Analysis
-
max time kernel
61s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe
Resource
win10v2004-20230220-en
General
-
Target
0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe
-
Size
916KB
-
MD5
b5d99102b997ef39eb4180fd3565e2e3
-
SHA1
07a439b39f1351f05b5ff67e68b581092c91fad0
-
SHA256
0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f
-
SHA512
3db5b269aadd8b39f9d15c172a91a7aa46c714415f1edc5b39489aaba394484a4023d28a6ad2bc55c138e9f0af7ff909d67afc233b0dcaf815ddf6bb47032d30
-
SSDEEP
24576:jy3SoM9MWf/iepFWYOBkwtkzGC3JqwomT0g7brdtSc:29MKepgYOFthXwomT7bHS
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7409386.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7409386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7409386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7409386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7409386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7409386.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3836-185-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-186-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-188-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-190-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-192-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-194-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-196-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-198-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-200-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-202-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-204-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-206-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-208-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-210-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-212-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-214-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-216-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-218-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-221-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline behavioral1/memory/3836-223-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-225-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-227-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-229-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-231-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-233-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-235-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-237-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-239-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-241-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-243-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-245-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-247-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-249-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral1/memory/3836-1099-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 2192 v0335738.exe 548 v5643250.exe 4768 a7409386.exe 3508 b5259264.exe 4804 c2734227.exe 2896 c2734227.exe 3836 d8277356.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7409386.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0335738.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0335738.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5643250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5643250.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 2896 4804 c2734227.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 2004 2896 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4768 a7409386.exe 4768 a7409386.exe 3508 b5259264.exe 3508 b5259264.exe 3836 d8277356.exe 3836 d8277356.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4768 a7409386.exe Token: SeDebugPrivilege 3508 b5259264.exe Token: SeDebugPrivilege 4804 c2734227.exe Token: SeDebugPrivilege 3836 d8277356.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2896 c2734227.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2192 5048 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe 83 PID 5048 wrote to memory of 2192 5048 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe 83 PID 5048 wrote to memory of 2192 5048 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe 83 PID 2192 wrote to memory of 548 2192 v0335738.exe 84 PID 2192 wrote to memory of 548 2192 v0335738.exe 84 PID 2192 wrote to memory of 548 2192 v0335738.exe 84 PID 548 wrote to memory of 4768 548 v5643250.exe 85 PID 548 wrote to memory of 4768 548 v5643250.exe 85 PID 548 wrote to memory of 3508 548 v5643250.exe 86 PID 548 wrote to memory of 3508 548 v5643250.exe 86 PID 548 wrote to memory of 3508 548 v5643250.exe 86 PID 2192 wrote to memory of 4804 2192 v0335738.exe 87 PID 2192 wrote to memory of 4804 2192 v0335738.exe 87 PID 2192 wrote to memory of 4804 2192 v0335738.exe 87 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 4804 wrote to memory of 2896 4804 c2734227.exe 88 PID 5048 wrote to memory of 3836 5048 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe 90 PID 5048 wrote to memory of 3836 5048 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe 90 PID 5048 wrote to memory of 3836 5048 0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe"C:\Users\Admin\AppData\Local\Temp\0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0335738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0335738.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5643250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5643250.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7409386.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7409386.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5259264.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5259264.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 125⤵
- Program crash
PID:2004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8277356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8277356.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2896 -ip 28961⤵PID:4424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD55840d93ddf0f30dabaf87f636123e21d
SHA1c7e99f0d972b6d287790c90e619ff4410a440b7e
SHA256dda004091fcdcd5d1cbd565283788e213866663c6a5050aa1398262d9d854681
SHA512ee9ff4857beeaa36545d9cca378c571dfe7d950a5f4ee6874d1b065048ae80f3bdbe56e82eccbdab4e755826cb61ed986a0b0b5e2cd4bc10a77a5665858187ee
-
Filesize
285KB
MD55840d93ddf0f30dabaf87f636123e21d
SHA1c7e99f0d972b6d287790c90e619ff4410a440b7e
SHA256dda004091fcdcd5d1cbd565283788e213866663c6a5050aa1398262d9d854681
SHA512ee9ff4857beeaa36545d9cca378c571dfe7d950a5f4ee6874d1b065048ae80f3bdbe56e82eccbdab4e755826cb61ed986a0b0b5e2cd4bc10a77a5665858187ee
-
Filesize
637KB
MD5cdb30b184dd18b608090dfa7db95b150
SHA1e4a9e6cef526c9b5273d07d59754f8eb67cda494
SHA25671f24abd3f6e3a3a5e46e46a82b81412c65f8fba8bc6032c117fc743f56d3e90
SHA512f5cc6439b58bc91aa988a33d493fc1f5b5de0712fc7a40976bbbcb09c85b96eaa9286970c62f75f6bb8bd77d82b8ceb95a5a681ea6b676a08cf733756c2d9e48
-
Filesize
637KB
MD5cdb30b184dd18b608090dfa7db95b150
SHA1e4a9e6cef526c9b5273d07d59754f8eb67cda494
SHA25671f24abd3f6e3a3a5e46e46a82b81412c65f8fba8bc6032c117fc743f56d3e90
SHA512f5cc6439b58bc91aa988a33d493fc1f5b5de0712fc7a40976bbbcb09c85b96eaa9286970c62f75f6bb8bd77d82b8ceb95a5a681ea6b676a08cf733756c2d9e48
-
Filesize
968KB
MD5bfa103db49ff3e84bc4fe5b13b1dc031
SHA1036ccfcecd2de16973b747c4bb3cc27599e5895e
SHA256c025734634d68139405849502db93b427326d27880ff9b51e52c8afc03565012
SHA512a6609d2b686b148de39ba826298f55952ff6306b4a51a3cee6b79467238c68236170c9d556fbce37d2c24bf6077cf8678c8fb65c969e4a47f9095d3635f47a5d
-
Filesize
968KB
MD5bfa103db49ff3e84bc4fe5b13b1dc031
SHA1036ccfcecd2de16973b747c4bb3cc27599e5895e
SHA256c025734634d68139405849502db93b427326d27880ff9b51e52c8afc03565012
SHA512a6609d2b686b148de39ba826298f55952ff6306b4a51a3cee6b79467238c68236170c9d556fbce37d2c24bf6077cf8678c8fb65c969e4a47f9095d3635f47a5d
-
Filesize
968KB
MD5bfa103db49ff3e84bc4fe5b13b1dc031
SHA1036ccfcecd2de16973b747c4bb3cc27599e5895e
SHA256c025734634d68139405849502db93b427326d27880ff9b51e52c8afc03565012
SHA512a6609d2b686b148de39ba826298f55952ff6306b4a51a3cee6b79467238c68236170c9d556fbce37d2c24bf6077cf8678c8fb65c969e4a47f9095d3635f47a5d
-
Filesize
192KB
MD51360f20af0708f678bd2bbc9d5ce151f
SHA182f3f2500b0e6199c749402ad0121415e67c6f86
SHA256e257a84285e3dd16209a1340a713d3518d96bb2fb3874a7bcc9f591032d48d61
SHA5127b4535f6a2f3aae8761418be110a0839ce9ca19033473b542692cfe5612d6fafb56eed66e24f551075789411bbb4b16ad8c2f6c63ddb29a93b4c891cc6b4e0c3
-
Filesize
192KB
MD51360f20af0708f678bd2bbc9d5ce151f
SHA182f3f2500b0e6199c749402ad0121415e67c6f86
SHA256e257a84285e3dd16209a1340a713d3518d96bb2fb3874a7bcc9f591032d48d61
SHA5127b4535f6a2f3aae8761418be110a0839ce9ca19033473b542692cfe5612d6fafb56eed66e24f551075789411bbb4b16ad8c2f6c63ddb29a93b4c891cc6b4e0c3
-
Filesize
11KB
MD5329ce153c10642b207f9c422a99d150b
SHA1d36a52feca19dbff397b2c5dbd3ca2f5a3a55ea6
SHA25678959e959ccb966d4100917352bbc10d34d7fe70c00f285cb80e8ce8f518ec5f
SHA5128158009b0302934fbbe0b2e4ce2cb63235dc8b020bdb27f7b15914acdd1b8ca6f06fac5c4878ab3e12328952e1ef876e67b3e5fd16e5497ad2f8678b4d89254d
-
Filesize
11KB
MD5329ce153c10642b207f9c422a99d150b
SHA1d36a52feca19dbff397b2c5dbd3ca2f5a3a55ea6
SHA25678959e959ccb966d4100917352bbc10d34d7fe70c00f285cb80e8ce8f518ec5f
SHA5128158009b0302934fbbe0b2e4ce2cb63235dc8b020bdb27f7b15914acdd1b8ca6f06fac5c4878ab3e12328952e1ef876e67b3e5fd16e5497ad2f8678b4d89254d
-
Filesize
145KB
MD5e53ffdd631ca7815f2735f6f303bb2d0
SHA132d033c65bea8b5b4d9e95d5d1419a00cfa603ce
SHA25698b30c901e0b2b7ba95981d524dab949bfd3ab62a3fd66b239442bb233b0ab49
SHA512906f4e7206ec0259dd3da5ca1610f7549db27117d66d903e11626f8ce9e925c5d32593d1ea8fc008b9eea24242efbc93acc496f4baf6ebe267eff768a1ea1a2b
-
Filesize
145KB
MD5e53ffdd631ca7815f2735f6f303bb2d0
SHA132d033c65bea8b5b4d9e95d5d1419a00cfa603ce
SHA25698b30c901e0b2b7ba95981d524dab949bfd3ab62a3fd66b239442bb233b0ab49
SHA512906f4e7206ec0259dd3da5ca1610f7549db27117d66d903e11626f8ce9e925c5d32593d1ea8fc008b9eea24242efbc93acc496f4baf6ebe267eff768a1ea1a2b