Analysis
-
max time kernel
54s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-03-2023 22:34
Static task
static1
Behavioral task
behavioral1
Sample
6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe
Resource
win10-20230220-en
General
-
Target
6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe
-
Size
787KB
-
MD5
7faa376a765fa4c67f9e41610d8b9f83
-
SHA1
73b34a47582792251b9558b8e12f255f575b2abe
-
SHA256
6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a
-
SHA512
d09678887da10d9ab541c68427f42e568a18a11ef16ea90438c2c0a8a30e70697b11694437a38e9492da87e12fd6ea5e59ff8b79da5f5cd010117ff3bbd8fa3d
-
SSDEEP
12288:pMrfy90det6HLKupqAbIC82CHuDt29yakAh4JJUreGaYE/okR151M9dXYk12qL8W:yy8eWPq/MCHg0UalhwtGaYToL1yRYZM
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1705wg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1705wg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1705wg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1705wg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1705wg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1464-188-0x00000000049E0000-0x0000000004A26000-memory.dmp family_redline behavioral1/memory/1464-189-0x0000000004A60000-0x0000000004AA4000-memory.dmp family_redline behavioral1/memory/1464-190-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-191-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-193-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-195-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-197-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-199-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-201-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-203-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-205-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-207-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-209-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-211-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-213-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-215-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-217-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-219-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-221-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral1/memory/1464-223-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3644 tice7191.exe 2272 tice8295.exe 4496 b1705wg.exe 4920 c61Wk27.exe 1464 dCElh21.exe 3892 e83rR91.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c61Wk27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1705wg.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice7191.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice7191.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8295.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4496 b1705wg.exe 4496 b1705wg.exe 4920 c61Wk27.exe 4920 c61Wk27.exe 1464 dCElh21.exe 1464 dCElh21.exe 3892 e83rR91.exe 3892 e83rR91.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4496 b1705wg.exe Token: SeDebugPrivilege 4920 c61Wk27.exe Token: SeDebugPrivilege 1464 dCElh21.exe Token: SeDebugPrivilege 3892 e83rR91.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3644 4124 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe 66 PID 4124 wrote to memory of 3644 4124 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe 66 PID 4124 wrote to memory of 3644 4124 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe 66 PID 3644 wrote to memory of 2272 3644 tice7191.exe 67 PID 3644 wrote to memory of 2272 3644 tice7191.exe 67 PID 3644 wrote to memory of 2272 3644 tice7191.exe 67 PID 2272 wrote to memory of 4496 2272 tice8295.exe 68 PID 2272 wrote to memory of 4496 2272 tice8295.exe 68 PID 2272 wrote to memory of 4920 2272 tice8295.exe 69 PID 2272 wrote to memory of 4920 2272 tice8295.exe 69 PID 2272 wrote to memory of 4920 2272 tice8295.exe 69 PID 3644 wrote to memory of 1464 3644 tice7191.exe 70 PID 3644 wrote to memory of 1464 3644 tice7191.exe 70 PID 3644 wrote to memory of 1464 3644 tice7191.exe 70 PID 4124 wrote to memory of 3892 4124 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe 72 PID 4124 wrote to memory of 3892 4124 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe 72 PID 4124 wrote to memory of 3892 4124 6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe"C:\Users\Admin\AppData\Local\Temp\6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7191.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7191.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8295.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1705wg.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1705wg.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c61Wk27.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c61Wk27.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCElh21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCElh21.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83rR91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83rR91.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
642KB
MD5546c7cee9a0bd5a9423b99e0545007ce
SHA1f13e13989baa3e9d7b00660bc9d2fef80b0a6990
SHA25683cdcbbcc7c8df55c6a2dec28687697cb4864eb72ff0e4d51f59eb296e234fcb
SHA512a9635bcc580ace0cb6b297d7f8bc956f5bad8ef22380f849c515685d51d07bbd2d5f34abbd0ebf4a450847b23b18081247c1468e88c1ef92217e39034992654c
-
Filesize
642KB
MD5546c7cee9a0bd5a9423b99e0545007ce
SHA1f13e13989baa3e9d7b00660bc9d2fef80b0a6990
SHA25683cdcbbcc7c8df55c6a2dec28687697cb4864eb72ff0e4d51f59eb296e234fcb
SHA512a9635bcc580ace0cb6b297d7f8bc956f5bad8ef22380f849c515685d51d07bbd2d5f34abbd0ebf4a450847b23b18081247c1468e88c1ef92217e39034992654c
-
Filesize
295KB
MD58a9760b7c839de3a4e5662f7ec0f2870
SHA13dc501a9c99537dedc0ab0c14c163675930bd3dc
SHA2568c9a5d864fa60572ec7d27305006ead78a9d63c703aa218e4bd7468bd39c3169
SHA5120e07449e0dfe1c6f9ef1e5270bfd51c20cdd5ab1daab4830f4d85347fe4bd81a21fdfd70dcf53ce8cb711ab2c2a04c90db349b06aa0fae565900b9c6b4161880
-
Filesize
295KB
MD58a9760b7c839de3a4e5662f7ec0f2870
SHA13dc501a9c99537dedc0ab0c14c163675930bd3dc
SHA2568c9a5d864fa60572ec7d27305006ead78a9d63c703aa218e4bd7468bd39c3169
SHA5120e07449e0dfe1c6f9ef1e5270bfd51c20cdd5ab1daab4830f4d85347fe4bd81a21fdfd70dcf53ce8cb711ab2c2a04c90db349b06aa0fae565900b9c6b4161880
-
Filesize
322KB
MD5bc5fa60464149c1090e730378af88fdd
SHA168a1aec177a39c17315794aed957d3f195566ba1
SHA2568ced6c8895d59d8b12a881e947ff3531048ee59edc8a1cadb4ec6fcb3bf02929
SHA51252f8c43dab74fb82c59bd86a5a8b92f226a4ab030599013958cabc662de402f63a98da04744a30e84f2402fbfcf92107bd12ae444ce8c57cde397ad04b9812a7
-
Filesize
322KB
MD5bc5fa60464149c1090e730378af88fdd
SHA168a1aec177a39c17315794aed957d3f195566ba1
SHA2568ced6c8895d59d8b12a881e947ff3531048ee59edc8a1cadb4ec6fcb3bf02929
SHA51252f8c43dab74fb82c59bd86a5a8b92f226a4ab030599013958cabc662de402f63a98da04744a30e84f2402fbfcf92107bd12ae444ce8c57cde397ad04b9812a7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD56c09b39d2aff3537fc19d9ed304ebde2
SHA12741f213121fd72b7c75a5960c66ba84d92befaf
SHA25648813d108f8542ec58b0ee382a56fe975ebec180cfadb2333f3f53328f400d35
SHA512af4eb8e3dd6ee3dc8c0abdc7af997ad2d82d95af98e8319c0e9a560970a6c408a619846a0749751bca4ef4d5c831efa5f40333176122cf6415cd6fe68479fbea
-
Filesize
237KB
MD56c09b39d2aff3537fc19d9ed304ebde2
SHA12741f213121fd72b7c75a5960c66ba84d92befaf
SHA25648813d108f8542ec58b0ee382a56fe975ebec180cfadb2333f3f53328f400d35
SHA512af4eb8e3dd6ee3dc8c0abdc7af997ad2d82d95af98e8319c0e9a560970a6c408a619846a0749751bca4ef4d5c831efa5f40333176122cf6415cd6fe68479fbea