Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 00:08
Static task
static1
Behavioral task
behavioral1
Sample
c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe
Resource
win10v2004-20230221-en
General
-
Target
c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe
-
Size
550KB
-
MD5
0514541be0fa09fca375e58d02a5f750
-
SHA1
7f70c7126adeabd010ed1ff8ec8bf3c0983d5690
-
SHA256
c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839
-
SHA512
c7ff837e5e350f18470692b131d52f5b4354cc6dc28b9e8950e70436b37c262a2f9bfa25bb93c02b45496008101179d4cf6f8b6a1ef2ad134794fc81d4e56b7b
-
SSDEEP
12288:DMrYy90GKZecf6U+fzHBXl/8/mIodlFKpIz5T3JSRYY:by11zU+1Xl/8/mBXK85TkRYY
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1721Vw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1721Vw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1721Vw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1721Vw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1721Vw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1721Vw.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1832-158-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-159-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-161-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-163-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-165-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-167-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-169-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-171-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-173-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-175-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-177-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-179-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-181-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-183-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-185-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-187-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-189-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-191-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-193-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-195-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-197-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-199-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-201-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-203-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-205-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-207-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-209-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-211-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-213-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-215-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-217-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-219-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline behavioral1/memory/1832-221-0x0000000004A80000-0x0000000004ABE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4952 nice6026.exe 5084 b1721Vw.exe 1832 c92Gu40.exe 2680 dpGnK21.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1721Vw.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice6026.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice6026.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3512 1832 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5084 b1721Vw.exe 5084 b1721Vw.exe 1832 c92Gu40.exe 1832 c92Gu40.exe 2680 dpGnK21.exe 2680 dpGnK21.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5084 b1721Vw.exe Token: SeDebugPrivilege 1832 c92Gu40.exe Token: SeDebugPrivilege 2680 dpGnK21.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4952 3096 c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe 82 PID 3096 wrote to memory of 4952 3096 c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe 82 PID 3096 wrote to memory of 4952 3096 c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe 82 PID 4952 wrote to memory of 5084 4952 nice6026.exe 83 PID 4952 wrote to memory of 5084 4952 nice6026.exe 83 PID 4952 wrote to memory of 1832 4952 nice6026.exe 92 PID 4952 wrote to memory of 1832 4952 nice6026.exe 92 PID 4952 wrote to memory of 1832 4952 nice6026.exe 92 PID 3096 wrote to memory of 2680 3096 c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe 97 PID 3096 wrote to memory of 2680 3096 c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe 97 PID 3096 wrote to memory of 2680 3096 c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe"C:\Users\Admin\AppData\Local\Temp\c8e54aa11cb37a575d0a995d66d0c95599b4f781cbbff7d6efd23919fa515839.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6026.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6026.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1721Vw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1721Vw.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c92Gu40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c92Gu40.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 13484⤵
- Program crash
PID:3512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dpGnK21.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dpGnK21.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1832 -ip 18321⤵PID:2248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
405KB
MD5542b7e2d8afcbfb16c49f97b49b70ae4
SHA112e7f2483a20364c682ffc10f152b4927457bcb0
SHA256007906986a57b4d1a5ffcac0a57fa20caa1f2507c9f233e2ef7c72ed5d6932f1
SHA512b0e93a1393cc2886d6daafc39cfc3a55bd4b12b1d5b499853ece1c3bf6a043057b6be8ce88a5e5db896e406c470d425bc905742ed714ec9b9add8d6ce930ff39
-
Filesize
405KB
MD5542b7e2d8afcbfb16c49f97b49b70ae4
SHA112e7f2483a20364c682ffc10f152b4927457bcb0
SHA256007906986a57b4d1a5ffcac0a57fa20caa1f2507c9f233e2ef7c72ed5d6932f1
SHA512b0e93a1393cc2886d6daafc39cfc3a55bd4b12b1d5b499853ece1c3bf6a043057b6be8ce88a5e5db896e406c470d425bc905742ed714ec9b9add8d6ce930ff39
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
372KB
MD5b33325c476c77bd73bae041defce377a
SHA12fa910ff4cc82e08e47a961af2dc46271a559b8c
SHA2563048cd32e140b87d4c91c114f3479cd53718316d9f8fa34336a06345dcbd9d5d
SHA512c2f504d5ae2ec107ee39c4427659bfce11d445f1070ae90a5728b24a98d5a1fcabc34d6471bef311229b7496a5154b92041ba9a9628e2d48a8b23a47a83691c4
-
Filesize
372KB
MD5b33325c476c77bd73bae041defce377a
SHA12fa910ff4cc82e08e47a961af2dc46271a559b8c
SHA2563048cd32e140b87d4c91c114f3479cd53718316d9f8fa34336a06345dcbd9d5d
SHA512c2f504d5ae2ec107ee39c4427659bfce11d445f1070ae90a5728b24a98d5a1fcabc34d6471bef311229b7496a5154b92041ba9a9628e2d48a8b23a47a83691c4