Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 01:19
Static task
static1
Behavioral task
behavioral1
Sample
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
Resource
win10v2004-20230221-en
General
-
Target
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
-
Size
685KB
-
MD5
354c85a42efa4053b0dcaec9feb41be3
-
SHA1
4f05959c72e73ed28d40436010218f72b46ffdbe
-
SHA256
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926
-
SHA512
138b18137a879633b2bf4603e1b86005c2fa7b0b6f6dc70e57181b7f0ea32184480d0583e3e3bcf8c9a379e10f75c695c9f880d4aa25c30fd6ca7ac005846d8a
-
SSDEEP
12288:pMrSy90t6ss+VnNqL4GEjlX8eoNK6xR4O2UtcL:Tya6vmpFuDS
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6913.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6913.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/1548-123-0x0000000004A80000-0x0000000004AC6000-memory.dmp family_redline behavioral1/memory/1548-124-0x0000000004BD0000-0x0000000004C14000-memory.dmp family_redline behavioral1/memory/1548-125-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-128-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-126-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-130-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-132-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-134-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-138-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-140-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-142-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-136-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-144-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-146-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-148-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-150-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-152-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-154-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-156-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-158-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1548-232-0x0000000007180000-0x00000000071C0000-memory.dmp family_redline behavioral1/memory/1548-234-0x0000000007180000-0x00000000071C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1040 un367709.exe 924 pro6913.exe 1548 qu8195.exe 768 si747782.exe -
Loads dropped DLL 10 IoCs
pid Process 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 1040 un367709.exe 1040 un367709.exe 1040 un367709.exe 924 pro6913.exe 1040 un367709.exe 1040 un367709.exe 1548 qu8195.exe 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 768 si747782.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro6913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6913.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un367709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367709.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 924 pro6913.exe 924 pro6913.exe 1548 qu8195.exe 1548 qu8195.exe 768 si747782.exe 768 si747782.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 924 pro6913.exe Token: SeDebugPrivilege 1548 qu8195.exe Token: SeDebugPrivilege 768 si747782.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1212 wrote to memory of 1040 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 27 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 924 1040 un367709.exe 28 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1040 wrote to memory of 1548 1040 un367709.exe 29 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31 PID 1212 wrote to memory of 768 1212 1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe"C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e9f9779e92165c69a7112053119e75b4
SHA187b846a405f18401d20d4c7f304268978a275b81
SHA2566ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80
SHA512bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588
-
Filesize
175KB
MD5e9f9779e92165c69a7112053119e75b4
SHA187b846a405f18401d20d4c7f304268978a275b81
SHA2566ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80
SHA512bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588
-
Filesize
543KB
MD5633a9200ed34ce8e7a729c20afc19bb5
SHA102de5622d86a8eb7da44f2b402f6f619d4292237
SHA256a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba
SHA512a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754
-
Filesize
543KB
MD5633a9200ed34ce8e7a729c20afc19bb5
SHA102de5622d86a8eb7da44f2b402f6f619d4292237
SHA256a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba
SHA512a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1
-
Filesize
175KB
MD5e9f9779e92165c69a7112053119e75b4
SHA187b846a405f18401d20d4c7f304268978a275b81
SHA2566ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80
SHA512bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588
-
Filesize
175KB
MD5e9f9779e92165c69a7112053119e75b4
SHA187b846a405f18401d20d4c7f304268978a275b81
SHA2566ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80
SHA512bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588
-
Filesize
543KB
MD5633a9200ed34ce8e7a729c20afc19bb5
SHA102de5622d86a8eb7da44f2b402f6f619d4292237
SHA256a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba
SHA512a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754
-
Filesize
543KB
MD5633a9200ed34ce8e7a729c20afc19bb5
SHA102de5622d86a8eb7da44f2b402f6f619d4292237
SHA256a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba
SHA512a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
325KB
MD5fb0039dd07a09f950d3e082befb74985
SHA152213dfee0e2214edf1b81ec7c7d04e8922f2e4b
SHA256ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467
SHA5125ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1
-
Filesize
384KB
MD599f1d755774dc0429dbbdf5b991c14b3
SHA10c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd
SHA256a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb
SHA512699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1