Analysis
-
max time kernel
39s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-03-2023 13:56
Static task
static1
Behavioral task
behavioral1
Sample
e94cc00e26cebf17242f445814bbf53e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e94cc00e26cebf17242f445814bbf53e.exe
Resource
win10v2004-20230220-en
General
-
Target
e94cc00e26cebf17242f445814bbf53e.exe
-
Size
694KB
-
MD5
e94cc00e26cebf17242f445814bbf53e
-
SHA1
d4f85180d5de1261325c9a33b7af157dab44bb20
-
SHA256
30b3952bd4f49fb1c1643e29c05af36d39ed26896c0011b48bdd16a5674cf362
-
SHA512
50d7e579f30dea0040881cfd5f8ff9fc31dd862d82887039a03d124df457ca4ae36fecd7eb508539624b87455e395e2c03bed4e47fff3e1587767eaf6dc07dbd
-
SSDEEP
12288:vMrQy907SCu5+9JD2mhxK2+Ptfg0wiDcZ1AjvKYiSkzLycLlhnUiRu2gz:ryu6Q9t/b+PtfgoDUAjvKYNAyOUiLgz
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6291mW.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1676-122-0x00000000021C0000-0x0000000002206000-memory.dmp family_redline behavioral1/memory/1676-123-0x0000000002270000-0x00000000022B4000-memory.dmp family_redline behavioral1/memory/1676-124-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-125-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-127-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-129-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-131-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-133-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-135-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-137-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-139-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-141-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-143-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-145-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-147-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-149-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-151-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-153-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-155-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-157-0x0000000002270000-0x00000000022AE000-memory.dmp family_redline behavioral1/memory/1676-1033-0x0000000004B30000-0x0000000004B70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2016 njY7530ZT.exe 668 b6291mW.exe 1676 c16TU74.exe 1064 dTEBh41.exe -
Loads dropped DLL 10 IoCs
pid Process 1108 e94cc00e26cebf17242f445814bbf53e.exe 2016 njY7530ZT.exe 2016 njY7530ZT.exe 2016 njY7530ZT.exe 668 b6291mW.exe 2016 njY7530ZT.exe 2016 njY7530ZT.exe 1676 c16TU74.exe 1108 e94cc00e26cebf17242f445814bbf53e.exe 1064 dTEBh41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b6291mW.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" njY7530ZT.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e94cc00e26cebf17242f445814bbf53e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e94cc00e26cebf17242f445814bbf53e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce njY7530ZT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 668 b6291mW.exe 668 b6291mW.exe 1676 c16TU74.exe 1676 c16TU74.exe 1064 dTEBh41.exe 1064 dTEBh41.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 668 b6291mW.exe Token: SeDebugPrivilege 1676 c16TU74.exe Token: SeDebugPrivilege 1064 dTEBh41.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 1108 wrote to memory of 2016 1108 e94cc00e26cebf17242f445814bbf53e.exe 27 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 668 2016 njY7530ZT.exe 28 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 2016 wrote to memory of 1676 2016 njY7530ZT.exe 29 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31 PID 1108 wrote to memory of 1064 1108 e94cc00e26cebf17242f445814bbf53e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e94cc00e26cebf17242f445814bbf53e.exe"C:\Users\Admin\AppData\Local\Temp\e94cc00e26cebf17242f445814bbf53e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\njY7530ZT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\njY7530ZT.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6291mW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6291mW.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c16TU74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c16TU74.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTEBh41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTEBh41.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
550KB
MD52b3f3a8143bd30454f351fedef9fca59
SHA1fcca27d87074cae1e24897dd01ad92c12337390e
SHA2566eb11a73cd82b0a20f0e9eea2f558ef4a47cab9be1968a29fd8310c74c4e6538
SHA512df953b0d43b9205506ea5a392637db1aab1f6946ddd13816c5cb5ccfed25c8f069cb9645a32064165034d512ebccc88ea3f41425ab622b35e0b96e52a7ab1730
-
Filesize
550KB
MD52b3f3a8143bd30454f351fedef9fca59
SHA1fcca27d87074cae1e24897dd01ad92c12337390e
SHA2566eb11a73cd82b0a20f0e9eea2f558ef4a47cab9be1968a29fd8310c74c4e6538
SHA512df953b0d43b9205506ea5a392637db1aab1f6946ddd13816c5cb5ccfed25c8f069cb9645a32064165034d512ebccc88ea3f41425ab622b35e0b96e52a7ab1730
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
550KB
MD52b3f3a8143bd30454f351fedef9fca59
SHA1fcca27d87074cae1e24897dd01ad92c12337390e
SHA2566eb11a73cd82b0a20f0e9eea2f558ef4a47cab9be1968a29fd8310c74c4e6538
SHA512df953b0d43b9205506ea5a392637db1aab1f6946ddd13816c5cb5ccfed25c8f069cb9645a32064165034d512ebccc88ea3f41425ab622b35e0b96e52a7ab1730
-
Filesize
550KB
MD52b3f3a8143bd30454f351fedef9fca59
SHA1fcca27d87074cae1e24897dd01ad92c12337390e
SHA2566eb11a73cd82b0a20f0e9eea2f558ef4a47cab9be1968a29fd8310c74c4e6538
SHA512df953b0d43b9205506ea5a392637db1aab1f6946ddd13816c5cb5ccfed25c8f069cb9645a32064165034d512ebccc88ea3f41425ab622b35e0b96e52a7ab1730
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1