Analysis
-
max time kernel
98s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe
Resource
win10v2004-20230220-en
General
-
Target
0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe
-
Size
689KB
-
MD5
add17b12448a3c08be7a02ac1041798f
-
SHA1
f4b8c3693f1314c668f76726a0cf1ba9de19416a
-
SHA256
0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1
-
SHA512
67170b0d8942c9943e74c290d5b54b8671a9a7d22946220770679364ec9e6e5bea981f62e87f2852cc2d1ae94b168740cafdef9d9e9bf0eb6cd36dd113ac82e6
-
SSDEEP
12288:UMrUy90+BfxuV70S8fGMGyILyW/DK2+6tGg0wiTcs5MJMd32K9rdnUab7HP+Wsa+:oyBfIV7bYZ6Db+6tGgoTPMFKNdUab7HE
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
diza
193.56.146.11:4173
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4045Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4045Ka.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b4045Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4045Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4045Ka.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4045Ka.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2280-189-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-190-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-192-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-194-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-196-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-198-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-200-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-202-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-204-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-206-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-208-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-210-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-212-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-214-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-216-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-219-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-223-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-225-0x0000000005080000-0x00000000050BE000-memory.dmp family_redline behavioral1/memory/2280-1107-0x0000000004AC0000-0x0000000004AD0000-memory.dmp family_redline behavioral1/memory/2280-1113-0x0000000004AC0000-0x0000000004AD0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2108 nZB3635Uc.exe 1460 b4045Ka.exe 2280 c57ro19.exe 2552 dbBvU09.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b4045Ka.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b4045Ka.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nZB3635Uc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nZB3635Uc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1460 b4045Ka.exe 1460 b4045Ka.exe 2280 c57ro19.exe 2280 c57ro19.exe 2552 dbBvU09.exe 2552 dbBvU09.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1460 b4045Ka.exe Token: SeDebugPrivilege 2280 c57ro19.exe Token: SeDebugPrivilege 2552 dbBvU09.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2108 3224 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe 85 PID 3224 wrote to memory of 2108 3224 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe 85 PID 3224 wrote to memory of 2108 3224 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe 85 PID 2108 wrote to memory of 1460 2108 nZB3635Uc.exe 86 PID 2108 wrote to memory of 1460 2108 nZB3635Uc.exe 86 PID 2108 wrote to memory of 1460 2108 nZB3635Uc.exe 86 PID 2108 wrote to memory of 2280 2108 nZB3635Uc.exe 95 PID 2108 wrote to memory of 2280 2108 nZB3635Uc.exe 95 PID 2108 wrote to memory of 2280 2108 nZB3635Uc.exe 95 PID 3224 wrote to memory of 2552 3224 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe 96 PID 3224 wrote to memory of 2552 3224 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe 96 PID 3224 wrote to memory of 2552 3224 0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe"C:\Users\Admin\AppData\Local\Temp\0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nZB3635Uc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nZB3635Uc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4045Ka.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4045Ka.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c57ro19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c57ro19.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbBvU09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbBvU09.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55c65803d42d5d06e302798faee3a11cd
SHA11e8de783b9994a3e422d9799437e4ad0ce554cc6
SHA256a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2
SHA51271a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804
-
Filesize
175KB
MD55c65803d42d5d06e302798faee3a11cd
SHA11e8de783b9994a3e422d9799437e4ad0ce554cc6
SHA256a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2
SHA51271a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804
-
Filesize
544KB
MD5d286a00edbdd7bcab705dcfef65e4a8e
SHA138ef8f9ae427e34b938fc2c76429fb0030b1e244
SHA256e1f1d88e3b517198747dab189102ac87057294ef968025fcd6e108ceb37481dd
SHA5129faaec4eafe99297c7345fefbfb8981adf0df86e1d32c90687369ac1dddb21847e3583857c683b2e29df1a6dd5d392bf4934adb0653f1ff78ffd1b511df7d345
-
Filesize
544KB
MD5d286a00edbdd7bcab705dcfef65e4a8e
SHA138ef8f9ae427e34b938fc2c76429fb0030b1e244
SHA256e1f1d88e3b517198747dab189102ac87057294ef968025fcd6e108ceb37481dd
SHA5129faaec4eafe99297c7345fefbfb8981adf0df86e1d32c90687369ac1dddb21847e3583857c683b2e29df1a6dd5d392bf4934adb0653f1ff78ffd1b511df7d345
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
381KB
MD584a42dfba694347808c6a154ea6a4b1a
SHA1ef6f18e9d028dcfdb29474d779d815a9e2dde5fa
SHA2569548c5b9299705d044097563f54f45861b1e48ca61ba5451c6af0f625c027881
SHA5125ca5aceb035fd8696212a1c3c86c68955acc1f01dd1f594c8ccd270af969d4c164c0c08b96ced106dfe0606ee2e8f5093512f30a47ce39a5e6e658405b971ef4
-
Filesize
381KB
MD584a42dfba694347808c6a154ea6a4b1a
SHA1ef6f18e9d028dcfdb29474d779d815a9e2dde5fa
SHA2569548c5b9299705d044097563f54f45861b1e48ca61ba5451c6af0f625c027881
SHA5125ca5aceb035fd8696212a1c3c86c68955acc1f01dd1f594c8ccd270af969d4c164c0c08b96ced106dfe0606ee2e8f5093512f30a47ce39a5e6e658405b971ef4