Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe
Resource
win10v2004-20230220-en
General
-
Target
9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe
-
Size
693KB
-
MD5
ac62810c082b0794432baed6dc540d66
-
SHA1
bcbd1f50037687fc0d5ce4acbecf5bf8a77e967b
-
SHA256
9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504
-
SHA512
d6bbe772d4681fe9e9d020c27a23d830ec953b7a4912919389222cf9b02b115941e37e23048a259060c265f741c56744f97e3746768b1e287a7917e07d828d80
-
SSDEEP
12288:fMrWy90nfKQrW9TYNwuRK2+Otcg0wiPcodeUxzS0zEOYn8cTrJ+2gQBm:xyofzWybb+OtcgoPXoUxzcVrlf8
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
diza
193.56.146.11:4173
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1576Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1576Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1576Ye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b1576Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1576Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1576Ye.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4848-191-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-194-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-196-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-192-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-198-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-200-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-202-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-204-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-206-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-208-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-210-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-212-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-220-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-217-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-222-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-224-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-226-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline behavioral1/memory/4848-228-0x00000000050E0000-0x000000000511E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1476 nso1607CH.exe 2308 b1576Ye.exe 4848 c31XF55.exe 2684 daxlV87.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b1576Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b1576Ye.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nso1607CH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nso1607CH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2072 4848 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2308 b1576Ye.exe 2308 b1576Ye.exe 4848 c31XF55.exe 4848 c31XF55.exe 2684 daxlV87.exe 2684 daxlV87.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2308 b1576Ye.exe Token: SeDebugPrivilege 4848 c31XF55.exe Token: SeDebugPrivilege 2684 daxlV87.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1476 1712 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe 84 PID 1712 wrote to memory of 1476 1712 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe 84 PID 1712 wrote to memory of 1476 1712 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe 84 PID 1476 wrote to memory of 2308 1476 nso1607CH.exe 85 PID 1476 wrote to memory of 2308 1476 nso1607CH.exe 85 PID 1476 wrote to memory of 2308 1476 nso1607CH.exe 85 PID 1476 wrote to memory of 4848 1476 nso1607CH.exe 90 PID 1476 wrote to memory of 4848 1476 nso1607CH.exe 90 PID 1476 wrote to memory of 4848 1476 nso1607CH.exe 90 PID 1712 wrote to memory of 2684 1712 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe 98 PID 1712 wrote to memory of 2684 1712 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe 98 PID 1712 wrote to memory of 2684 1712 9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe"C:\Users\Admin\AppData\Local\Temp\9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nso1607CH.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nso1607CH.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1576Ye.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1576Ye.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c31XF55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c31XF55.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 19244⤵
- Program crash
PID:2072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daxlV87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daxlV87.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4848 -ip 48481⤵PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55c65803d42d5d06e302798faee3a11cd
SHA11e8de783b9994a3e422d9799437e4ad0ce554cc6
SHA256a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2
SHA51271a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804
-
Filesize
175KB
MD55c65803d42d5d06e302798faee3a11cd
SHA11e8de783b9994a3e422d9799437e4ad0ce554cc6
SHA256a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2
SHA51271a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804
-
Filesize
548KB
MD5ea2aaafa953291bb7f2a229f7d02a787
SHA13e31b81f03d19a5d0d81c3d8c6bd7196db35808e
SHA256030dd8ec834b999a05a8128ba7ec39e0ed17f760b37233dadb83a15123f8809a
SHA51277a53eb0940de75feee669a2f4881e9f44c6bd989c7603f4c5b235c5ed32efd8c21697aeab933eccdb95de8dd8332811b11a83acc390032a71ebb7aa04abcc81
-
Filesize
548KB
MD5ea2aaafa953291bb7f2a229f7d02a787
SHA13e31b81f03d19a5d0d81c3d8c6bd7196db35808e
SHA256030dd8ec834b999a05a8128ba7ec39e0ed17f760b37233dadb83a15123f8809a
SHA51277a53eb0940de75feee669a2f4881e9f44c6bd989c7603f4c5b235c5ed32efd8c21697aeab933eccdb95de8dd8332811b11a83acc390032a71ebb7aa04abcc81
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
380KB
MD5cd30df0759fea97083bdf62f610ec081
SHA1864bf5a66a31bf4bd217fa7c5496c9759211da26
SHA2567ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0
SHA51213491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b
-
Filesize
380KB
MD5cd30df0759fea97083bdf62f610ec081
SHA1864bf5a66a31bf4bd217fa7c5496c9759211da26
SHA2567ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0
SHA51213491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b