Analysis
-
max time kernel
76s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe
Resource
win10v2004-20230220-en
General
-
Target
63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe
-
Size
647KB
-
MD5
4141bfebfc950732ca2d37d6e9c8225a
-
SHA1
683887c9f4522be1325187aab608c54ab7fd97d5
-
SHA256
63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c
-
SHA512
5c4aea38af8f0d7ae9fa20189bcd5f52a97d9502c1f72b2ec9803ebddbd468356e5490dbe41fe47339e7e8823a98880639b31c312770fdfd8db95b8baf5d098e
-
SSDEEP
12288:WMrCy903uUJ6kNnf/ccEykzS4DNWRq/JiZOJwqbwZosqSn:ky8lJRBW5moWRqdJ1u
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c33Zq04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c33Zq04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c33Zq04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c33Zq04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5830Yh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5830Yh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5830Yh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5830Yh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5830Yh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5830Yh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c33Zq04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c33Zq04.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4080-196-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-197-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-199-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-201-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-203-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-205-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-207-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-209-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-211-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-213-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-217-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-223-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-225-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-227-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-221-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-229-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-231-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4080-233-0x0000000002620000-0x000000000265E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1216 nice6045.exe 1304 b5830Yh.exe 3092 c33Zq04.exe 4080 dZSBE79.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c33Zq04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5830Yh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c33Zq04.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice6045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice6045.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3796 3092 WerFault.exe 93 3796 4080 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1304 b5830Yh.exe 1304 b5830Yh.exe 3092 c33Zq04.exe 3092 c33Zq04.exe 4080 dZSBE79.exe 4080 dZSBE79.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1304 b5830Yh.exe Token: SeDebugPrivilege 3092 c33Zq04.exe Token: SeDebugPrivilege 4080 dZSBE79.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1216 1952 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe 87 PID 1952 wrote to memory of 1216 1952 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe 87 PID 1952 wrote to memory of 1216 1952 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe 87 PID 1216 wrote to memory of 1304 1216 nice6045.exe 88 PID 1216 wrote to memory of 1304 1216 nice6045.exe 88 PID 1216 wrote to memory of 3092 1216 nice6045.exe 93 PID 1216 wrote to memory of 3092 1216 nice6045.exe 93 PID 1216 wrote to memory of 3092 1216 nice6045.exe 93 PID 1952 wrote to memory of 4080 1952 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe 99 PID 1952 wrote to memory of 4080 1952 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe 99 PID 1952 wrote to memory of 4080 1952 63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe"C:\Users\Admin\AppData\Local\Temp\63562e10c0a5f879fe790a598bb14babd263f1671200b00a2010d4489aa7670c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6045.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5830Yh.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5830Yh.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c33Zq04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c33Zq04.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 10164⤵
- Program crash
PID:3796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dZSBE79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dZSBE79.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 13523⤵
- Program crash
PID:3796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3092 -ip 30921⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4080 -ip 40801⤵PID:4316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD580dc0283a0c657cc373080de3b5834f2
SHA1ac5c53d68d21b41e8128c127b5a384992346ebfe
SHA256fc9709a7b2e68f0adbb4cbb689596938b4fc19b282d036e68b156f013436bec7
SHA512a77aad8b73cd1417833c311e4e75f6e0241d6fc570de51acb185bb7d71e61b0d14fc170892ee798f455a8b49fdec55c8964d6a4a0e5433fee9bb8ff24ca3c74c
-
Filesize
305KB
MD580dc0283a0c657cc373080de3b5834f2
SHA1ac5c53d68d21b41e8128c127b5a384992346ebfe
SHA256fc9709a7b2e68f0adbb4cbb689596938b4fc19b282d036e68b156f013436bec7
SHA512a77aad8b73cd1417833c311e4e75f6e0241d6fc570de51acb185bb7d71e61b0d14fc170892ee798f455a8b49fdec55c8964d6a4a0e5433fee9bb8ff24ca3c74c
-
Filesize
324KB
MD59d0ded26d17b7a8988c562e17d02bd7f
SHA1164e2507db54f195c402e1cc75f4d930905d6d97
SHA25607f455c4d3cd4fccf55cdfd674f2f833f513ba61ba7189f2b41c1f9e63808921
SHA5121ffea5fffed9253c4a8dcec1f5a30aa879598f89d179b31a86c581f5a1073a10be258a307c456f71a8252ec454537b88058f4df28a37e531330d0d7b808a7e0c
-
Filesize
324KB
MD59d0ded26d17b7a8988c562e17d02bd7f
SHA1164e2507db54f195c402e1cc75f4d930905d6d97
SHA25607f455c4d3cd4fccf55cdfd674f2f833f513ba61ba7189f2b41c1f9e63808921
SHA5121ffea5fffed9253c4a8dcec1f5a30aa879598f89d179b31a86c581f5a1073a10be258a307c456f71a8252ec454537b88058f4df28a37e531330d0d7b808a7e0c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
247KB
MD52d48647b384d6fb53740d09b7df6e49e
SHA160fa247c2847f97a1b052b007571b9ac0ede4102
SHA256fabdd225251dae4d306e29564110a4f28cf23743a815f9f374af2e4c11145041
SHA512cb48e25b2313bd77792f397de5b548db68e07a08ac7a2515a18c59e25a16bfcc567c18e32fb4e1382a53e474aa1a61b382684e0e08bc70793699e347dfaba717
-
Filesize
247KB
MD52d48647b384d6fb53740d09b7df6e49e
SHA160fa247c2847f97a1b052b007571b9ac0ede4102
SHA256fabdd225251dae4d306e29564110a4f28cf23743a815f9f374af2e4c11145041
SHA512cb48e25b2313bd77792f397de5b548db68e07a08ac7a2515a18c59e25a16bfcc567c18e32fb4e1382a53e474aa1a61b382684e0e08bc70793699e347dfaba717