Analysis
-
max time kernel
55s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/05/2023, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe
Resource
win10-20230220-en
General
-
Target
e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe
-
Size
1.0MB
-
MD5
ae39030730ac71b2face02c1ab5c36ea
-
SHA1
c4f272b57d397fff6451dd85d58b93b67a992b58
-
SHA256
e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a
-
SHA512
919ab70a30a5d7d639b82cd6526ed80be006fa20c93155d4467db4eea91cd434906bcb2124b25ce08bbdec57869d67a0e8cf86df38a62fa90807d4bd2be2dd51
-
SSDEEP
24576:ryL3L1zWTAFLhMKMdeJ65iwky6Wzq7yH/iubsYI5eTAAXK6a8T4:ebL1zsGDMdu65iwoL5eTAaK6aw
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9322292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9322292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9322292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9322292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9322292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3532-208-0x00000000020F0000-0x0000000002134000-memory.dmp family_redline behavioral1/memory/3532-210-0x00000000049D0000-0x0000000004A10000-memory.dmp family_redline behavioral1/memory/3532-211-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-212-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-214-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-216-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-218-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-220-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-222-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-224-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-226-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-228-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-230-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-233-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-237-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-239-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-241-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-243-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/3532-245-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 2152 x6047227.exe 2316 x5816587.exe 2416 f4040735.exe 2832 g9322292.exe 1516 h9934716.exe 4464 h9934716.exe 3532 i8730784.exe 3396 oneetx.exe 4268 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g9322292.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g9322292.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6047227.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6047227.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5816587.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5816587.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1516 set thread context of 4464 1516 h9934716.exe 72 PID 3396 set thread context of 4268 3396 oneetx.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1516 4268 WerFault.exe 75 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2416 f4040735.exe 2416 f4040735.exe 2832 g9322292.exe 2832 g9322292.exe 3532 i8730784.exe 3532 i8730784.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2416 f4040735.exe Token: SeDebugPrivilege 2832 g9322292.exe Token: SeDebugPrivilege 1516 h9934716.exe Token: SeDebugPrivilege 3532 i8730784.exe Token: SeDebugPrivilege 3396 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 h9934716.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2152 1968 e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe 66 PID 1968 wrote to memory of 2152 1968 e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe 66 PID 1968 wrote to memory of 2152 1968 e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe 66 PID 2152 wrote to memory of 2316 2152 x6047227.exe 67 PID 2152 wrote to memory of 2316 2152 x6047227.exe 67 PID 2152 wrote to memory of 2316 2152 x6047227.exe 67 PID 2316 wrote to memory of 2416 2316 x5816587.exe 68 PID 2316 wrote to memory of 2416 2316 x5816587.exe 68 PID 2316 wrote to memory of 2416 2316 x5816587.exe 68 PID 2316 wrote to memory of 2832 2316 x5816587.exe 70 PID 2316 wrote to memory of 2832 2316 x5816587.exe 70 PID 2316 wrote to memory of 2832 2316 x5816587.exe 70 PID 2152 wrote to memory of 1516 2152 x6047227.exe 71 PID 2152 wrote to memory of 1516 2152 x6047227.exe 71 PID 2152 wrote to memory of 1516 2152 x6047227.exe 71 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1516 wrote to memory of 4464 1516 h9934716.exe 72 PID 1968 wrote to memory of 3532 1968 e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe 73 PID 1968 wrote to memory of 3532 1968 e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe 73 PID 1968 wrote to memory of 3532 1968 e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe 73 PID 4464 wrote to memory of 3396 4464 h9934716.exe 74 PID 4464 wrote to memory of 3396 4464 h9934716.exe 74 PID 4464 wrote to memory of 3396 4464 h9934716.exe 74 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75 PID 3396 wrote to memory of 4268 3396 oneetx.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe"C:\Users\Admin\AppData\Local\Temp\e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6047227.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6047227.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5816587.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5816587.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4040735.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4040735.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9322292.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9322292.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 247⤵
- Program crash
PID:1516
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8730784.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8730784.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5cc2a926262d7d6805f5a112831c3fe7c
SHA1c28a304b6ab9b7b970044e38b347c26c877fa161
SHA256b672d43c80a09ba2fc03e53c22369ebad29e704f31a1d5ed0739184c3341bd0d
SHA5121073a0c6b337d21bea4069d6cb0df35fb62a136b876811cbb3ded8ad70bef16a958793e2053edc45118ec4e0c9a34c24d6abeaf0e079b78681d28bc2590a40a9
-
Filesize
285KB
MD5cc2a926262d7d6805f5a112831c3fe7c
SHA1c28a304b6ab9b7b970044e38b347c26c877fa161
SHA256b672d43c80a09ba2fc03e53c22369ebad29e704f31a1d5ed0739184c3341bd0d
SHA5121073a0c6b337d21bea4069d6cb0df35fb62a136b876811cbb3ded8ad70bef16a958793e2053edc45118ec4e0c9a34c24d6abeaf0e079b78681d28bc2590a40a9
-
Filesize
751KB
MD5579c957cda016f69e180fc0dfa4c957d
SHA18d4f2083517cb6242fdcd1d231aa8e5ce641a6ef
SHA256d32eab924d9df735b267885497d9eb1a6b585144663c255f2e2c273284f871c4
SHA5121acf7f1f0a7c130aa65efbfa2f5539ed9ad9ab39e3d2cb6ad22d65f26405a1e4d003f17527a28f0864e4377b9bd49aa6507f0287847d41bc6e317dbadd036f6b
-
Filesize
751KB
MD5579c957cda016f69e180fc0dfa4c957d
SHA18d4f2083517cb6242fdcd1d231aa8e5ce641a6ef
SHA256d32eab924d9df735b267885497d9eb1a6b585144663c255f2e2c273284f871c4
SHA5121acf7f1f0a7c130aa65efbfa2f5539ed9ad9ab39e3d2cb6ad22d65f26405a1e4d003f17527a28f0864e4377b9bd49aa6507f0287847d41bc6e317dbadd036f6b
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722
-
Filesize
305KB
MD51ae4426fa51fa58fe8c73d59b62db979
SHA1f7959bf0e34bc32c711694dade7f776fa7607c05
SHA256345be20d1db8a4965fb057dfe2c334360714aedb66343fc9f25a71efd8524a47
SHA51270d12451fbd1d6757453d8b6f7789ea8c9919c1b8feb14d9568b5567c09f4780a0c036f24fb2bcdb778cb11d103288d19416de3d0d3d105a59172b693cbca8ff
-
Filesize
305KB
MD51ae4426fa51fa58fe8c73d59b62db979
SHA1f7959bf0e34bc32c711694dade7f776fa7607c05
SHA256345be20d1db8a4965fb057dfe2c334360714aedb66343fc9f25a71efd8524a47
SHA51270d12451fbd1d6757453d8b6f7789ea8c9919c1b8feb14d9568b5567c09f4780a0c036f24fb2bcdb778cb11d103288d19416de3d0d3d105a59172b693cbca8ff
-
Filesize
145KB
MD58fd866bc528f4916b677def042934609
SHA1b732a23303ac469cc0bf700d372bd77457b5ec62
SHA256cefbc8a2e29e8c2ee0fafb5f18101d3f050df67a936115d4c93aa77f0fa893c5
SHA512a831820fec75b399d91751725274849258a297a4e8a16ede83e8b927b170199835f73bb4cfc1d8d180ed6205168c2fb1b59cc82b5c90d6bcb24c2ba99c51c9fd
-
Filesize
145KB
MD58fd866bc528f4916b677def042934609
SHA1b732a23303ac469cc0bf700d372bd77457b5ec62
SHA256cefbc8a2e29e8c2ee0fafb5f18101d3f050df67a936115d4c93aa77f0fa893c5
SHA512a831820fec75b399d91751725274849258a297a4e8a16ede83e8b927b170199835f73bb4cfc1d8d180ed6205168c2fb1b59cc82b5c90d6bcb24c2ba99c51c9fd
-
Filesize
186KB
MD561ebe79fe3f47f5a363f36897a273ea7
SHA18ca9b77da0b682c726c9d04246e173c17a27877d
SHA2569323ccbfce81a04f0a8d900a5daa31e6c48cd708df7904dffbcdb9139494516a
SHA512ebb78d7a835ad33800534d17811d225d9922cdc6e42f055be654f8a006fcf6d5af379a72ef02f952b4e57c908ed2fbd007f835049b89217fdcb38f088f702c3b
-
Filesize
186KB
MD561ebe79fe3f47f5a363f36897a273ea7
SHA18ca9b77da0b682c726c9d04246e173c17a27877d
SHA2569323ccbfce81a04f0a8d900a5daa31e6c48cd708df7904dffbcdb9139494516a
SHA512ebb78d7a835ad33800534d17811d225d9922cdc6e42f055be654f8a006fcf6d5af379a72ef02f952b4e57c908ed2fbd007f835049b89217fdcb38f088f702c3b
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722
-
Filesize
965KB
MD5e50af0e8bb8e0cd9946542bc305c4c52
SHA1309340c41e2c61f591b481a97eb42053f586960b
SHA2566f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837
SHA512f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722