Analysis
-
max time kernel
84s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe
Resource
win10v2004-20230220-en
General
-
Target
4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe
-
Size
641KB
-
MD5
d6160908f24e2e986a056512dc59531a
-
SHA1
cba98920784f276390bcdf2873be8da6267423f9
-
SHA256
4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340
-
SHA512
c71219f03ffa25e78a8363a0c8d03dce8d06de6d75c11901951723f18d6fc1974f78dfcf096f0e8de88a88643aae30696a60e31c9e211cc83e6744ae8ff24b13
-
SSDEEP
12288:aMrty90OSV80A2Hiv8phep3eHlKHc0jn+F2BdcKY5nRfjyM1xWRB7ay4P:PyqV8QE+Y3slKHcKdcKYpNjyXadP
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6330PW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6330PW.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c51rk84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c51rk84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c51rk84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c51rk84.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6330PW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6330PW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6330PW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6330PW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c51rk84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c51rk84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4672-199-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-197-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-203-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-205-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-207-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-211-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-209-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-213-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-215-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-217-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-219-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-221-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-223-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-225-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-227-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-229-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-231-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4672-233-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 740 nice6880.exe 2268 b6330PW.exe 4308 c51rk84.exe 4672 drKeg51.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6330PW.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c51rk84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c51rk84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice6880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice6880.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4372 4308 WerFault.exe 93 2576 4672 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2268 b6330PW.exe 2268 b6330PW.exe 4308 c51rk84.exe 4308 c51rk84.exe 4672 drKeg51.exe 4672 drKeg51.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2268 b6330PW.exe Token: SeDebugPrivilege 4308 c51rk84.exe Token: SeDebugPrivilege 4672 drKeg51.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2024 wrote to memory of 740 2024 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe 86 PID 2024 wrote to memory of 740 2024 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe 86 PID 2024 wrote to memory of 740 2024 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe 86 PID 740 wrote to memory of 2268 740 nice6880.exe 87 PID 740 wrote to memory of 2268 740 nice6880.exe 87 PID 740 wrote to memory of 4308 740 nice6880.exe 93 PID 740 wrote to memory of 4308 740 nice6880.exe 93 PID 740 wrote to memory of 4308 740 nice6880.exe 93 PID 2024 wrote to memory of 4672 2024 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe 96 PID 2024 wrote to memory of 4672 2024 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe 96 PID 2024 wrote to memory of 4672 2024 4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe"C:\Users\Admin\AppData\Local\Temp\4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6880.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6880.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6330PW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6330PW.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51rk84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51rk84.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 10844⤵
- Program crash
PID:4372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drKeg51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drKeg51.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 15163⤵
- Program crash
PID:2576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4308 -ip 43081⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4672 -ip 46721⤵PID:3160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5cf3ee4546a323347008054f4b91f9438
SHA1a4bb8384973f2ad02d844bd27ab79414cc3fa17d
SHA256531fb4ac66006bf06661d3c8f409372b006fbdce3c0a95e85210ce822ed6c13e
SHA5121778e0b780f5665dd24082968ca0e70b598f4e5b6029ca8cd48f7623b3be42f5e60dba7a1faedef566f0cf283e440f62ec1f6410d3ef14bdde4615b96ae127cd
-
Filesize
294KB
MD5cf3ee4546a323347008054f4b91f9438
SHA1a4bb8384973f2ad02d844bd27ab79414cc3fa17d
SHA256531fb4ac66006bf06661d3c8f409372b006fbdce3c0a95e85210ce822ed6c13e
SHA5121778e0b780f5665dd24082968ca0e70b598f4e5b6029ca8cd48f7623b3be42f5e60dba7a1faedef566f0cf283e440f62ec1f6410d3ef14bdde4615b96ae127cd
-
Filesize
321KB
MD596829d0b4e4ee169d8de82f9bf05fde7
SHA1371841be4cd51844812c50b16a72d0879e682f8c
SHA2563e26c0b1696584bfb67655e44d5d1587d330516c20802cbd02fb55f2d6b9b177
SHA5122410a5a1b0c94b9a516562b362dc33d38e2973bbb6a7cd9825996765989c3b7c0cf67d1a70a93409cf556070ffcfa12ba3260c172a97c9f62beda3c05de93415
-
Filesize
321KB
MD596829d0b4e4ee169d8de82f9bf05fde7
SHA1371841be4cd51844812c50b16a72d0879e682f8c
SHA2563e26c0b1696584bfb67655e44d5d1587d330516c20802cbd02fb55f2d6b9b177
SHA5122410a5a1b0c94b9a516562b362dc33d38e2973bbb6a7cd9825996765989c3b7c0cf67d1a70a93409cf556070ffcfa12ba3260c172a97c9f62beda3c05de93415
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD5d9622cefc0c6a001f5f9d95fb4f2e834
SHA1a62da56b085abf7c1dabbbc86bd2b58de7ec4784
SHA2568afbefcdf1c5cd694eb82d78e0d20e6b41c3d00ec587eae4cae5c7082c8aae48
SHA512c57762b3fb94b9067a3ed23f6718eab43d3406b2af586f4a7ca479979ba762fed7618135f09d7b42d40876d920aec79ee14eb29f6fd41ba3aa4f2dbb4d29042c
-
Filesize
237KB
MD5d9622cefc0c6a001f5f9d95fb4f2e834
SHA1a62da56b085abf7c1dabbbc86bd2b58de7ec4784
SHA2568afbefcdf1c5cd694eb82d78e0d20e6b41c3d00ec587eae4cae5c7082c8aae48
SHA512c57762b3fb94b9067a3ed23f6718eab43d3406b2af586f4a7ca479979ba762fed7618135f09d7b42d40876d920aec79ee14eb29f6fd41ba3aa4f2dbb4d29042c