Analysis
-
max time kernel
53s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/05/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe
Resource
win10-20230220-en
General
-
Target
e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe
-
Size
1.0MB
-
MD5
66909771acd40df9c3d060705ac08dc9
-
SHA1
a1d57c12b98f0d603a4dff134c8a4d56dbcb4ebf
-
SHA256
e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960
-
SHA512
51bc6d0e3e43b329f09eb5ff407249797533401be1bb9a3da335ac204eeecfff09ea49d4faed6bb098cad68a8374943b2c82d2123c05e337e8cce5f1f919b047
-
SSDEEP
24576:QygQ3JLRKhY/25zi/jjA+MZg2eNsT/QydW2:XgsJLRKy+5zifA+MG27T/Qy
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6441711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6441711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6441711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6441711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6441711.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/3708-201-0x00000000008B0000-0x00000000008F4000-memory.dmp family_redline behavioral2/memory/3708-202-0x0000000002560000-0x00000000025A0000-memory.dmp family_redline behavioral2/memory/3708-204-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-206-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-208-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-210-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-212-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-217-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-219-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-221-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-223-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-225-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-227-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-231-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-229-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-233-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-235-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-237-0x0000000002560000-0x000000000259C000-memory.dmp family_redline behavioral2/memory/3708-239-0x0000000002560000-0x000000000259C000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 4116 x3125068.exe 4264 x3911324.exe 2080 f3305962.exe 4764 g6441711.exe 4536 h9857638.exe 4728 h9857638.exe 3708 i9262129.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g6441711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g6441711.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3125068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3125068.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3911324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3911324.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4536 set thread context of 4728 4536 h9857638.exe 72 -
Program crash 1 IoCs
pid pid_target Process procid_target 3748 4728 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2080 f3305962.exe 2080 f3305962.exe 4764 g6441711.exe 4764 g6441711.exe 3708 i9262129.exe 3708 i9262129.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2080 f3305962.exe Token: SeDebugPrivilege 4764 g6441711.exe Token: SeDebugPrivilege 4536 h9857638.exe Token: SeDebugPrivilege 3708 i9262129.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4116 1852 e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe 58 PID 1852 wrote to memory of 4116 1852 e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe 58 PID 1852 wrote to memory of 4116 1852 e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe 58 PID 4116 wrote to memory of 4264 4116 x3125068.exe 65 PID 4116 wrote to memory of 4264 4116 x3125068.exe 65 PID 4116 wrote to memory of 4264 4116 x3125068.exe 65 PID 4264 wrote to memory of 2080 4264 x3911324.exe 68 PID 4264 wrote to memory of 2080 4264 x3911324.exe 68 PID 4264 wrote to memory of 2080 4264 x3911324.exe 68 PID 4264 wrote to memory of 4764 4264 x3911324.exe 70 PID 4264 wrote to memory of 4764 4264 x3911324.exe 70 PID 4264 wrote to memory of 4764 4264 x3911324.exe 70 PID 4116 wrote to memory of 4536 4116 x3125068.exe 71 PID 4116 wrote to memory of 4536 4116 x3125068.exe 71 PID 4116 wrote to memory of 4536 4116 x3125068.exe 71 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 4536 wrote to memory of 4728 4536 h9857638.exe 72 PID 1852 wrote to memory of 3708 1852 e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe 74 PID 1852 wrote to memory of 3708 1852 e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe 74 PID 1852 wrote to memory of 3708 1852 e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe"C:\Users\Admin\AppData\Local\Temp\e5bd69203069e9408f0a6ed514b6bf16aa1ca7e3b8c7a4011be0796fc8df4960.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3125068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3125068.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3911324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3911324.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3305962.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3305962.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6441711.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6441711.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9857638.exe4⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 245⤵
- Program crash
PID:3748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9262129.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9262129.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5401df59c8a476adfd2b77fba20476fae
SHA1c00c650c69e72d2a15ade8c7facd586e4c5c32c1
SHA256e0d6f670a944333e097dcdac121ce14dfc7ee4d00a0fc538a90478fb51a7ecc9
SHA51229e61b4748097efb1419648c52917387e14c0794814bd8a1a0b571f82806a5410526a9f52eae82033abc3afeba3ac56d976a0bc9b0bfb40737341f14b7caea68
-
Filesize
284KB
MD5401df59c8a476adfd2b77fba20476fae
SHA1c00c650c69e72d2a15ade8c7facd586e4c5c32c1
SHA256e0d6f670a944333e097dcdac121ce14dfc7ee4d00a0fc538a90478fb51a7ecc9
SHA51229e61b4748097efb1419648c52917387e14c0794814bd8a1a0b571f82806a5410526a9f52eae82033abc3afeba3ac56d976a0bc9b0bfb40737341f14b7caea68
-
Filesize
750KB
MD5bfa73c8bdb008d3a9fd5e36c818f6a68
SHA1e097e30766e1f12e5375665761c304891699dbb3
SHA25647cd9627dc6404bc9654e3d524b5672991d069f4f8bcc1620ed52b8b70f2322e
SHA5125245d44cfe2d6f4811577984dd8ec202ba37fe7cef22bc936b7c1ab6f1ce1f69a38f38aba50a13ed322ebb63adae904dc5f7c42959ee330309238d460317661f
-
Filesize
750KB
MD5bfa73c8bdb008d3a9fd5e36c818f6a68
SHA1e097e30766e1f12e5375665761c304891699dbb3
SHA25647cd9627dc6404bc9654e3d524b5672991d069f4f8bcc1620ed52b8b70f2322e
SHA5125245d44cfe2d6f4811577984dd8ec202ba37fe7cef22bc936b7c1ab6f1ce1f69a38f38aba50a13ed322ebb63adae904dc5f7c42959ee330309238d460317661f
-
Filesize
967KB
MD5c0574dede305bb404a9cce6569cd5312
SHA14173e2fb45a5034a2a601bea99d28819519b036d
SHA2562ff31ed6f25a7b20808c53dae7851dee77cfb882dd34e7cc9f8f50d826b6b086
SHA51237f938ecda7bb8ca6399c097d7c991eb177763ce4e7ce0e224a500b22a5a539cb25b17690267a8157e416cd0ce5b15ddcc82299c64fb3c3e6ac81346b4001b38
-
Filesize
967KB
MD5c0574dede305bb404a9cce6569cd5312
SHA14173e2fb45a5034a2a601bea99d28819519b036d
SHA2562ff31ed6f25a7b20808c53dae7851dee77cfb882dd34e7cc9f8f50d826b6b086
SHA51237f938ecda7bb8ca6399c097d7c991eb177763ce4e7ce0e224a500b22a5a539cb25b17690267a8157e416cd0ce5b15ddcc82299c64fb3c3e6ac81346b4001b38
-
Filesize
967KB
MD5c0574dede305bb404a9cce6569cd5312
SHA14173e2fb45a5034a2a601bea99d28819519b036d
SHA2562ff31ed6f25a7b20808c53dae7851dee77cfb882dd34e7cc9f8f50d826b6b086
SHA51237f938ecda7bb8ca6399c097d7c991eb177763ce4e7ce0e224a500b22a5a539cb25b17690267a8157e416cd0ce5b15ddcc82299c64fb3c3e6ac81346b4001b38
-
Filesize
306KB
MD58bc7df293cf581fa060ed5cf2d550ff9
SHA1a72789a6f39b167942c0648b5487bcc16f576fb8
SHA25652f1b7865ed0d401a599c215f021c3a9b30561d5f367a5915b6cabdcbc0008c7
SHA512245671ea39a44f3612e25d9abdc6486d656d65ff90c670e8b4b0a0bce89d26649f73ddfd51491c580a8fc35e53cbd2cf2f96a674e0c85cd711f7e0d24ef0bb4c
-
Filesize
306KB
MD58bc7df293cf581fa060ed5cf2d550ff9
SHA1a72789a6f39b167942c0648b5487bcc16f576fb8
SHA25652f1b7865ed0d401a599c215f021c3a9b30561d5f367a5915b6cabdcbc0008c7
SHA512245671ea39a44f3612e25d9abdc6486d656d65ff90c670e8b4b0a0bce89d26649f73ddfd51491c580a8fc35e53cbd2cf2f96a674e0c85cd711f7e0d24ef0bb4c
-
Filesize
145KB
MD516f6ba8ad11eccbafbaddfdbef475fcb
SHA15d9c55eefe279aac78ae729a05e42213567a0b0c
SHA2560eb756453129e7aea9195b9a1171b38eec5f91a5b5c7f5b196311a7fedbe3055
SHA5121511ce3812249e882d88977ca0b98c5d909fcbfba6ab8788233129ed0b8e25ee36be4e645a122abd9717a440d054a1a8564f9e1d216345476ac2cefa926a8049
-
Filesize
145KB
MD516f6ba8ad11eccbafbaddfdbef475fcb
SHA15d9c55eefe279aac78ae729a05e42213567a0b0c
SHA2560eb756453129e7aea9195b9a1171b38eec5f91a5b5c7f5b196311a7fedbe3055
SHA5121511ce3812249e882d88977ca0b98c5d909fcbfba6ab8788233129ed0b8e25ee36be4e645a122abd9717a440d054a1a8564f9e1d216345476ac2cefa926a8049
-
Filesize
186KB
MD5440264dceda49c10fc65820595b73d74
SHA14281d625114f6968655adf33d14a9d86091570de
SHA2560f05422d742cda51cb9f85c43184f917514391877dccf897bd967ae1729e0cd3
SHA512b8b2e173e71b268724738f5b0b6400b8330f0f9082614892a903dd2f1fd3da1caf45593d3958825ded3d156c503e8e63fa5368988131d63e2d8aa4bde5615463
-
Filesize
186KB
MD5440264dceda49c10fc65820595b73d74
SHA14281d625114f6968655adf33d14a9d86091570de
SHA2560f05422d742cda51cb9f85c43184f917514391877dccf897bd967ae1729e0cd3
SHA512b8b2e173e71b268724738f5b0b6400b8330f0f9082614892a903dd2f1fd3da1caf45593d3958825ded3d156c503e8e63fa5368988131d63e2d8aa4bde5615463