Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/03/2023, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe
Resource
win10-20230220-en
General
-
Target
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe
-
Size
569KB
-
MD5
38e20f8fb651a1a5a55d235c8960cdfc
-
SHA1
cc907f508e48fb3298e89a95faadf431983d408e
-
SHA256
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f
-
SHA512
6e9659da3febffbf63ac4bdc6d6f025681b3f9cd2f26450cbf015149c3e53dcc9ef5ed0dadfa6a4af3e22eb57666ebcb5339ea66222f5eb690cba2a244b13290
-
SSDEEP
12288:0Mrjy90Wahimz7AuxqVd4K4Zu5gTDEgV9W0dGZRgN:3yHsVAuxYdzUuSDV9W0dGZR0
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r4820Gv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r4820Gv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r4820Gv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r4820Gv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r4820Gv.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4836-174-0x00000000049C0000-0x0000000004A06000-memory.dmp family_redline behavioral1/memory/4836-175-0x0000000004F60000-0x0000000004FA4000-memory.dmp family_redline behavioral1/memory/4836-176-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-177-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-179-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-181-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-183-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-185-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-187-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-189-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-191-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-193-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-195-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-197-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-199-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-201-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-203-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-205-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-207-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline behavioral1/memory/4836-209-0x0000000004F60000-0x0000000004F9E000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 4684 r4820Gv.exe 4836 w84du34.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r4820Gv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r4820Gv.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4684 r4820Gv.exe 4684 r4820Gv.exe 4836 w84du34.exe 4836 w84du34.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4684 r4820Gv.exe Token: SeDebugPrivilege 4836 w84du34.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4684 2896 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe 66 PID 2896 wrote to memory of 4684 2896 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe 66 PID 2896 wrote to memory of 4684 2896 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe 66 PID 2896 wrote to memory of 4836 2896 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe 67 PID 2896 wrote to memory of 4836 2896 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe 67 PID 2896 wrote to memory of 4836 2896 607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe"C:\Users\Admin\AppData\Local\Temp\607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r4820Gv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r4820Gv.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w84du34.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w84du34.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD58141937b23cd1895e561d8e90fdeeff3
SHA16f810e9e480564f5837461f8ccdd07c951a1bece
SHA256ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6
SHA51240957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec
-
Filesize
322KB
MD58141937b23cd1895e561d8e90fdeeff3
SHA16f810e9e480564f5837461f8ccdd07c951a1bece
SHA256ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6
SHA51240957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec
-
Filesize
382KB
MD50fd5641d84944663de4ff1c6ec73ac12
SHA13f6e79840d52ea9fceada90eac52384e2ee24d11
SHA256cd3bde9a06c3e79fb85e88a38d93c654f0d8941108581fa7b2b883a04bc9e0b0
SHA5124457ff95ee19887b58ad6ea2b5137b45a9bd447622f42f811d201cbe47731f45c578fd0a4305466e9dc0a47e03bba95e67a64c43596fd8efb9e0a7d9f6a08e61
-
Filesize
382KB
MD50fd5641d84944663de4ff1c6ec73ac12
SHA13f6e79840d52ea9fceada90eac52384e2ee24d11
SHA256cd3bde9a06c3e79fb85e88a38d93c654f0d8941108581fa7b2b883a04bc9e0b0
SHA5124457ff95ee19887b58ad6ea2b5137b45a9bd447622f42f811d201cbe47731f45c578fd0a4305466e9dc0a47e03bba95e67a64c43596fd8efb9e0a7d9f6a08e61