Analysis
-
max time kernel
78s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 13:09
Static task
static1
Behavioral task
behavioral1
Sample
1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe
Resource
win10v2004-20230220-en
General
-
Target
1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe
-
Size
813KB
-
MD5
1fecbc49e76650775d712a01876a5a31
-
SHA1
479885048143f2fb342e8027fbf7b60e64c94664
-
SHA256
1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064
-
SHA512
05a04fc5a3aeda0ea2a53650cdc90eef23b90c0fc22aba89930b09193806ef69c85d689d715298b3090406360092e80a9c983a60048e62da602cd9aefa806ef1
-
SSDEEP
24576:PyG3ssZUwt4ddZwQ+wMtugZkrxc8hAf1:aGcsyTuwMT+6U
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0182CF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0182CF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0182CF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0182CF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c66qM76.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0182CF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0182CF.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1800-202-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-205-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-203-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-207-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-209-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-211-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-213-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-215-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-217-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-219-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-224-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-227-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-229-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-231-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-233-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-235-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-237-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/1800-239-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2768 nice3331.exe 2040 nice7529.exe 4764 b0182CF.exe 3328 c66qM76.exe 1800 dginh67.exe 3632 e07gm37.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c66qM76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0182CF.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice7529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nice7529.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice3331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice3331.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3696 3328 WerFault.exe 90 3824 1800 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4764 b0182CF.exe 4764 b0182CF.exe 3328 c66qM76.exe 3328 c66qM76.exe 1800 dginh67.exe 1800 dginh67.exe 3632 e07gm37.exe 3632 e07gm37.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4764 b0182CF.exe Token: SeDebugPrivilege 3328 c66qM76.exe Token: SeDebugPrivilege 1800 dginh67.exe Token: SeDebugPrivilege 3632 e07gm37.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2768 4136 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe 84 PID 4136 wrote to memory of 2768 4136 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe 84 PID 4136 wrote to memory of 2768 4136 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe 84 PID 2768 wrote to memory of 2040 2768 nice3331.exe 85 PID 2768 wrote to memory of 2040 2768 nice3331.exe 85 PID 2768 wrote to memory of 2040 2768 nice3331.exe 85 PID 2040 wrote to memory of 4764 2040 nice7529.exe 86 PID 2040 wrote to memory of 4764 2040 nice7529.exe 86 PID 2040 wrote to memory of 3328 2040 nice7529.exe 90 PID 2040 wrote to memory of 3328 2040 nice7529.exe 90 PID 2040 wrote to memory of 3328 2040 nice7529.exe 90 PID 2768 wrote to memory of 1800 2768 nice3331.exe 94 PID 2768 wrote to memory of 1800 2768 nice3331.exe 94 PID 2768 wrote to memory of 1800 2768 nice3331.exe 94 PID 4136 wrote to memory of 3632 4136 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe 104 PID 4136 wrote to memory of 3632 4136 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe 104 PID 4136 wrote to memory of 3632 4136 1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe"C:\Users\Admin\AppData\Local\Temp\1e17a5de95864a2f2c92f0387cf3dcaf289b32ac2a16c54ee1a9e2c89ba9b064.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice3331.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice3331.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice7529.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice7529.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0182CF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0182CF.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c66qM76.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c66qM76.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 10845⤵
- Program crash
PID:3696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dginh67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dginh67.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 16884⤵
- Program crash
PID:3824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e07gm37.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e07gm37.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3328 -ip 33281⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1800 -ip 18001⤵PID:3888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
668KB
MD59ffdd91cbd1bfe50cce79be61a6c4d6a
SHA15feaf01a40afad607c6df59a84a4e3592e594ed7
SHA2568e8e49b100b7117a9a01e0390fa0b246fe40d1088564c0407b40e372a33beba5
SHA5127234f9d6ceb0797fb80419dafba2aa75e61336499c27cd88d9d059713deec87e14f9b596ab0111bd40634f384fa7658dc5d51793db6a123ea6fd5ca9b93d20ef
-
Filesize
668KB
MD59ffdd91cbd1bfe50cce79be61a6c4d6a
SHA15feaf01a40afad607c6df59a84a4e3592e594ed7
SHA2568e8e49b100b7117a9a01e0390fa0b246fe40d1088564c0407b40e372a33beba5
SHA5127234f9d6ceb0797fb80419dafba2aa75e61336499c27cd88d9d059713deec87e14f9b596ab0111bd40634f384fa7658dc5d51793db6a123ea6fd5ca9b93d20ef
-
Filesize
309KB
MD5aa4bb4245cae5858bd5a497c4ac52fdf
SHA10ea7ca34ac364a53c9895d236540371662e4f19b
SHA2568706dd37030d4f08b441439d010bf90ab8271acc784f3e4c895296da48e25215
SHA512e0199e32a4bc749b87fe14f1350a765c7f6de104ed5171913588e39b94414d1d4023ad75e815f0ad190c1d47e1cd36a6a3799e8f95a1601008cebec0fbf9b79c
-
Filesize
309KB
MD5aa4bb4245cae5858bd5a497c4ac52fdf
SHA10ea7ca34ac364a53c9895d236540371662e4f19b
SHA2568706dd37030d4f08b441439d010bf90ab8271acc784f3e4c895296da48e25215
SHA512e0199e32a4bc749b87fe14f1350a765c7f6de104ed5171913588e39b94414d1d4023ad75e815f0ad190c1d47e1cd36a6a3799e8f95a1601008cebec0fbf9b79c
-
Filesize
333KB
MD5f44da6dc5a733b5a796cc3c732f92f2a
SHA1c1b320a9dc5e197e7c9983b35aac06e1d272836c
SHA256316943db7002058f8bfff62612d8ec1ed3374b6e4cfa064d93d686de96db4987
SHA5125067afafe386033d5081ada02aa5b8dff3001e6b88eccd3362d3b4b8ea3c199f8143ec7647055202a632b776750dcf0649f960b4da5d0d8c8028bda340a635e3
-
Filesize
333KB
MD5f44da6dc5a733b5a796cc3c732f92f2a
SHA1c1b320a9dc5e197e7c9983b35aac06e1d272836c
SHA256316943db7002058f8bfff62612d8ec1ed3374b6e4cfa064d93d686de96db4987
SHA5125067afafe386033d5081ada02aa5b8dff3001e6b88eccd3362d3b4b8ea3c199f8143ec7647055202a632b776750dcf0649f960b4da5d0d8c8028bda340a635e3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
250KB
MD57d8b757129965be10a76fc3a1e5da834
SHA15ddca9434b249404ad41eb3b1504fdbfae6790c2
SHA25693fd398134ff78b118be29b0ae656391fd8da1eba4f7386061fa9c1549cb1376
SHA512002e06c64df25f7931c8e5e247f6fe51419424e44b9c88c793dceca3f045e84cc1e555b708bf0dfbeea4dd5f221d41147f8858d4d8bfcc4f7462967e72617e43
-
Filesize
250KB
MD57d8b757129965be10a76fc3a1e5da834
SHA15ddca9434b249404ad41eb3b1504fdbfae6790c2
SHA25693fd398134ff78b118be29b0ae656391fd8da1eba4f7386061fa9c1549cb1376
SHA512002e06c64df25f7931c8e5e247f6fe51419424e44b9c88c793dceca3f045e84cc1e555b708bf0dfbeea4dd5f221d41147f8858d4d8bfcc4f7462967e72617e43