Analysis
-
max time kernel
55s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/03/2023, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe
Resource
win10-20230220-en
General
-
Target
6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe
-
Size
694KB
-
MD5
1e232ee1e61d4c00ad672a5cc11e3834
-
SHA1
baedc1ad09cd6c86223969160c10aa6516654463
-
SHA256
6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9
-
SHA512
cb999cf0993806d0c114d08baf237c9a6c073a3850e96df3e72cd142fedff0c90e09216ba759b8e71d1bd621b9f49e56eb372f69ee94de0aa0cf960ee7610dc8
-
SSDEEP
12288:TMr+y9022p6CeIT4NfyeoRs+K2+Ptfg0wiLcNy7jvKYiSkzLycLlhnUiRu2ga:1yVdCrUf8W+b+PtfgoLXjvKYNAyOUiL9
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6602rY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6602rY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6602rY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6602rY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6602rY.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1000-177-0x0000000002370000-0x00000000023B6000-memory.dmp family_redline behavioral1/memory/1000-178-0x0000000004A50000-0x0000000004A94000-memory.dmp family_redline behavioral1/memory/1000-179-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-180-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-182-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-184-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-186-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-188-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-190-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-192-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-194-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-196-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-198-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-200-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-202-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-204-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-206-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-208-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-210-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-212-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/1000-362-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1600 nyU3502UA.exe 1968 b6602rY.exe 1000 c92gD62.exe 3080 dCWFs72.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b6602rY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b6602rY.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nyU3502UA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nyU3502UA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1968 b6602rY.exe 1968 b6602rY.exe 1000 c92gD62.exe 1000 c92gD62.exe 3080 dCWFs72.exe 3080 dCWFs72.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1968 b6602rY.exe Token: SeDebugPrivilege 1000 c92gD62.exe Token: SeDebugPrivilege 3080 dCWFs72.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1600 1444 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe 66 PID 1444 wrote to memory of 1600 1444 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe 66 PID 1444 wrote to memory of 1600 1444 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe 66 PID 1600 wrote to memory of 1968 1600 nyU3502UA.exe 67 PID 1600 wrote to memory of 1968 1600 nyU3502UA.exe 67 PID 1600 wrote to memory of 1968 1600 nyU3502UA.exe 67 PID 1600 wrote to memory of 1000 1600 nyU3502UA.exe 68 PID 1600 wrote to memory of 1000 1600 nyU3502UA.exe 68 PID 1600 wrote to memory of 1000 1600 nyU3502UA.exe 68 PID 1444 wrote to memory of 3080 1444 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe 70 PID 1444 wrote to memory of 3080 1444 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe 70 PID 1444 wrote to memory of 3080 1444 6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe"C:\Users\Admin\AppData\Local\Temp\6437212a9b705912e3fbd108947c6f4a86b3a9c81a18d512451187c6fa8b6cc9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyU3502UA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyU3502UA.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6602rY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6602rY.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c92gD62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c92gD62.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCWFs72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCWFs72.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
550KB
MD587d416788b917e5af730fad2102e2b11
SHA186c078125fd1d618b4b3e9017fcba5e8acb78c54
SHA2563c3f9868a5ba6e70c4728cea432d86bcd7e1de9f964ab2e9cf9ad2d63dc420dc
SHA5125abfa9e40de0a61efeae90a3db642cd84fd3beea95ca9ec96d0f5effd38cf5bef029e135abdae8e11f124b654f0d52b6a34319d46fe8bb4288faaedab39cc5fd
-
Filesize
550KB
MD587d416788b917e5af730fad2102e2b11
SHA186c078125fd1d618b4b3e9017fcba5e8acb78c54
SHA2563c3f9868a5ba6e70c4728cea432d86bcd7e1de9f964ab2e9cf9ad2d63dc420dc
SHA5125abfa9e40de0a61efeae90a3db642cd84fd3beea95ca9ec96d0f5effd38cf5bef029e135abdae8e11f124b654f0d52b6a34319d46fe8bb4288faaedab39cc5fd
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1