Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-03-2023 16:07
Static task
static1
Behavioral task
behavioral1
Sample
608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe
Resource
win10-20230220-en
General
-
Target
608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe
-
Size
812KB
-
MD5
8c8daa3a29b48eb0e63d49fc799e0da7
-
SHA1
86e4fc855e5c2a2f7819c8fe89086b4c319733c8
-
SHA256
608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe
-
SHA512
70f93d4f401eea82e576c10231988db99d6f3e820f10a889c4ebcaa9b049cd05336446dd69f23ea563e0cbc7068e4fbb58cae08f8f67e59c0bd58009be6ff1c0
-
SSDEEP
12288:tMrsy90sLiRhNSnxIFROxDx9NDHeYeNYYDp4B9clOGL1urk4+IVG6l/2g1UNH:FyKVSZx9NaQw4BdGLYrkelINH
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c11ez60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c11ez60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c11ez60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c11ez60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4505Sq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4505Sq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4505Sq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4505Sq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4505Sq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c11ez60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2360-189-0x00000000009B0000-0x00000000009F6000-memory.dmp family_redline behavioral1/memory/2360-190-0x00000000024D0000-0x0000000002514000-memory.dmp family_redline behavioral1/memory/2360-191-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-192-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-194-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-196-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-198-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-200-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-202-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-204-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-206-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-208-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-210-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-212-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-214-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-216-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-218-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-220-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-222-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline behavioral1/memory/2360-224-0x00000000024D0000-0x000000000250E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3936 nice3687.exe 4348 nice3812.exe 1008 b4505Sq.exe 1472 c11ez60.exe 2360 dXkYl01.exe 4428 e07aF31.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4505Sq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c11ez60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c11ez60.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice3687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice3687.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice3812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nice3812.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1008 b4505Sq.exe 1008 b4505Sq.exe 1472 c11ez60.exe 1472 c11ez60.exe 2360 dXkYl01.exe 2360 dXkYl01.exe 4428 e07aF31.exe 4428 e07aF31.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1008 b4505Sq.exe Token: SeDebugPrivilege 1472 c11ez60.exe Token: SeDebugPrivilege 2360 dXkYl01.exe Token: SeDebugPrivilege 4428 e07aF31.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3936 4152 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe 66 PID 4152 wrote to memory of 3936 4152 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe 66 PID 4152 wrote to memory of 3936 4152 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe 66 PID 3936 wrote to memory of 4348 3936 nice3687.exe 67 PID 3936 wrote to memory of 4348 3936 nice3687.exe 67 PID 3936 wrote to memory of 4348 3936 nice3687.exe 67 PID 4348 wrote to memory of 1008 4348 nice3812.exe 68 PID 4348 wrote to memory of 1008 4348 nice3812.exe 68 PID 4348 wrote to memory of 1472 4348 nice3812.exe 69 PID 4348 wrote to memory of 1472 4348 nice3812.exe 69 PID 4348 wrote to memory of 1472 4348 nice3812.exe 69 PID 3936 wrote to memory of 2360 3936 nice3687.exe 70 PID 3936 wrote to memory of 2360 3936 nice3687.exe 70 PID 3936 wrote to memory of 2360 3936 nice3687.exe 70 PID 4152 wrote to memory of 4428 4152 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe 72 PID 4152 wrote to memory of 4428 4152 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe 72 PID 4152 wrote to memory of 4428 4152 608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe"C:\Users\Admin\AppData\Local\Temp\608d670510aa14c11c17cea561cca0a306010c1294ae99381273401ef0af11fe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice3687.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice3687.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice3812.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice3812.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4505Sq.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4505Sq.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c11ez60.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c11ez60.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXkYl01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXkYl01.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e07aF31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e07aF31.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
667KB
MD5963da85e6f9ee8f632bbeef689616f6c
SHA1e9b3cf2615a99a910980648f2d7821f0dca975af
SHA2564b1f5f834f0dda38ebe788689fd5b5c78d727358e02cda3f440d2c3ae1000231
SHA512d6bb656222d567c0f785535c42c9e0876b05e95d4a8ee20dc40effac8345beccf3b3a6b12b17f34e67fa5e0aa92d19544b4b32fc6cbf51d851f6352dc3a9be80
-
Filesize
667KB
MD5963da85e6f9ee8f632bbeef689616f6c
SHA1e9b3cf2615a99a910980648f2d7821f0dca975af
SHA2564b1f5f834f0dda38ebe788689fd5b5c78d727358e02cda3f440d2c3ae1000231
SHA512d6bb656222d567c0f785535c42c9e0876b05e95d4a8ee20dc40effac8345beccf3b3a6b12b17f34e67fa5e0aa92d19544b4b32fc6cbf51d851f6352dc3a9be80
-
Filesize
307KB
MD515ee8175ccc1b29ffe3b1896e0dbf881
SHA13f5b431493de7674b8351fa05bb275ae9480e073
SHA2567e54f3e339592474aaef58750cdec582e41dceb8c243b378f53f6649d34ac795
SHA512664be0268d30959af40cb33cf02d6bbe00962b1ca7a29234d2b2cd96ee53e61d7d65d5fe0efeee6237bddfaada7dcfd47c55668368b5a437d8d88206216e6685
-
Filesize
307KB
MD515ee8175ccc1b29ffe3b1896e0dbf881
SHA13f5b431493de7674b8351fa05bb275ae9480e073
SHA2567e54f3e339592474aaef58750cdec582e41dceb8c243b378f53f6649d34ac795
SHA512664be0268d30959af40cb33cf02d6bbe00962b1ca7a29234d2b2cd96ee53e61d7d65d5fe0efeee6237bddfaada7dcfd47c55668368b5a437d8d88206216e6685
-
Filesize
333KB
MD5c9fe6183431ff159ffd10c4f6a3d0527
SHA1b9898bfa221de7796bc7eb19e86c1b70dfc4a0af
SHA25613682271a970687b4a9b7c7e80e9f60039ff4170096cb0e1b232459bfbc4830f
SHA512c165b2b11dcaa2d5e6c12ec97a52d32d6c58004bcf912f87decc852f133e08a90ff5fd988dfdb7bc0b0aee8f16e9e7e47ba0048d291d7b9d06a61e41923f7695
-
Filesize
333KB
MD5c9fe6183431ff159ffd10c4f6a3d0527
SHA1b9898bfa221de7796bc7eb19e86c1b70dfc4a0af
SHA25613682271a970687b4a9b7c7e80e9f60039ff4170096cb0e1b232459bfbc4830f
SHA512c165b2b11dcaa2d5e6c12ec97a52d32d6c58004bcf912f87decc852f133e08a90ff5fd988dfdb7bc0b0aee8f16e9e7e47ba0048d291d7b9d06a61e41923f7695
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
250KB
MD57c231442db768c4779a18beac2db1bfa
SHA19a1923fb3f81f40c01efc549fc24e868b7aef46c
SHA2566294ecc54de074bf41bba18ce7ccc737fa4f9f88d44eab1dab0be3019695ace6
SHA51240b1da69bd3655f2d1684417cdca05b7ec1824b015ad873643af00ced6dd01dd60babf9fabd51c808c8d6b5c125035da17ef55aefb7a3d1ded1ca9909eeefca2
-
Filesize
250KB
MD57c231442db768c4779a18beac2db1bfa
SHA19a1923fb3f81f40c01efc549fc24e868b7aef46c
SHA2566294ecc54de074bf41bba18ce7ccc737fa4f9f88d44eab1dab0be3019695ace6
SHA51240b1da69bd3655f2d1684417cdca05b7ec1824b015ad873643af00ced6dd01dd60babf9fabd51c808c8d6b5c125035da17ef55aefb7a3d1ded1ca9909eeefca2