Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2023 08:23
Static task
static1
Behavioral task
behavioral1
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win10v2004-20230220-en
General
-
Target
e88c37f1bb15fcbe857ee8c4d526153f.exe
-
Size
1.9MB
-
MD5
e88c37f1bb15fcbe857ee8c4d526153f
-
SHA1
c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b
-
SHA256
9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f
-
SHA512
8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164
-
SSDEEP
49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e88c37f1bb15fcbe857ee8c4d526153f.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e32Lke3.exe -
Executes dropped EXE 4 IoCs
pid Process 4152 cqb3grs.exe 4772 o02kvf1u.exe 960 e32Lke3.exe 2468 svcservice.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" e32Lke3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4152 set thread context of 4820 4152 cqb3grs.exe 87 PID 4772 set thread context of 4468 4772 o02kvf1u.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4688 4152 WerFault.exe 84 3520 4772 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4820 RegSvcs.exe 4820 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4820 RegSvcs.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4152 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 84 PID 1932 wrote to memory of 4152 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 84 PID 1932 wrote to memory of 4152 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 84 PID 4152 wrote to memory of 4820 4152 cqb3grs.exe 87 PID 4152 wrote to memory of 4820 4152 cqb3grs.exe 87 PID 4152 wrote to memory of 4820 4152 cqb3grs.exe 87 PID 4152 wrote to memory of 4820 4152 cqb3grs.exe 87 PID 4152 wrote to memory of 4820 4152 cqb3grs.exe 87 PID 1932 wrote to memory of 4772 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 90 PID 1932 wrote to memory of 4772 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 90 PID 1932 wrote to memory of 4772 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 90 PID 4772 wrote to memory of 4468 4772 o02kvf1u.exe 95 PID 4772 wrote to memory of 4468 4772 o02kvf1u.exe 95 PID 4772 wrote to memory of 4468 4772 o02kvf1u.exe 95 PID 4772 wrote to memory of 4468 4772 o02kvf1u.exe 95 PID 4772 wrote to memory of 4468 4772 o02kvf1u.exe 95 PID 1932 wrote to memory of 960 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 99 PID 1932 wrote to memory of 960 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 99 PID 1932 wrote to memory of 960 1932 e88c37f1bb15fcbe857ee8c4d526153f.exe 99 PID 960 wrote to memory of 2468 960 e32Lke3.exe 101 PID 960 wrote to memory of 2468 960 e32Lke3.exe 101 PID 960 wrote to memory of 2468 960 e32Lke3.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 2843⤵
- Program crash
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1563⤵
- Program crash
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
PID:2468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4152 -ip 41521⤵PID:3140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4772 -ip 47721⤵PID:3868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
503.0MB
MD5cdbfe2b213d49641311f8d26d8301acf
SHA1052600ff5aec27a9720a63e8c51ebad2442ad245
SHA256c439eb2a54d261df0ac6fab6c5e03de421c4d8adc51399dc0f1883ade4668560
SHA512fc789205a1addd6d2af247d2a08d11f34ae221a4fe94767fe27e8dbb798993c7a89a6f000af20a116fcf6936d7f71493c6e2a4ca20ea99a3ca3204934e23afef
-
Filesize
482.2MB
MD50bebec62cfb19d21b6e76b1a59d94823
SHA19b2108575ca248ea5fe3f7e0c530fa41b96a03c9
SHA25690ad1addae629f5254ad945ae174f857ce59dbb0f461eee64cc75e2ffacfe7d1
SHA51266998911367c89a9dd49a4fbe5b90593eb75484bb6d065ffe10e741728b4055591ed06b6ff53bb5235095a2fe8bacc5ca357a8b382a7ebbf8bd05f056f80067b