Analysis
-
max time kernel
105s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 10:23
Static task
static1
Behavioral task
behavioral1
Sample
10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe
Resource
win10v2004-20230220-en
General
-
Target
10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe
-
Size
538KB
-
MD5
77180860e20e30ce826ff13ac95d8acc
-
SHA1
bf5b1d9a2421a541c65cab4fe5e94ac48eac30e6
-
SHA256
10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4
-
SHA512
30cd272af2edc0b1de54be8502acad68084b5b1473103747e38988d727c8412c5a83eb055f5a8675fe75ac982075fc7ae38d2dd5db989372e4c8473f4dbf0c9a
-
SSDEEP
6144:KSy+bnr+Sp0yN90QEC2JP3pdDBdcOyD1Jjat88qsmiRfjqJQQ8mZ1fQ6K80u3xh0:+Mrmy90Y2J/fH3YLsmifCQHmZ+80uZW
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5494dz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5494dz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5494dz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5494dz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5494dz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5494dz.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1428-154-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-157-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-159-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-155-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-161-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-165-0x0000000004D70000-0x0000000004D80000-memory.dmp family_redline behavioral1/memory/1428-164-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-168-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-171-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-173-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-175-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-177-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-179-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-181-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-183-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-185-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-187-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-189-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-191-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-193-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-195-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-197-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-199-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-201-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-203-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-205-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-207-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-209-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-211-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-213-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-215-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-217-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-219-0x0000000002500000-0x000000000253E000-memory.dmp family_redline behavioral1/memory/1428-221-0x0000000002500000-0x000000000253E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3160 nice5022.exe 1452 b5494dz.exe 1428 c20Vs11.exe 3844 daOIE13.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5494dz.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice5022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice5022.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1664 1428 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1452 b5494dz.exe 1452 b5494dz.exe 1428 c20Vs11.exe 1428 c20Vs11.exe 3844 daOIE13.exe 3844 daOIE13.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1452 b5494dz.exe Token: SeDebugPrivilege 1428 c20Vs11.exe Token: SeDebugPrivilege 3844 daOIE13.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4560 wrote to memory of 3160 4560 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe 86 PID 4560 wrote to memory of 3160 4560 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe 86 PID 4560 wrote to memory of 3160 4560 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe 86 PID 3160 wrote to memory of 1452 3160 nice5022.exe 87 PID 3160 wrote to memory of 1452 3160 nice5022.exe 87 PID 3160 wrote to memory of 1428 3160 nice5022.exe 88 PID 3160 wrote to memory of 1428 3160 nice5022.exe 88 PID 3160 wrote to memory of 1428 3160 nice5022.exe 88 PID 4560 wrote to memory of 3844 4560 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe 92 PID 4560 wrote to memory of 3844 4560 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe 92 PID 4560 wrote to memory of 3844 4560 10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe"C:\Users\Admin\AppData\Local\Temp\10cb510daae9c6330353e65e14a5f7bd50fb980e38416c1d9f04a525e886a0c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice5022.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice5022.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5494dz.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5494dz.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c20Vs11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c20Vs11.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 13564⤵
- Program crash
PID:1664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daOIE13.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daOIE13.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1428 -ip 14281⤵PID:4876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
393KB
MD50a44f355922443022555923847914da0
SHA137c8cc809eb132b858fc1abe13b060b3f6183b31
SHA2568a5d22d278668648613a8621a2c0f4c55472afdaf4266d4d35eede968c195acf
SHA512afd6e204fe07e6e695486315920a3a109a7fb8ebecba05af276b5450b1aaed622cd41acf3ec9d1ce384a504b517e5cf359e501018de1655ff9eb2f9a214f7812
-
Filesize
393KB
MD50a44f355922443022555923847914da0
SHA137c8cc809eb132b858fc1abe13b060b3f6183b31
SHA2568a5d22d278668648613a8621a2c0f4c55472afdaf4266d4d35eede968c195acf
SHA512afd6e204fe07e6e695486315920a3a109a7fb8ebecba05af276b5450b1aaed622cd41acf3ec9d1ce384a504b517e5cf359e501018de1655ff9eb2f9a214f7812
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
309KB
MD5a28b814384c74983f2d1cf5486012586
SHA1f162fd64d239e4eb0a316a31adb3be41c7574d34
SHA256369d6a4afdd213718b91130ce3374cc30136a2b7c8d6307b8f9b84e1893925f8
SHA512ee70c946c5e4f2ba7c9b893175077e9d6d25b5f1872a52c8a02991370da4bd80a981803809333858bc41bdd1192a04a31b69d961dd153f59639705e533dea96d
-
Filesize
309KB
MD5a28b814384c74983f2d1cf5486012586
SHA1f162fd64d239e4eb0a316a31adb3be41c7574d34
SHA256369d6a4afdd213718b91130ce3374cc30136a2b7c8d6307b8f9b84e1893925f8
SHA512ee70c946c5e4f2ba7c9b893175077e9d6d25b5f1872a52c8a02991370da4bd80a981803809333858bc41bdd1192a04a31b69d961dd153f59639705e533dea96d