876c51a6e7f125756a8d4ca922131640
SHA5126db4659d8ad927b16d6b9c0f831f2668c16add95142b515a85470ad84cddcaa4d1353763c61543e06077442c5909d81902335a7a9bbc01b55b1443ce2eabacad
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c
-
Filesize
381KB
MD557b4e73c1d36751cb60a4d2e68594087
SHA10e371eaad20ebbb81735876f0f1703adee193117
SHA25639f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25
SHA512e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c