Analysis
-
max time kernel
146s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe
Resource
win10v2004-20230220-en
General
-
Target
fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe
-
Size
696KB
-
MD5
693cb122b315b8b43b962035cfa0f424
-
SHA1
2514e8b03be12f7515b96d9679d74aef566e6b08
-
SHA256
fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb
-
SHA512
2c3e721ff3fed29aa700969986ae4fe8c393ef3ea7bbc6b568c54fd92912266f1c44de3b4fda7c0c0d26ac23fe2d925cdee088c15dd586dbdf20ece828e020b0
-
SSDEEP
12288:iMrCy90H3awMbqAuULqu5lvRlWK2+ytug0wi0c4bAK7ShBJ0d9w:UyC3awMOTUGupSb+ytugo0DZ0B63w
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4673NA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4673NA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b4673NA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4673NA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4673NA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4673NA.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/5108-194-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-193-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-197-0x0000000004D20000-0x0000000004D30000-memory.dmp family_redline behavioral1/memory/5108-198-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-200-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-202-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-204-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-206-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-208-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-210-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-212-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-214-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-216-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-218-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-220-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-222-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-224-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-226-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/5108-228-0x0000000002540000-0x000000000257E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1868 ngz7044Fu.exe 4000 b4673NA.exe 5108 c80Eg10.exe 348 dvRST47.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b4673NA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b4673NA.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ngz7044Fu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ngz7044Fu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5016 5108 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4000 b4673NA.exe 4000 b4673NA.exe 5108 c80Eg10.exe 5108 c80Eg10.exe 348 dvRST47.exe 348 dvRST47.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4000 b4673NA.exe Token: SeDebugPrivilege 5108 c80Eg10.exe Token: SeDebugPrivilege 348 dvRST47.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1868 1784 fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe 84 PID 1784 wrote to memory of 1868 1784 fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe 84 PID 1784 wrote to memory of 1868 1784 fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe 84 PID 1868 wrote to memory of 4000 1868 ngz7044Fu.exe 85 PID 1868 wrote to memory of 4000 1868 ngz7044Fu.exe 85 PID 1868 wrote to memory of 4000 1868 ngz7044Fu.exe 85 PID 1868 wrote to memory of 5108 1868 ngz7044Fu.exe 91 PID 1868 wrote to memory of 5108 1868 ngz7044Fu.exe 91 PID 1868 wrote to memory of 5108 1868 ngz7044Fu.exe 91 PID 1784 wrote to memory of 348 1784 fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe 95 PID 1784 wrote to memory of 348 1784 fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe 95 PID 1784 wrote to memory of 348 1784 fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe"C:\Users\Admin\AppData\Local\Temp\fe04f575d4f8fe5685ceaeea0b2cef4c7e994ab652fd4915d71cb949b4b73bcb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ngz7044Fu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ngz7044Fu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4673NA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4673NA.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c80Eg10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c80Eg10.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 21004⤵
- Program crash
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvRST47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvRST47.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5108 -ip 51081⤵PID:4152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
552KB
MD53e64e6ed752877bc495e6bddd0a1463c
SHA19be61ca3f419645427c1303c167ed592d3f75222
SHA25618e32e7cc069cf49ba09b93f7bcb3af7155c41261aa70d3ca4f6b7c229cdd596
SHA512dbc628095a01734b3eb912454892802fd7d24d8ed1288df46473b0e0c764d01ce6cd960f3e48b69df6458fa9a4bcdbee6ad6eee28945fb52239d5df8dcdab6c0
-
Filesize
552KB
MD53e64e6ed752877bc495e6bddd0a1463c
SHA19be61ca3f419645427c1303c167ed592d3f75222
SHA25618e32e7cc069cf49ba09b93f7bcb3af7155c41261aa70d3ca4f6b7c229cdd596
SHA512dbc628095a01734b3eb912454892802fd7d24d8ed1288df46473b0e0c764d01ce6cd960f3e48b69df6458fa9a4bcdbee6ad6eee28945fb52239d5df8dcdab6c0
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
381KB
MD579183f88b273bd94752126e28a74a872
SHA14969ee7676f48a9c26c21da543322993704c403f
SHA25635c6bb7d3f63d1c1b25b5dba53cbbbc3b3876baf9c02688ca95768b2b4062f21
SHA512c7f4663100fef6e7206b9f879afb6b1309460ef14af23444f9ef0e115e2d7892831e04dd4a344eac4d77654d400360223c45d1343638cf5f45edaefc1e569899
-
Filesize
381KB
MD579183f88b273bd94752126e28a74a872
SHA14969ee7676f48a9c26c21da543322993704c403f
SHA25635c6bb7d3f63d1c1b25b5dba53cbbbc3b3876baf9c02688ca95768b2b4062f21
SHA512c7f4663100fef6e7206b9f879afb6b1309460ef14af23444f9ef0e115e2d7892831e04dd4a344eac4d77654d400360223c45d1343638cf5f45edaefc1e569899