Analysis
-
max time kernel
109s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe
Resource
win10v2004-20230221-en
General
-
Target
c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe
-
Size
789KB
-
MD5
49a22e6e59a1863974b55af33c50c718
-
SHA1
0e7b67425689d53ea68fdcb6e29d7ac2febc84e0
-
SHA256
c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae
-
SHA512
ad741eb36f5beda39a925a5e3fd9a0c69a139d79d329d929f6a530a881867363762c1561c33b9679d3290b87f803fb36db819dd56867c1926fd50003201d10f8
-
SSDEEP
12288:2Mr+y90CuCE1EVsX0QPQQl48n4Qm0hfu2LrmFnRMj8EvlGkAGGK7y:wy6EVMfQQsUXrmFn8GkAJKO
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c46wX49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2429BC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2429BC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2429BC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2429BC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c46wX49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c46wX49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c46wX49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2429BC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2429BC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c46wX49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c46wX49.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4540-202-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-203-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-205-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-207-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-209-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-211-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-213-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-215-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-217-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-219-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-221-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-223-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-225-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-227-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-229-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-231-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-233-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-235-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4540-412-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline behavioral1/memory/4540-413-0x0000000004BE0000-0x0000000004BF0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1412 tice7155.exe 4952 tice5881.exe 3396 b2429BC.exe 4796 c46wX49.exe 4540 dBiQo17.exe 4612 e75wK87.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2429BC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c46wX49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c46wX49.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice7155.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice5881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice5881.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice7155.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1304 4796 WerFault.exe 91 3344 4540 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3396 b2429BC.exe 3396 b2429BC.exe 4796 c46wX49.exe 4796 c46wX49.exe 4540 dBiQo17.exe 4540 dBiQo17.exe 4612 e75wK87.exe 4612 e75wK87.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3396 b2429BC.exe Token: SeDebugPrivilege 4796 c46wX49.exe Token: SeDebugPrivilege 4540 dBiQo17.exe Token: SeDebugPrivilege 4612 e75wK87.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1412 2124 c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe 86 PID 2124 wrote to memory of 1412 2124 c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe 86 PID 2124 wrote to memory of 1412 2124 c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe 86 PID 1412 wrote to memory of 4952 1412 tice7155.exe 87 PID 1412 wrote to memory of 4952 1412 tice7155.exe 87 PID 1412 wrote to memory of 4952 1412 tice7155.exe 87 PID 4952 wrote to memory of 3396 4952 tice5881.exe 88 PID 4952 wrote to memory of 3396 4952 tice5881.exe 88 PID 4952 wrote to memory of 4796 4952 tice5881.exe 91 PID 4952 wrote to memory of 4796 4952 tice5881.exe 91 PID 4952 wrote to memory of 4796 4952 tice5881.exe 91 PID 1412 wrote to memory of 4540 1412 tice7155.exe 94 PID 1412 wrote to memory of 4540 1412 tice7155.exe 94 PID 1412 wrote to memory of 4540 1412 tice7155.exe 94 PID 2124 wrote to memory of 4612 2124 c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe 101 PID 2124 wrote to memory of 4612 2124 c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe 101 PID 2124 wrote to memory of 4612 2124 c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe"C:\Users\Admin\AppData\Local\Temp\c7338141c84b8241ed1a5191c69906088568cb2ebf7809ff761097f4f4a8c6ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7155.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7155.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5881.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5881.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2429BC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2429BC.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c46wX49.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c46wX49.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 10805⤵
- Program crash
PID:1304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dBiQo17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dBiQo17.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 12284⤵
- Program crash
PID:3344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e75wK87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e75wK87.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4796 -ip 47961⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4540 -ip 45401⤵PID:3764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
644KB
MD59a62edecb9f987371801b5c426348e6d
SHA13975d985c7c8fbc8b69c1cdaa40e6b1f15e4c371
SHA2567b6a4c15bebea5091e523170c71d9171c4e2e7537b464509e487705f0cbd25ee
SHA5124caa9f3a30d06ca50c9637a01213325d5840bce94a58f444f7d4988777da45de38244cf46da31af612579a6e839d1bc7031fb53245cbedff48e74a9612901aa7
-
Filesize
644KB
MD59a62edecb9f987371801b5c426348e6d
SHA13975d985c7c8fbc8b69c1cdaa40e6b1f15e4c371
SHA2567b6a4c15bebea5091e523170c71d9171c4e2e7537b464509e487705f0cbd25ee
SHA5124caa9f3a30d06ca50c9637a01213325d5840bce94a58f444f7d4988777da45de38244cf46da31af612579a6e839d1bc7031fb53245cbedff48e74a9612901aa7
-
Filesize
296KB
MD572db4a86a32f97614ad1f120eb024e7c
SHA1175d266ac8dcb059c6e9d569cf32a8a3b6e159c7
SHA25675ede9aabd39ad0035008f2b8d3c364bd0b2e8e598c6389d693c49b8b85b1c42
SHA51239d8d6e3eb7eca078404a38ecd6d641e398cacd2f86f4d279158a7d1e1899cc1c671e88eb2da7f5a97417747c4c95cd7a61cf6224ea1695905a5d82186c3f447
-
Filesize
296KB
MD572db4a86a32f97614ad1f120eb024e7c
SHA1175d266ac8dcb059c6e9d569cf32a8a3b6e159c7
SHA25675ede9aabd39ad0035008f2b8d3c364bd0b2e8e598c6389d693c49b8b85b1c42
SHA51239d8d6e3eb7eca078404a38ecd6d641e398cacd2f86f4d279158a7d1e1899cc1c671e88eb2da7f5a97417747c4c95cd7a61cf6224ea1695905a5d82186c3f447
-
Filesize
322KB
MD5138cd27dcbd60c1f39dabab5e5a2cc1d
SHA131ad3f44b848a8287e335bf7f35557dd4a7889a0
SHA25608770ce931bb4b5559c6b498b95663aab4ed4a1e8e92880e1cbd666cc75e5312
SHA512328dcd0615ed504e647e6e9a8613799a761aef8246fefa50971e7b4736a449b2f9fdb7eb4f665885d784fb72dec1c9c724dece59e0bd38d18485d78446bb96bb
-
Filesize
322KB
MD5138cd27dcbd60c1f39dabab5e5a2cc1d
SHA131ad3f44b848a8287e335bf7f35557dd4a7889a0
SHA25608770ce931bb4b5559c6b498b95663aab4ed4a1e8e92880e1cbd666cc75e5312
SHA512328dcd0615ed504e647e6e9a8613799a761aef8246fefa50971e7b4736a449b2f9fdb7eb4f665885d784fb72dec1c9c724dece59e0bd38d18485d78446bb96bb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD542a0292e0f3469a181aa6357c5ae7682
SHA10f794cb9eb3c172d2df23b6681eb5cf3717646a7
SHA25690643b67e0d431825ffdcc77d01daa24de58d0a00a3079116b8e98fe18e3aafe
SHA512ba6861c0f472e7bec136579cc681b596f66803063bf63e22b63b0517f4d1d7bdc8f6911f5b5753f88b8015a10b797cef03c0332b952aba2f3050bf6287245e56
-
Filesize
239KB
MD542a0292e0f3469a181aa6357c5ae7682
SHA10f794cb9eb3c172d2df23b6681eb5cf3717646a7
SHA25690643b67e0d431825ffdcc77d01daa24de58d0a00a3079116b8e98fe18e3aafe
SHA512ba6861c0f472e7bec136579cc681b596f66803063bf63e22b63b0517f4d1d7bdc8f6911f5b5753f88b8015a10b797cef03c0332b952aba2f3050bf6287245e56