Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2023 08:22
Static task
static1
Behavioral task
behavioral1
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win10v2004-20230220-en
General
-
Target
e88c37f1bb15fcbe857ee8c4d526153f.exe
-
Size
1.9MB
-
MD5
e88c37f1bb15fcbe857ee8c4d526153f
-
SHA1
c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b
-
SHA256
9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f
-
SHA512
8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164
-
SSDEEP
49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e88c37f1bb15fcbe857ee8c4d526153f.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e32Lke3.exe -
Executes dropped EXE 4 IoCs
pid Process 3308 cqb3grs.exe 3472 o02kvf1u.exe 3416 e32Lke3.exe 3016 svcservice.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" e32Lke3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3308 set thread context of 1516 3308 cqb3grs.exe 88 PID 3472 set thread context of 1772 3472 o02kvf1u.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4028 3308 WerFault.exe 85 2188 3472 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1516 RegSvcs.exe 1516 RegSvcs.exe 1516 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 RegSvcs.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3928 wrote to memory of 3308 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 85 PID 3928 wrote to memory of 3308 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 85 PID 3928 wrote to memory of 3308 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 85 PID 3308 wrote to memory of 1516 3308 cqb3grs.exe 88 PID 3308 wrote to memory of 1516 3308 cqb3grs.exe 88 PID 3308 wrote to memory of 1516 3308 cqb3grs.exe 88 PID 3308 wrote to memory of 1516 3308 cqb3grs.exe 88 PID 3308 wrote to memory of 1516 3308 cqb3grs.exe 88 PID 3928 wrote to memory of 3472 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 92 PID 3928 wrote to memory of 3472 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 92 PID 3928 wrote to memory of 3472 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 92 PID 3472 wrote to memory of 1772 3472 o02kvf1u.exe 98 PID 3472 wrote to memory of 1772 3472 o02kvf1u.exe 98 PID 3472 wrote to memory of 1772 3472 o02kvf1u.exe 98 PID 3472 wrote to memory of 1772 3472 o02kvf1u.exe 98 PID 3472 wrote to memory of 1772 3472 o02kvf1u.exe 98 PID 3928 wrote to memory of 3416 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 102 PID 3928 wrote to memory of 3416 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 102 PID 3928 wrote to memory of 3416 3928 e88c37f1bb15fcbe857ee8c4d526153f.exe 102 PID 3416 wrote to memory of 3016 3416 e32Lke3.exe 105 PID 3416 wrote to memory of 3016 3416 e32Lke3.exe 105 PID 3416 wrote to memory of 3016 3416 e32Lke3.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 1483⤵
- Program crash
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 1363⤵
- Program crash
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
PID:3016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3308 -ip 33081⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3472 -ip 34721⤵PID:4228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
485.4MB
MD521ccf3f366eee4e0f5d284a4115b9d14
SHA1c56855e75d49792d5e2981538f41cea2184bd0b1
SHA25675e50df546ef906c4f78732b3fe69c348c5420a2a5c9479e4ef1a6f5dc333cda
SHA5126e66dfa0c9f08322cbbfc7c46f8035334ce2ae33022ae253156b6d72a900249df01fe6be50376219e5365406d26aed93c76c7925d7cd141717ff9eb3a873f8c0
-
Filesize
466.9MB
MD531bfb3587481b8ee136f71bdbcbefbbb
SHA16e0ced87aa91e0caf230990060352dd8cd18c7b7
SHA2562579a920880e07fc98ebd238b1150397ecf5cb732cbf3f8c631f1a36c63addcc
SHA512d0f24aa94d7cacdd17e569d474601db95ff2be57f018f849ad295e4d0ce27b0eb377d950132d9a86bc90f22022307eaf7c7e461e582837d6ff0875ddca3df958