Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-03-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe
Resource
win10-20230220-en
General
-
Target
c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe
-
Size
641KB
-
MD5
8682e89a0dfd61380fa2d9fa94fef61f
-
SHA1
b0e0ea74189e4ae1362403c5c8c7afc8c083c9cd
-
SHA256
c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023
-
SHA512
6cecbb48ff2279cbc63748c393974c44ca827f4d7cf136b0b86c3b0f15704073b46a45611b0986b04bfabc0f31025c7c2fc35b62eea94f217ebd41766193a065
-
SSDEEP
12288:IMrBy90ER1+7DfuqVaAEgU8jQjnWBg/KY5nRvjy1WUPdk:Zy5quUE7KYnEg/KYpNjy1WUVk
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1241YD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1241YD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c06qz67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c06qz67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c06qz67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1241YD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1241YD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1241YD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c06qz67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c06qz67.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4880-181-0x0000000002570000-0x00000000025B6000-memory.dmp family_redline behavioral1/memory/4880-182-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/4880-183-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-184-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-186-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-188-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-190-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-192-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-194-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-196-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-198-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-200-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-202-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-204-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-206-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-208-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-210-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-212-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-214-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-216-0x0000000004AA0000-0x0000000004ADE000-memory.dmp family_redline behavioral1/memory/4880-1102-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline behavioral1/memory/4880-1103-0x0000000004B60000-0x0000000004B70000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 392 nice9357.exe 4528 b1241YD.exe 5060 c06qz67.exe 4880 dqVUG47.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1241YD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c06qz67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c06qz67.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice9357.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice9357.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4528 b1241YD.exe 4528 b1241YD.exe 5060 c06qz67.exe 5060 c06qz67.exe 4880 dqVUG47.exe 4880 dqVUG47.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4528 b1241YD.exe Token: SeDebugPrivilege 5060 c06qz67.exe Token: SeDebugPrivilege 4880 dqVUG47.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3520 wrote to memory of 392 3520 c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe 66 PID 3520 wrote to memory of 392 3520 c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe 66 PID 3520 wrote to memory of 392 3520 c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe 66 PID 392 wrote to memory of 4528 392 nice9357.exe 67 PID 392 wrote to memory of 4528 392 nice9357.exe 67 PID 392 wrote to memory of 5060 392 nice9357.exe 68 PID 392 wrote to memory of 5060 392 nice9357.exe 68 PID 392 wrote to memory of 5060 392 nice9357.exe 68 PID 3520 wrote to memory of 4880 3520 c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe 69 PID 3520 wrote to memory of 4880 3520 c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe 69 PID 3520 wrote to memory of 4880 3520 c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe"C:\Users\Admin\AppData\Local\Temp\c6262420464058cb0ee82a667ca8ac5d9c6a696d49f6adf943752defd6ffe023.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9357.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1241YD.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1241YD.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c06qz67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c06qz67.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dqVUG47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dqVUG47.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5a02dc6d2ee2d4bf96967444441844905
SHA114d75f9949a4cfec6ee4130eaee1a2587a893ad2
SHA2566fd66a2a82762701917cf7fd9cc0da7bc70a49b7ff0bc73e6cfcffe4d109fc5d
SHA512ced6ab5d296678887b412581329891b3087b2cbc3cd7e27356a9f1845e560fd13de5875b0e1436a9f175daf4583bef1417c5faeade33213814730fa51db78824
-
Filesize
294KB
MD5a02dc6d2ee2d4bf96967444441844905
SHA114d75f9949a4cfec6ee4130eaee1a2587a893ad2
SHA2566fd66a2a82762701917cf7fd9cc0da7bc70a49b7ff0bc73e6cfcffe4d109fc5d
SHA512ced6ab5d296678887b412581329891b3087b2cbc3cd7e27356a9f1845e560fd13de5875b0e1436a9f175daf4583bef1417c5faeade33213814730fa51db78824
-
Filesize
321KB
MD5a7125e6f12689077c3f53abe13b85ce6
SHA1c0fc532cd18f346e6699e9b7703e7df0ac881363
SHA256d81bbf5f627aaa3c507e9a6e86d477d4670baae6624eb86522efca1b5e113e9f
SHA512ad7bf86d7362d2c3adcf71924b6ffebab464f737335c5d40fd6892072660add7b545a9b2a0b4652825e5b4362e37b29478edf48131948458b385fee4a13d2502
-
Filesize
321KB
MD5a7125e6f12689077c3f53abe13b85ce6
SHA1c0fc532cd18f346e6699e9b7703e7df0ac881363
SHA256d81bbf5f627aaa3c507e9a6e86d477d4670baae6624eb86522efca1b5e113e9f
SHA512ad7bf86d7362d2c3adcf71924b6ffebab464f737335c5d40fd6892072660add7b545a9b2a0b4652825e5b4362e37b29478edf48131948458b385fee4a13d2502
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
237KB
MD53046f9f1a5a1a081022f2b90ac03b324
SHA1ef8fe914f39e4478a05a599bee2c96bb13622095
SHA256ad45579248f2993cb138f5bd9617d80232268c2acafb8b950f72df15ea7bb704
SHA5125d659ac5d4d255b3138b410ef936e31b12703d1ce70d7c7be0f3e80803ab7029be64087b6baf4ddbe0e1388b5240aff880e917acbeb831bd8bb63864ecdbc086
-
Filesize
237KB
MD53046f9f1a5a1a081022f2b90ac03b324
SHA1ef8fe914f39e4478a05a599bee2c96bb13622095
SHA256ad45579248f2993cb138f5bd9617d80232268c2acafb8b950f72df15ea7bb704
SHA5125d659ac5d4d255b3138b410ef936e31b12703d1ce70d7c7be0f3e80803ab7029be64087b6baf4ddbe0e1388b5240aff880e917acbeb831bd8bb63864ecdbc086