Analysis
-
max time kernel
86s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe
Resource
win10v2004-20230220-en
General
-
Target
63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe
-
Size
790KB
-
MD5
1fd4c4f684e43623ec4c29e14875da06
-
SHA1
8a476c62592c712abe83b8ce9210a2ee2b265d24
-
SHA256
63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8
-
SHA512
750519a05e6d221c8bbdd1ed23c3be8a3a1242db31c12aa5ba884594508585cf9c2d3ef6b82fd4bdfe8b75e314acc3278bd2bbdc511a3284a0ca80bfd1b6140b
-
SSDEEP
24576:EyctdbpR4HqiOKKCpW9hZAnfBiniCy9qSAAV+2mjCpNvvE:TcttpBiXK/vefB4i3AAV+2ECH
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5611LO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5611LO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5611LO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c43Qj86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c43Qj86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c43Qj86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5611LO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5611LO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5611LO.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c43Qj86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c43Qj86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c43Qj86.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4616-203-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-204-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-206-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-208-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-210-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-212-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-214-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-216-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-218-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-220-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-222-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-224-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-228-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-226-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-230-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-232-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-234-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-236-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4616-291-0x0000000004BA0000-0x0000000004BB0000-memory.dmp family_redline behavioral1/memory/4616-1125-0x0000000004BA0000-0x0000000004BB0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3236 tice0676.exe 2336 tice9495.exe 4356 b5611LO.exe 4156 c43Qj86.exe 4616 dMqrk15.exe 4960 e29VF25.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5611LO.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c43Qj86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c43Qj86.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice0676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice0676.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice9495.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3860 4156 WerFault.exe 93 2116 4616 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 b5611LO.exe 4356 b5611LO.exe 4156 c43Qj86.exe 4156 c43Qj86.exe 4616 dMqrk15.exe 4616 dMqrk15.exe 4960 e29VF25.exe 4960 e29VF25.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4356 b5611LO.exe Token: SeDebugPrivilege 4156 c43Qj86.exe Token: SeDebugPrivilege 4616 dMqrk15.exe Token: SeDebugPrivilege 4960 e29VF25.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3448 wrote to memory of 3236 3448 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe 86 PID 3448 wrote to memory of 3236 3448 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe 86 PID 3448 wrote to memory of 3236 3448 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe 86 PID 3236 wrote to memory of 2336 3236 tice0676.exe 87 PID 3236 wrote to memory of 2336 3236 tice0676.exe 87 PID 3236 wrote to memory of 2336 3236 tice0676.exe 87 PID 2336 wrote to memory of 4356 2336 tice9495.exe 88 PID 2336 wrote to memory of 4356 2336 tice9495.exe 88 PID 2336 wrote to memory of 4156 2336 tice9495.exe 93 PID 2336 wrote to memory of 4156 2336 tice9495.exe 93 PID 2336 wrote to memory of 4156 2336 tice9495.exe 93 PID 3236 wrote to memory of 4616 3236 tice0676.exe 99 PID 3236 wrote to memory of 4616 3236 tice0676.exe 99 PID 3236 wrote to memory of 4616 3236 tice0676.exe 99 PID 3448 wrote to memory of 4960 3448 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe 104 PID 3448 wrote to memory of 4960 3448 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe 104 PID 3448 wrote to memory of 4960 3448 63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe"C:\Users\Admin\AppData\Local\Temp\63e2f6478167a9755b338a62f72e8865e9b613eb0504accc5f08fbb8d80b38e8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice9495.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5611LO.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5611LO.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c43Qj86.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c43Qj86.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 11045⤵
- Program crash
PID:3860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMqrk15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMqrk15.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 13404⤵
- Program crash
PID:2116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e29VF25.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e29VF25.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4156 -ip 41561⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4616 -ip 46161⤵PID:2436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
645KB
MD55f2bb67e61eb6b8d73f5fbd85f7043a7
SHA1d3f96fad369a545bf2ee8a8ff54413ca920866d1
SHA2568578ce4291349184e6634c38d402d8dace1b259467e532cd4d81d3b429654cba
SHA5124b538d9fef8e22b52359bc93e7056a1fa917f000d514dd37b1d49b49ab8ed0ffb691a79dc9a6651aef7b8cd93ce5f0c6ed16f05d088ccd0195e3ae8a5b973d57
-
Filesize
645KB
MD55f2bb67e61eb6b8d73f5fbd85f7043a7
SHA1d3f96fad369a545bf2ee8a8ff54413ca920866d1
SHA2568578ce4291349184e6634c38d402d8dace1b259467e532cd4d81d3b429654cba
SHA5124b538d9fef8e22b52359bc93e7056a1fa917f000d514dd37b1d49b49ab8ed0ffb691a79dc9a6651aef7b8cd93ce5f0c6ed16f05d088ccd0195e3ae8a5b973d57
-
Filesize
296KB
MD57bb6aa50e5a9797b4849ef0c03a8797e
SHA18130923aff7f3268fa528f97549d880a861b9799
SHA256d109a1a32abb0b7dcd67a6d28e9a7960817a810c2b714146fc75913c24464f49
SHA51280a150266957d86874e9c8318f12bfb91cc0e9e48244cf1711a6bd4239495172dc554b8bd18c826bbf29c62943516952c72a7c44792d85994627eb724a53381b
-
Filesize
296KB
MD57bb6aa50e5a9797b4849ef0c03a8797e
SHA18130923aff7f3268fa528f97549d880a861b9799
SHA256d109a1a32abb0b7dcd67a6d28e9a7960817a810c2b714146fc75913c24464f49
SHA51280a150266957d86874e9c8318f12bfb91cc0e9e48244cf1711a6bd4239495172dc554b8bd18c826bbf29c62943516952c72a7c44792d85994627eb724a53381b
-
Filesize
323KB
MD57f437599cb300dea001ea4c57a9ef099
SHA13f16fbde23f728f513a32178eebfffbdeff45d00
SHA2569095d59b87c93745d4c5596a715e7389e0bd8e30e38366dde633e44e5c6c7599
SHA51216a3210ca7a257b61e36d183b3550480e49bcbe7359ba04108cf3d55eb4ebb6991f56095ee79bd48a843d11b06f7df37a15f228338431fcfc96ca38b72cbff3d
-
Filesize
323KB
MD57f437599cb300dea001ea4c57a9ef099
SHA13f16fbde23f728f513a32178eebfffbdeff45d00
SHA2569095d59b87c93745d4c5596a715e7389e0bd8e30e38366dde633e44e5c6c7599
SHA51216a3210ca7a257b61e36d183b3550480e49bcbe7359ba04108cf3d55eb4ebb6991f56095ee79bd48a843d11b06f7df37a15f228338431fcfc96ca38b72cbff3d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD59490cb0e36eaa893742b5c1241391b44
SHA13b20661727f415442b56c5881868ac59c1355dca
SHA25699665264b0f6ac93e02e837e4092ea4a54e93eef2c554a049f37d21bd2dac3d2
SHA51286b9a228730b4c8d4cd86aa033382d3ee37d6d3e3bd6bbc2329d15829ce19ddf921caab746f99af9028f375cbc819ec3ee3022e678111e0ab9a74d3fb9c6a668
-
Filesize
239KB
MD59490cb0e36eaa893742b5c1241391b44
SHA13b20661727f415442b56c5881868ac59c1355dca
SHA25699665264b0f6ac93e02e837e4092ea4a54e93eef2c554a049f37d21bd2dac3d2
SHA51286b9a228730b4c8d4cd86aa033382d3ee37d6d3e3bd6bbc2329d15829ce19ddf921caab746f99af9028f375cbc819ec3ee3022e678111e0ab9a74d3fb9c6a668