Analysis
-
max time kernel
117s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe
Resource
win10v2004-20230220-en
General
-
Target
ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe
-
Size
891KB
-
MD5
3d2a29a183fb2b4233e1d50a39412449
-
SHA1
28ea1ba696b5f6ca84b9c71188f17cf9d6edc910
-
SHA256
ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b
-
SHA512
8547d5a3c2c41908070db588aaeb0cfd6a70388fad57a157b877515e1bfe61ad9eb32eb0eb961d793d7416ca0b226a3ec96708dc18697de1834a0bbbb2a1cf41
-
SSDEEP
24576:YyVXWZ/apOdjrnjt8kZqTsRD/leUlLpS:fUMgjtBkAZ4
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1504 st684479.exe 1484 87109421.exe 1600 1.exe 832 kp829850.exe 1196 lr825846.exe -
Loads dropped DLL 10 IoCs
pid Process 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 1504 st684479.exe 1504 st684479.exe 1484 87109421.exe 1484 87109421.exe 1504 st684479.exe 1504 st684479.exe 832 kp829850.exe 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 1196 lr825846.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st684479.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st684479.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1600 1.exe 1600 1.exe 1196 lr825846.exe 1196 lr825846.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1484 87109421.exe Token: SeDebugPrivilege 832 kp829850.exe Token: SeDebugPrivilege 1600 1.exe Token: SeDebugPrivilege 1196 lr825846.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 2044 wrote to memory of 1504 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 28 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1504 wrote to memory of 1484 1504 st684479.exe 29 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1484 wrote to memory of 1600 1484 87109421.exe 30 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 1504 wrote to memory of 832 1504 st684479.exe 31 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32 PID 2044 wrote to memory of 1196 2044 ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe"C:\Users\Admin\AppData\Local\Temp\ea069d6d262ba19288d5a3873a2ec85b86158d62d28dcef445be960c9e30a81b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st684479.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87109421.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp829850.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr825846.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5a234a7ac617389a1131fb3e239e37887
SHA191f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a
SHA2564126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae
SHA512522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f
-
Filesize
170KB
MD5a234a7ac617389a1131fb3e239e37887
SHA191f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a
SHA2564126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae
SHA512522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f
-
Filesize
738KB
MD54bb6d46f974957e2ae24b9aaa934281d
SHA1c9f6de3ed68554fe05879470261c29c49a66de56
SHA256a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3
SHA5124982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432
-
Filesize
738KB
MD54bb6d46f974957e2ae24b9aaa934281d
SHA1c9f6de3ed68554fe05879470261c29c49a66de56
SHA256a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3
SHA5124982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432
-
Filesize
303KB
MD5719ccc722b3cd7c6be49ce5e49b96d44
SHA19d6c18cef2672f1843bae94088610bc098d50505
SHA25678037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07
SHA512d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4
-
Filesize
303KB
MD5719ccc722b3cd7c6be49ce5e49b96d44
SHA19d6c18cef2672f1843bae94088610bc098d50505
SHA25678037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07
SHA512d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4
-
Filesize
574KB
MD5115a5c4d8100ce97d60b2e276c4770ba
SHA1453fded92c860d717cbc4bb8c2601e5d48ff78ce
SHA256cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518
SHA51235ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317
-
Filesize
574KB
MD5115a5c4d8100ce97d60b2e276c4770ba
SHA1453fded92c860d717cbc4bb8c2601e5d48ff78ce
SHA256cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518
SHA51235ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317
-
Filesize
574KB
MD5115a5c4d8100ce97d60b2e276c4770ba
SHA1453fded92c860d717cbc4bb8c2601e5d48ff78ce
SHA256cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518
SHA51235ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
170KB
MD5a234a7ac617389a1131fb3e239e37887
SHA191f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a
SHA2564126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae
SHA512522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f
-
Filesize
170KB
MD5a234a7ac617389a1131fb3e239e37887
SHA191f1ed8f7ab9f2c2aa6da87c34b5c1b47e17603a
SHA2564126858967aa585df6d4dc10c2fad2e7eee712b390ce43d22cd93c066a6f63ae
SHA512522bd2184787f34c7839e68b30b50c315af0c9468ec4230143f30ee2c3cbcc3e21115c7bbeb0cad44376370d7d9d79188fbe46eb02f69bd58e6c6b1f4abaad3f
-
Filesize
738KB
MD54bb6d46f974957e2ae24b9aaa934281d
SHA1c9f6de3ed68554fe05879470261c29c49a66de56
SHA256a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3
SHA5124982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432
-
Filesize
738KB
MD54bb6d46f974957e2ae24b9aaa934281d
SHA1c9f6de3ed68554fe05879470261c29c49a66de56
SHA256a8290f74dace47654dafebe12e434c08efe5e922020dbe193181acad6545b9d3
SHA5124982b2e00442dd618ec4e15e4d4112d9716c9c48bedbedc34edd1ecc4804c0487e65c24c9035f56d0b746b8396516edd7ec5bc55a46e40d16a27958b8e9bf432
-
Filesize
303KB
MD5719ccc722b3cd7c6be49ce5e49b96d44
SHA19d6c18cef2672f1843bae94088610bc098d50505
SHA25678037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07
SHA512d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4
-
Filesize
303KB
MD5719ccc722b3cd7c6be49ce5e49b96d44
SHA19d6c18cef2672f1843bae94088610bc098d50505
SHA25678037bc4ee8ae5fed119c6ddd9aa54b69e25eb8aa8b7c1c155344853c97def07
SHA512d09f8c6cfeaf6f68b94f9b50cd2a2dd5a32b9ae5e5aada520b1703e8586feea7d97c58f95f9bcca91d9b6a6f1d3432161d8cc5a557a3a340658b28e659937bd4
-
Filesize
574KB
MD5115a5c4d8100ce97d60b2e276c4770ba
SHA1453fded92c860d717cbc4bb8c2601e5d48ff78ce
SHA256cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518
SHA51235ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317
-
Filesize
574KB
MD5115a5c4d8100ce97d60b2e276c4770ba
SHA1453fded92c860d717cbc4bb8c2601e5d48ff78ce
SHA256cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518
SHA51235ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317
-
Filesize
574KB
MD5115a5c4d8100ce97d60b2e276c4770ba
SHA1453fded92c860d717cbc4bb8c2601e5d48ff78ce
SHA256cf96e1fb079f6d0ec0ffd1dafbf673930f4e14554657476e1ff5b463de525518
SHA51235ef07482aa4e09d02e4c61a26f94e99a4e9bfcd0310a022f864d1e531f45ae035331b987676123bf42075df6dede79f57dba1a1fb9b6d6c56ef5466bfd8e317
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91