Analysis
-
max time kernel
76s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe
Resource
win10v2004-20230220-en
General
-
Target
9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe
-
Size
647KB
-
MD5
f8705885b191e7a5b63c98f759fc196f
-
SHA1
4a87ee51935ea7c13df2e8168313b4561429b18d
-
SHA256
9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010
-
SHA512
9a94e1f91891f4606dd8074eaefb211853e8e2be751f65c0273a7978832f6683a4f00114418af8995cc4c01cef579dddf2dbead4be4bb0ab55da5a4c4302eda7
-
SSDEEP
12288:qMrwy90iV6nQqgx+G8SKN9pQ/dXcHE/FxgApgwUwchmZ6gKwqIRg:qyHV6Qj8NN6/sApgBHhmZ6gK1N
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3899VY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3899VY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3899VY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3899VY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c42CV15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c42CV15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c42CV15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3899VY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3899VY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c42CV15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c42CV15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c42CV15.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2440-196-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-200-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-197-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-202-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-204-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-206-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-208-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-210-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-212-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-214-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-216-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-218-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-220-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-222-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-224-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-226-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-228-0x0000000002530000-0x000000000256E000-memory.dmp family_redline behavioral1/memory/2440-230-0x0000000002530000-0x000000000256E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1756 nice4942.exe 3760 b3899VY.exe 1836 c42CV15.exe 2440 drlic27.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c42CV15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3899VY.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c42CV15.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice4942.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice4942.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3468 1836 WerFault.exe 96 1248 2440 WerFault.exe 103 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3760 b3899VY.exe 3760 b3899VY.exe 1836 c42CV15.exe 1836 c42CV15.exe 2440 drlic27.exe 2440 drlic27.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3760 b3899VY.exe Token: SeDebugPrivilege 1836 c42CV15.exe Token: SeDebugPrivilege 2440 drlic27.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1756 2024 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe 85 PID 2024 wrote to memory of 1756 2024 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe 85 PID 2024 wrote to memory of 1756 2024 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe 85 PID 1756 wrote to memory of 3760 1756 nice4942.exe 86 PID 1756 wrote to memory of 3760 1756 nice4942.exe 86 PID 1756 wrote to memory of 1836 1756 nice4942.exe 96 PID 1756 wrote to memory of 1836 1756 nice4942.exe 96 PID 1756 wrote to memory of 1836 1756 nice4942.exe 96 PID 2024 wrote to memory of 2440 2024 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe 103 PID 2024 wrote to memory of 2440 2024 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe 103 PID 2024 wrote to memory of 2440 2024 9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe"C:\Users\Admin\AppData\Local\Temp\9bdc25aa52b772392d96ea9402482a5f2e846e4adc7e15cbf341b2e7072f5010.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice4942.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice4942.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3899VY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3899VY.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c42CV15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c42CV15.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 10804⤵
- Program crash
PID:3468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drlic27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drlic27.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 13483⤵
- Program crash
PID:1248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1836 -ip 18361⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2440 -ip 24401⤵PID:4388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD58c53c5efa6a7c2fe75dfa66351266abe
SHA18869004fc2117b864c784e5fc1d7e3eaaadd0c77
SHA256b572e15e0ce5ef20c6e31ea00ad49358e6aa78de27709a5a6ef407ee57dbef84
SHA5126203ba81cb1f8f5a83702390279638e7e82d498d1c8f619c7dc1490e9a06a10dcfa8e157c95311afed770f85a01e2f0edecebcc753aa8d970ae870210a1d714a
-
Filesize
305KB
MD58c53c5efa6a7c2fe75dfa66351266abe
SHA18869004fc2117b864c784e5fc1d7e3eaaadd0c77
SHA256b572e15e0ce5ef20c6e31ea00ad49358e6aa78de27709a5a6ef407ee57dbef84
SHA5126203ba81cb1f8f5a83702390279638e7e82d498d1c8f619c7dc1490e9a06a10dcfa8e157c95311afed770f85a01e2f0edecebcc753aa8d970ae870210a1d714a
-
Filesize
324KB
MD571573c4585e5287fdccd655d59598fe0
SHA1e9f43cb2462cc186cc19074fc1cc8831a57afd27
SHA25618e49bf346973de33eda9da67e557294e19526a4dd74ceb591da61401b60fbe2
SHA512a231ef0ffab020b39f53c9268aeb5f35868a0d38c9f607996479a86e76c3acbdcc640c2fd2aa288f18e63998d25e8a70249c5ba2cbd2f25b401ad7c563f2a789
-
Filesize
324KB
MD571573c4585e5287fdccd655d59598fe0
SHA1e9f43cb2462cc186cc19074fc1cc8831a57afd27
SHA25618e49bf346973de33eda9da67e557294e19526a4dd74ceb591da61401b60fbe2
SHA512a231ef0ffab020b39f53c9268aeb5f35868a0d38c9f607996479a86e76c3acbdcc640c2fd2aa288f18e63998d25e8a70249c5ba2cbd2f25b401ad7c563f2a789
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
247KB
MD591c8fa1425e65cf7ebaaace2c58e4a75
SHA1b50a10a885bb51b7b7604bc6964169c9773753eb
SHA256d20fe9afd6356e1815d357c92b1acba2d722e0ba0f335261d494dac324ff960e
SHA51282a501eb01299fd6df4cfc5f0ad3df8ecbf31320bc7fd75834e3ffaae2b9ed2e6154b868708ca3fdeca2ef63c14cbd14b1930e71e9d1c4f8eb81739d0ddf1911
-
Filesize
247KB
MD591c8fa1425e65cf7ebaaace2c58e4a75
SHA1b50a10a885bb51b7b7604bc6964169c9773753eb
SHA256d20fe9afd6356e1815d357c92b1acba2d722e0ba0f335261d494dac324ff960e
SHA51282a501eb01299fd6df4cfc5f0ad3df8ecbf31320bc7fd75834e3ffaae2b9ed2e6154b868708ca3fdeca2ef63c14cbd14b1930e71e9d1c4f8eb81739d0ddf1911