Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe
Resource
win10v2004-20230220-en
General
-
Target
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe
-
Size
686KB
-
MD5
0d88bb7e2c87029c60f7dc4ff9c96b9e
-
SHA1
7414b47b0831b73f297e4cf7692f1bb7abf1ebfc
-
SHA256
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047
-
SHA512
239559e6bff3a55405372333a589f6d09f1cc5f9f16214880170d7cf312c2ada2ef68e70b5e4f4425ceb87d2064849a41c0799e02543784146c8dbe3e2d0173a
-
SSDEEP
12288:IMrfy90j872tpvCck7igA3bwcEDG6rz4F28PeVB:XyQ88vCcj3eH
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
Processes:
pro0356.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0356.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro0356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0356.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/952-123-0x0000000002F90000-0x0000000002FD6000-memory.dmp family_redline behavioral1/memory/952-124-0x0000000004760000-0x00000000047A4000-memory.dmp family_redline behavioral1/memory/952-125-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-126-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-128-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-130-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-132-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-134-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-136-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-138-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-140-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-144-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-147-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-149-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-151-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-153-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-155-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-157-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-159-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-161-0x0000000004760000-0x000000000479F000-memory.dmp family_redline behavioral1/memory/952-1034-0x00000000072B0000-0x00000000072F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un712245.exepro0356.exequ9583.exesi946240.exepid process 1956 un712245.exe 1880 pro0356.exe 952 qu9583.exe 2008 si946240.exe -
Loads dropped DLL 10 IoCs
Processes:
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exeun712245.exepro0356.exequ9583.exesi946240.exepid process 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe 1956 un712245.exe 1956 un712245.exe 1956 un712245.exe 1880 pro0356.exe 1956 un712245.exe 1956 un712245.exe 952 qu9583.exe 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe 2008 si946240.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0356.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro0356.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0356.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exeun712245.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un712245.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un712245.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0356.exequ9583.exesi946240.exepid process 1880 pro0356.exe 1880 pro0356.exe 952 qu9583.exe 952 qu9583.exe 2008 si946240.exe 2008 si946240.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro0356.exequ9583.exesi946240.exedescription pid process Token: SeDebugPrivilege 1880 pro0356.exe Token: SeDebugPrivilege 952 qu9583.exe Token: SeDebugPrivilege 2008 si946240.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exeun712245.exedescription pid process target process PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1996 wrote to memory of 1956 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe un712245.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 1880 1956 un712245.exe pro0356.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1956 wrote to memory of 952 1956 un712245.exe qu9583.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe PID 1996 wrote to memory of 2008 1996 ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe si946240.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe"C:\Users\Admin\AppData\Local\Temp\ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712245.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0356.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0356.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9583.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si946240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si946240.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55ba96f6efcd007600da92fba3075f3a5
SHA1324faf230f568717723197f0f75b67f19d4fb61e
SHA2565667014a8e356fcc7fcfb2b677aa3b0c07b7505365f96be5aeb941710c4c9c5c
SHA512070becaa2b8dc7c50341ee85c114b0e78ff9c97f2f265806b463d116551c354069a4ed0a74eb6df9077007fa070517da2444b76a15b22523b37b10e12eb06a03
-
Filesize
175KB
MD55ba96f6efcd007600da92fba3075f3a5
SHA1324faf230f568717723197f0f75b67f19d4fb61e
SHA2565667014a8e356fcc7fcfb2b677aa3b0c07b7505365f96be5aeb941710c4c9c5c
SHA512070becaa2b8dc7c50341ee85c114b0e78ff9c97f2f265806b463d116551c354069a4ed0a74eb6df9077007fa070517da2444b76a15b22523b37b10e12eb06a03
-
Filesize
544KB
MD5bd29651e643da0bcf6e5952866966988
SHA1ac65d4a469bf89bf74050e7f1dc1bb2ee46fe619
SHA25639b7116e751311bf13caa0ab98f24044439a42f4874f39a68fb78a2128aeee8f
SHA512ffd19342894ba9dd2759608c46552668a89e2f1df78dced69d1ba40f8b4e64ab862427ec5034ac4ae9e91649d92f0b526ccdd1836244210624ddcc7b0cb27564
-
Filesize
544KB
MD5bd29651e643da0bcf6e5952866966988
SHA1ac65d4a469bf89bf74050e7f1dc1bb2ee46fe619
SHA25639b7116e751311bf13caa0ab98f24044439a42f4874f39a68fb78a2128aeee8f
SHA512ffd19342894ba9dd2759608c46552668a89e2f1df78dced69d1ba40f8b4e64ab862427ec5034ac4ae9e91649d92f0b526ccdd1836244210624ddcc7b0cb27564
-
Filesize
325KB
MD5b46cb1ee4174f806a5a65e38f0db2f95
SHA1e005af1f88340a3a034f53504aec3aa24e81cae8
SHA256bc6cb3834313a3e4910c0bafcb9ad8f088682134f2a00eccac260c1986a4d40e
SHA512ad5cbe6ce0bfd46cc758c1de59859a1cdeb9cc9835d61136e89e4f9de1342d2751241bb484fcbe372ddd4b4ef0d6e2e663df4ca884ec1fe496906d7fe83d5728
-
Filesize
325KB
MD5b46cb1ee4174f806a5a65e38f0db2f95
SHA1e005af1f88340a3a034f53504aec3aa24e81cae8
SHA256bc6cb3834313a3e4910c0bafcb9ad8f088682134f2a00eccac260c1986a4d40e
SHA512ad5cbe6ce0bfd46cc758c1de59859a1cdeb9cc9835d61136e89e4f9de1342d2751241bb484fcbe372ddd4b4ef0d6e2e663df4ca884ec1fe496906d7fe83d5728
-
Filesize
325KB
MD5b46cb1ee4174f806a5a65e38f0db2f95
SHA1e005af1f88340a3a034f53504aec3aa24e81cae8
SHA256bc6cb3834313a3e4910c0bafcb9ad8f088682134f2a00eccac260c1986a4d40e
SHA512ad5cbe6ce0bfd46cc758c1de59859a1cdeb9cc9835d61136e89e4f9de1342d2751241bb484fcbe372ddd4b4ef0d6e2e663df4ca884ec1fe496906d7fe83d5728
-
Filesize
384KB
MD58898a515a2c2b8a19b46a355db77ed04
SHA18fc1da0d0bac95a0673b865e0ee0af65b000b29e
SHA256a7ee899c6fd19f7bf1f9de76c5ffa43a5b04ee27638d36439c7fdcef2e21e2f6
SHA512e1e4a10c9baba9106a4a7bcb92630dfcf512618609c69222e7e935168241ba4980b6e245610622d3c15bf68553beeda68ba47f2ca63750de65b196a5ad51260c
-
Filesize
384KB
MD58898a515a2c2b8a19b46a355db77ed04
SHA18fc1da0d0bac95a0673b865e0ee0af65b000b29e
SHA256a7ee899c6fd19f7bf1f9de76c5ffa43a5b04ee27638d36439c7fdcef2e21e2f6
SHA512e1e4a10c9baba9106a4a7bcb92630dfcf512618609c69222e7e935168241ba4980b6e245610622d3c15bf68553beeda68ba47f2ca63750de65b196a5ad51260c
-
Filesize
384KB
MD58898a515a2c2b8a19b46a355db77ed04
SHA18fc1da0d0bac95a0673b865e0ee0af65b000b29e
SHA256a7ee899c6fd19f7bf1f9de76c5ffa43a5b04ee27638d36439c7fdcef2e21e2f6
SHA512e1e4a10c9baba9106a4a7bcb92630dfcf512618609c69222e7e935168241ba4980b6e245610622d3c15bf68553beeda68ba47f2ca63750de65b196a5ad51260c
-
Filesize
175KB
MD55ba96f6efcd007600da92fba3075f3a5
SHA1324faf230f568717723197f0f75b67f19d4fb61e
SHA2565667014a8e356fcc7fcfb2b677aa3b0c07b7505365f96be5aeb941710c4c9c5c
SHA512070becaa2b8dc7c50341ee85c114b0e78ff9c97f2f265806b463d116551c354069a4ed0a74eb6df9077007fa070517da2444b76a15b22523b37b10e12eb06a03
-
Filesize
175KB
MD55ba96f6efcd007600da92fba3075f3a5
SHA1324faf230f568717723197f0f75b67f19d4fb61e
SHA2565667014a8e356fcc7fcfb2b677aa3b0c07b7505365f96be5aeb941710c4c9c5c
SHA512070becaa2b8dc7c50341ee85c114b0e78ff9c97f2f265806b463d116551c354069a4ed0a74eb6df9077007fa070517da2444b76a15b22523b37b10e12eb06a03
-
Filesize
544KB
MD5bd29651e643da0bcf6e5952866966988
SHA1ac65d4a469bf89bf74050e7f1dc1bb2ee46fe619
SHA25639b7116e751311bf13caa0ab98f24044439a42f4874f39a68fb78a2128aeee8f
SHA512ffd19342894ba9dd2759608c46552668a89e2f1df78dced69d1ba40f8b4e64ab862427ec5034ac4ae9e91649d92f0b526ccdd1836244210624ddcc7b0cb27564
-
Filesize
544KB
MD5bd29651e643da0bcf6e5952866966988
SHA1ac65d4a469bf89bf74050e7f1dc1bb2ee46fe619
SHA25639b7116e751311bf13caa0ab98f24044439a42f4874f39a68fb78a2128aeee8f
SHA512ffd19342894ba9dd2759608c46552668a89e2f1df78dced69d1ba40f8b4e64ab862427ec5034ac4ae9e91649d92f0b526ccdd1836244210624ddcc7b0cb27564
-
Filesize
325KB
MD5b46cb1ee4174f806a5a65e38f0db2f95
SHA1e005af1f88340a3a034f53504aec3aa24e81cae8
SHA256bc6cb3834313a3e4910c0bafcb9ad8f088682134f2a00eccac260c1986a4d40e
SHA512ad5cbe6ce0bfd46cc758c1de59859a1cdeb9cc9835d61136e89e4f9de1342d2751241bb484fcbe372ddd4b4ef0d6e2e663df4ca884ec1fe496906d7fe83d5728
-
Filesize
325KB
MD5b46cb1ee4174f806a5a65e38f0db2f95
SHA1e005af1f88340a3a034f53504aec3aa24e81cae8
SHA256bc6cb3834313a3e4910c0bafcb9ad8f088682134f2a00eccac260c1986a4d40e
SHA512ad5cbe6ce0bfd46cc758c1de59859a1cdeb9cc9835d61136e89e4f9de1342d2751241bb484fcbe372ddd4b4ef0d6e2e663df4ca884ec1fe496906d7fe83d5728
-
Filesize
325KB
MD5b46cb1ee4174f806a5a65e38f0db2f95
SHA1e005af1f88340a3a034f53504aec3aa24e81cae8
SHA256bc6cb3834313a3e4910c0bafcb9ad8f088682134f2a00eccac260c1986a4d40e
SHA512ad5cbe6ce0bfd46cc758c1de59859a1cdeb9cc9835d61136e89e4f9de1342d2751241bb484fcbe372ddd4b4ef0d6e2e663df4ca884ec1fe496906d7fe83d5728
-
Filesize
384KB
MD58898a515a2c2b8a19b46a355db77ed04
SHA18fc1da0d0bac95a0673b865e0ee0af65b000b29e
SHA256a7ee899c6fd19f7bf1f9de76c5ffa43a5b04ee27638d36439c7fdcef2e21e2f6
SHA512e1e4a10c9baba9106a4a7bcb92630dfcf512618609c69222e7e935168241ba4980b6e245610622d3c15bf68553beeda68ba47f2ca63750de65b196a5ad51260c
-
Filesize
384KB
MD58898a515a2c2b8a19b46a355db77ed04
SHA18fc1da0d0bac95a0673b865e0ee0af65b000b29e
SHA256a7ee899c6fd19f7bf1f9de76c5ffa43a5b04ee27638d36439c7fdcef2e21e2f6
SHA512e1e4a10c9baba9106a4a7bcb92630dfcf512618609c69222e7e935168241ba4980b6e245610622d3c15bf68553beeda68ba47f2ca63750de65b196a5ad51260c
-
Filesize
384KB
MD58898a515a2c2b8a19b46a355db77ed04
SHA18fc1da0d0bac95a0673b865e0ee0af65b000b29e
SHA256a7ee899c6fd19f7bf1f9de76c5ffa43a5b04ee27638d36439c7fdcef2e21e2f6
SHA512e1e4a10c9baba9106a4a7bcb92630dfcf512618609c69222e7e935168241ba4980b6e245610622d3c15bf68553beeda68ba47f2ca63750de65b196a5ad51260c