Analysis
-
max time kernel
140s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe
Resource
win10v2004-20230220-en
General
-
Target
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe
-
Size
867KB
-
MD5
611bcdefc9d0594880829c7818761b1b
-
SHA1
531b604af323a84a2eb94f38240d27efbb3572f1
-
SHA256
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a
-
SHA512
32371bd9c0f43832ac50da120921561a2da9a0bd50a960792b001155c6959953b551b979d008e807ed73f421b5265b15bb54da522976428f2d13ca9b1c55734c
-
SSDEEP
12288:8y90PUO4AQyW4gCUQT7J7r1p97jZR1gfyODr8p4I2+HqcAjjHvGTSX:8yxO4AQyW4gi7r/NjZR1er8czv3+TG
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s95104272.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1916 y18722232.exe 1100 p32189937.exe 1944 1.exe 740 r94540111.exe 1996 s95104272.exe -
Loads dropped DLL 12 IoCs
pid Process 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 1916 y18722232.exe 1916 y18722232.exe 1916 y18722232.exe 1100 p32189937.exe 1100 p32189937.exe 1944 1.exe 1916 y18722232.exe 740 r94540111.exe 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 1996 s95104272.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s95104272.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features s95104272.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y18722232.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y18722232.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1944 1.exe 740 r94540111.exe 1944 1.exe 740 r94540111.exe 1996 s95104272.exe 1996 s95104272.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1100 p32189937.exe Token: SeDebugPrivilege 1944 1.exe Token: SeDebugPrivilege 740 r94540111.exe Token: SeDebugPrivilege 1996 s95104272.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 2032 wrote to memory of 1916 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 27 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1916 wrote to memory of 1100 1916 y18722232.exe 28 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1100 wrote to memory of 1944 1100 p32189937.exe 29 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 1916 wrote to memory of 740 1916 y18722232.exe 30 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32 PID 2032 wrote to memory of 1996 2032 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe"C:\Users\Admin\AppData\Local\Temp\e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18722232.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18722232.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32189937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32189937.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r94540111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r94540111.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s95104272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s95104272.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
578KB
MD5dd96035ed93bb68c762108dd70fbc24f
SHA1f9aebcdd7f3c0241547680485219eb27b4a48947
SHA256610d464b5999287650a360fba4d03abdb267b5ae9b5bc4c75e593d39fa740065
SHA512883ba9d644390cefb29e95786278c9e5b81c312956ab67b1bc7582735ee2e0a11c485c688573a105acfb22c2ae92851597195e7145c1dd52e141e866b9d6ae92
-
Filesize
578KB
MD5dd96035ed93bb68c762108dd70fbc24f
SHA1f9aebcdd7f3c0241547680485219eb27b4a48947
SHA256610d464b5999287650a360fba4d03abdb267b5ae9b5bc4c75e593d39fa740065
SHA512883ba9d644390cefb29e95786278c9e5b81c312956ab67b1bc7582735ee2e0a11c485c688573a105acfb22c2ae92851597195e7145c1dd52e141e866b9d6ae92
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
172KB
MD578682edfc92f16f433578a84238f83ea
SHA1110ec444b7b7876aeea5b735a5229f21e96eb0e6
SHA256d893d6d64f474f90a63c0270e0ab0ff5e2faf132e55e9afac2beb91e681153e0
SHA5124322798b992f40ee1127e2382e3e09b12bab45148dc701edb7489a8c5ef44ad4ee95f1028474fdb385948208a1703baf995e2db03b44d8568f563f7cfc949920
-
Filesize
172KB
MD578682edfc92f16f433578a84238f83ea
SHA1110ec444b7b7876aeea5b735a5229f21e96eb0e6
SHA256d893d6d64f474f90a63c0270e0ab0ff5e2faf132e55e9afac2beb91e681153e0
SHA5124322798b992f40ee1127e2382e3e09b12bab45148dc701edb7489a8c5ef44ad4ee95f1028474fdb385948208a1703baf995e2db03b44d8568f563f7cfc949920
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
578KB
MD5dd96035ed93bb68c762108dd70fbc24f
SHA1f9aebcdd7f3c0241547680485219eb27b4a48947
SHA256610d464b5999287650a360fba4d03abdb267b5ae9b5bc4c75e593d39fa740065
SHA512883ba9d644390cefb29e95786278c9e5b81c312956ab67b1bc7582735ee2e0a11c485c688573a105acfb22c2ae92851597195e7145c1dd52e141e866b9d6ae92
-
Filesize
578KB
MD5dd96035ed93bb68c762108dd70fbc24f
SHA1f9aebcdd7f3c0241547680485219eb27b4a48947
SHA256610d464b5999287650a360fba4d03abdb267b5ae9b5bc4c75e593d39fa740065
SHA512883ba9d644390cefb29e95786278c9e5b81c312956ab67b1bc7582735ee2e0a11c485c688573a105acfb22c2ae92851597195e7145c1dd52e141e866b9d6ae92
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
172KB
MD578682edfc92f16f433578a84238f83ea
SHA1110ec444b7b7876aeea5b735a5229f21e96eb0e6
SHA256d893d6d64f474f90a63c0270e0ab0ff5e2faf132e55e9afac2beb91e681153e0
SHA5124322798b992f40ee1127e2382e3e09b12bab45148dc701edb7489a8c5ef44ad4ee95f1028474fdb385948208a1703baf995e2db03b44d8568f563f7cfc949920
-
Filesize
172KB
MD578682edfc92f16f433578a84238f83ea
SHA1110ec444b7b7876aeea5b735a5229f21e96eb0e6
SHA256d893d6d64f474f90a63c0270e0ab0ff5e2faf132e55e9afac2beb91e681153e0
SHA5124322798b992f40ee1127e2382e3e09b12bab45148dc701edb7489a8c5ef44ad4ee95f1028474fdb385948208a1703baf995e2db03b44d8568f563f7cfc949920
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf