Analysis
-
max time kernel
135s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe
Resource
win10v2004-20230220-en
General
-
Target
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe
-
Size
867KB
-
MD5
611bcdefc9d0594880829c7818761b1b
-
SHA1
531b604af323a84a2eb94f38240d27efbb3572f1
-
SHA256
e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a
-
SHA512
32371bd9c0f43832ac50da120921561a2da9a0bd50a960792b001155c6959953b551b979d008e807ed73f421b5265b15bb54da522976428f2d13ca9b1c55734c
-
SSDEEP
12288:8y90PUO4AQyW4gCUQT7J7r1p97jZR1gfyODr8p4I2+HqcAjjHvGTSX:8yxO4AQyW4gi7r/NjZR1er8czv3+TG
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4288-2314-0x0000000005480000-0x0000000005A98000-memory.dmp redline_stealer behavioral2/memory/1008-2328-0x0000000005460000-0x00000000054C6000-memory.dmp redline_stealer behavioral2/memory/1008-2330-0x00000000065F0000-0x00000000067B2000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s95104272.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s95104272.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation p32189937.exe -
Executes dropped EXE 5 IoCs
pid Process 3360 y18722232.exe 2140 p32189937.exe 4288 1.exe 1008 r94540111.exe 2772 s95104272.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s95104272.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s95104272.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y18722232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y18722232.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4800 2140 WerFault.exe 86 3364 2772 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1008 r94540111.exe 1008 r94540111.exe 4288 1.exe 4288 1.exe 2772 s95104272.exe 2772 s95104272.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2140 p32189937.exe Token: SeDebugPrivilege 1008 r94540111.exe Token: SeDebugPrivilege 4288 1.exe Token: SeDebugPrivilege 2772 s95104272.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3360 2616 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 85 PID 2616 wrote to memory of 3360 2616 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 85 PID 2616 wrote to memory of 3360 2616 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 85 PID 3360 wrote to memory of 2140 3360 y18722232.exe 86 PID 3360 wrote to memory of 2140 3360 y18722232.exe 86 PID 3360 wrote to memory of 2140 3360 y18722232.exe 86 PID 2140 wrote to memory of 4288 2140 p32189937.exe 90 PID 2140 wrote to memory of 4288 2140 p32189937.exe 90 PID 2140 wrote to memory of 4288 2140 p32189937.exe 90 PID 3360 wrote to memory of 1008 3360 y18722232.exe 95 PID 3360 wrote to memory of 1008 3360 y18722232.exe 95 PID 3360 wrote to memory of 1008 3360 y18722232.exe 95 PID 2616 wrote to memory of 2772 2616 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 98 PID 2616 wrote to memory of 2772 2616 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 98 PID 2616 wrote to memory of 2772 2616 e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe"C:\Users\Admin\AppData\Local\Temp\e3ee4a23feef1f87182fa5888327f5cde791dfa0abac4fcbec2dd98976831a7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18722232.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y18722232.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32189937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32189937.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 13364⤵
- Program crash
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r94540111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r94540111.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s95104272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s95104272.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 10923⤵
- Program crash
PID:3364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2140 -ip 21401⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2772 -ip 27721⤵PID:3188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
318KB
MD5b809e8f944a1b7490f06e6a77c8d18c6
SHA157b700012d8275ab8530ce25b1c0f2a7d814a93b
SHA256f84c8aba03105524caa2220ffb87f51b7bb3abc6f199a3465c247458795e5069
SHA51274c90df936d1a7c96aada00dda5d0723e9662e2226c59e6b8148259e052c3327dbcef613d81f78f4a4cf456a0660ffdbc27b0bd8fcb51353768b934612d5dbb7
-
Filesize
578KB
MD5dd96035ed93bb68c762108dd70fbc24f
SHA1f9aebcdd7f3c0241547680485219eb27b4a48947
SHA256610d464b5999287650a360fba4d03abdb267b5ae9b5bc4c75e593d39fa740065
SHA512883ba9d644390cefb29e95786278c9e5b81c312956ab67b1bc7582735ee2e0a11c485c688573a105acfb22c2ae92851597195e7145c1dd52e141e866b9d6ae92
-
Filesize
578KB
MD5dd96035ed93bb68c762108dd70fbc24f
SHA1f9aebcdd7f3c0241547680485219eb27b4a48947
SHA256610d464b5999287650a360fba4d03abdb267b5ae9b5bc4c75e593d39fa740065
SHA512883ba9d644390cefb29e95786278c9e5b81c312956ab67b1bc7582735ee2e0a11c485c688573a105acfb22c2ae92851597195e7145c1dd52e141e866b9d6ae92
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
502KB
MD59f8dcc6244d4cb255abb4849806077e5
SHA10bd2b8e811694f76f778226f446449934e547cc1
SHA256452624bcc282c2bf0c89ef9d2921414cc525a085936392dbb5e512db0050c06f
SHA512a550500e215843c6601de903d1ed14181e301f912ebefc1646b29447278672eb86d53bb4d80d3eacccb35648cd3edca45c249c61c37f7db12aa2044d4a76fbdb
-
Filesize
172KB
MD578682edfc92f16f433578a84238f83ea
SHA1110ec444b7b7876aeea5b735a5229f21e96eb0e6
SHA256d893d6d64f474f90a63c0270e0ab0ff5e2faf132e55e9afac2beb91e681153e0
SHA5124322798b992f40ee1127e2382e3e09b12bab45148dc701edb7489a8c5ef44ad4ee95f1028474fdb385948208a1703baf995e2db03b44d8568f563f7cfc949920
-
Filesize
172KB
MD578682edfc92f16f433578a84238f83ea
SHA1110ec444b7b7876aeea5b735a5229f21e96eb0e6
SHA256d893d6d64f474f90a63c0270e0ab0ff5e2faf132e55e9afac2beb91e681153e0
SHA5124322798b992f40ee1127e2382e3e09b12bab45148dc701edb7489a8c5ef44ad4ee95f1028474fdb385948208a1703baf995e2db03b44d8568f563f7cfc949920
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf