Analysis
-
max time kernel
159s -
max time network
221s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe
Resource
win10v2004-20230220-en
General
-
Target
e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe
-
Size
892KB
-
MD5
9367f1dfd5707f3b04fd22571e8c2eb7
-
SHA1
176bc7c076599f826285e1885c291e7b68f65c32
-
SHA256
e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6
-
SHA512
60ab39e5c33eee9634733b0efe07249ee0c653c27eb761acdb0abaac67a6f5ac2c8141894967c211ede6391e8d90a5d1461b09c48240b3f718e08a002465dc87
-
SSDEEP
12288:Ny90KB8I0F3ZHzO9U0Z/42gKztNK/AFzTLcU2GD7loX8l3hIURhVQ6kMz8KE+IGn:NyjBf0hB/0G6tFFwv8PIUZ79o+jgdv0
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 436 st851324.exe 1208 24069073.exe 1660 1.exe 1752 kp413656.exe 1788 lr819265.exe -
Loads dropped DLL 10 IoCs
pid Process 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 436 st851324.exe 436 st851324.exe 1208 24069073.exe 1208 24069073.exe 436 st851324.exe 436 st851324.exe 1752 kp413656.exe 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 1788 lr819265.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st851324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st851324.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1660 1.exe 1660 1.exe 1788 lr819265.exe 1788 lr819265.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1208 24069073.exe Token: SeDebugPrivilege 1752 kp413656.exe Token: SeDebugPrivilege 1660 1.exe Token: SeDebugPrivilege 1788 lr819265.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 996 wrote to memory of 436 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 28 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 436 wrote to memory of 1208 436 st851324.exe 29 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 1208 wrote to memory of 1660 1208 24069073.exe 30 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 436 wrote to memory of 1752 436 st851324.exe 31 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32 PID 996 wrote to memory of 1788 996 e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe"C:\Users\Admin\AppData\Local\Temp\e33a105a29f944308542b0f19ccae48959e086a28d12f48b0be98d3aa9e897b6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st851324.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st851324.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24069073.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24069073.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp413656.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp413656.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr819265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr819265.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5a81ab2d5924337dd5bb5808fb19219fe
SHA10f213de40de3acd20f0b0ad36504b65885049fec
SHA256e270901f007143afaf4ffcce3bf3458385ee6542cfc0c5c7dc400ec913b99a49
SHA512bf1473d588e5c9f54085380e0b32646f4a280eef97327ce65b43c13c59f232f8450489a3565ba9091e89b3a3bf79d7da9f8047deb9b803af4381137ececa46cb
-
Filesize
170KB
MD5a81ab2d5924337dd5bb5808fb19219fe
SHA10f213de40de3acd20f0b0ad36504b65885049fec
SHA256e270901f007143afaf4ffcce3bf3458385ee6542cfc0c5c7dc400ec913b99a49
SHA512bf1473d588e5c9f54085380e0b32646f4a280eef97327ce65b43c13c59f232f8450489a3565ba9091e89b3a3bf79d7da9f8047deb9b803af4381137ececa46cb
-
Filesize
739KB
MD56e7517f9577c392708faad93cf1a191f
SHA1c144545bee9c56052287ecb708fb92979d803180
SHA25687ac4fcfe6f6bbf91cbcefe1e7ff6982c18a114a84d7e57e7882055cea2af698
SHA512b7043512a9f06be08fdcd3b58feab2144ed760c38fdd45fce8add967f98f0b2474cc3bf56fc1437f537e4f7bd792acd47ef72e66949bf12b40b76a347d4c239e
-
Filesize
739KB
MD56e7517f9577c392708faad93cf1a191f
SHA1c144545bee9c56052287ecb708fb92979d803180
SHA25687ac4fcfe6f6bbf91cbcefe1e7ff6982c18a114a84d7e57e7882055cea2af698
SHA512b7043512a9f06be08fdcd3b58feab2144ed760c38fdd45fce8add967f98f0b2474cc3bf56fc1437f537e4f7bd792acd47ef72e66949bf12b40b76a347d4c239e
-
Filesize
303KB
MD55dc544d72a0693e8924ca5b5d15b1d6a
SHA13d8b9b8f4e87e2f22b8a33f60f44bcdbe9bb1097
SHA256036d937d8dee7a042b3395c4693c7a2cc2243cb52ba1ad56269bc35df21b54a6
SHA5125b464317f7eaa753a415fded6f6d74e83719e5b0270743b8304d54954bed88a5c40ced580e26e18ec378b38fcc6ba41756fdfab0bd377c40d0e8c22d05dcde05
-
Filesize
303KB
MD55dc544d72a0693e8924ca5b5d15b1d6a
SHA13d8b9b8f4e87e2f22b8a33f60f44bcdbe9bb1097
SHA256036d937d8dee7a042b3395c4693c7a2cc2243cb52ba1ad56269bc35df21b54a6
SHA5125b464317f7eaa753a415fded6f6d74e83719e5b0270743b8304d54954bed88a5c40ced580e26e18ec378b38fcc6ba41756fdfab0bd377c40d0e8c22d05dcde05
-
Filesize
576KB
MD5a70df9141ccb81ab53771363eb005816
SHA13541c3af3e324e0b0140aef8f56032b159ba5231
SHA2569b2a7968163a140626515cea4f47264b0397b75f456e87024c3b723e0ce7c49a
SHA5128d22effef63dddfcc9ecce674e500beeab665b9975e100f87061b95765f63ce5e6bfbfb3bc626a9c3b4cad5554e8835af7f97575dca9e01f0e43152d025ec327
-
Filesize
576KB
MD5a70df9141ccb81ab53771363eb005816
SHA13541c3af3e324e0b0140aef8f56032b159ba5231
SHA2569b2a7968163a140626515cea4f47264b0397b75f456e87024c3b723e0ce7c49a
SHA5128d22effef63dddfcc9ecce674e500beeab665b9975e100f87061b95765f63ce5e6bfbfb3bc626a9c3b4cad5554e8835af7f97575dca9e01f0e43152d025ec327
-
Filesize
576KB
MD5a70df9141ccb81ab53771363eb005816
SHA13541c3af3e324e0b0140aef8f56032b159ba5231
SHA2569b2a7968163a140626515cea4f47264b0397b75f456e87024c3b723e0ce7c49a
SHA5128d22effef63dddfcc9ecce674e500beeab665b9975e100f87061b95765f63ce5e6bfbfb3bc626a9c3b4cad5554e8835af7f97575dca9e01f0e43152d025ec327
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
170KB
MD5a81ab2d5924337dd5bb5808fb19219fe
SHA10f213de40de3acd20f0b0ad36504b65885049fec
SHA256e270901f007143afaf4ffcce3bf3458385ee6542cfc0c5c7dc400ec913b99a49
SHA512bf1473d588e5c9f54085380e0b32646f4a280eef97327ce65b43c13c59f232f8450489a3565ba9091e89b3a3bf79d7da9f8047deb9b803af4381137ececa46cb
-
Filesize
170KB
MD5a81ab2d5924337dd5bb5808fb19219fe
SHA10f213de40de3acd20f0b0ad36504b65885049fec
SHA256e270901f007143afaf4ffcce3bf3458385ee6542cfc0c5c7dc400ec913b99a49
SHA512bf1473d588e5c9f54085380e0b32646f4a280eef97327ce65b43c13c59f232f8450489a3565ba9091e89b3a3bf79d7da9f8047deb9b803af4381137ececa46cb
-
Filesize
739KB
MD56e7517f9577c392708faad93cf1a191f
SHA1c144545bee9c56052287ecb708fb92979d803180
SHA25687ac4fcfe6f6bbf91cbcefe1e7ff6982c18a114a84d7e57e7882055cea2af698
SHA512b7043512a9f06be08fdcd3b58feab2144ed760c38fdd45fce8add967f98f0b2474cc3bf56fc1437f537e4f7bd792acd47ef72e66949bf12b40b76a347d4c239e
-
Filesize
739KB
MD56e7517f9577c392708faad93cf1a191f
SHA1c144545bee9c56052287ecb708fb92979d803180
SHA25687ac4fcfe6f6bbf91cbcefe1e7ff6982c18a114a84d7e57e7882055cea2af698
SHA512b7043512a9f06be08fdcd3b58feab2144ed760c38fdd45fce8add967f98f0b2474cc3bf56fc1437f537e4f7bd792acd47ef72e66949bf12b40b76a347d4c239e
-
Filesize
303KB
MD55dc544d72a0693e8924ca5b5d15b1d6a
SHA13d8b9b8f4e87e2f22b8a33f60f44bcdbe9bb1097
SHA256036d937d8dee7a042b3395c4693c7a2cc2243cb52ba1ad56269bc35df21b54a6
SHA5125b464317f7eaa753a415fded6f6d74e83719e5b0270743b8304d54954bed88a5c40ced580e26e18ec378b38fcc6ba41756fdfab0bd377c40d0e8c22d05dcde05
-
Filesize
303KB
MD55dc544d72a0693e8924ca5b5d15b1d6a
SHA13d8b9b8f4e87e2f22b8a33f60f44bcdbe9bb1097
SHA256036d937d8dee7a042b3395c4693c7a2cc2243cb52ba1ad56269bc35df21b54a6
SHA5125b464317f7eaa753a415fded6f6d74e83719e5b0270743b8304d54954bed88a5c40ced580e26e18ec378b38fcc6ba41756fdfab0bd377c40d0e8c22d05dcde05
-
Filesize
576KB
MD5a70df9141ccb81ab53771363eb005816
SHA13541c3af3e324e0b0140aef8f56032b159ba5231
SHA2569b2a7968163a140626515cea4f47264b0397b75f456e87024c3b723e0ce7c49a
SHA5128d22effef63dddfcc9ecce674e500beeab665b9975e100f87061b95765f63ce5e6bfbfb3bc626a9c3b4cad5554e8835af7f97575dca9e01f0e43152d025ec327
-
Filesize
576KB
MD5a70df9141ccb81ab53771363eb005816
SHA13541c3af3e324e0b0140aef8f56032b159ba5231
SHA2569b2a7968163a140626515cea4f47264b0397b75f456e87024c3b723e0ce7c49a
SHA5128d22effef63dddfcc9ecce674e500beeab665b9975e100f87061b95765f63ce5e6bfbfb3bc626a9c3b4cad5554e8835af7f97575dca9e01f0e43152d025ec327
-
Filesize
576KB
MD5a70df9141ccb81ab53771363eb005816
SHA13541c3af3e324e0b0140aef8f56032b159ba5231
SHA2569b2a7968163a140626515cea4f47264b0397b75f456e87024c3b723e0ce7c49a
SHA5128d22effef63dddfcc9ecce674e500beeab665b9975e100f87061b95765f63ce5e6bfbfb3bc626a9c3b4cad5554e8835af7f97575dca9e01f0e43152d025ec327
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91