Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2023 04:25
Static task
static1
Behavioral task
behavioral1
Sample
a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe
Resource
win10-20230220-en
General
-
Target
a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe
-
Size
790KB
-
MD5
6f7422827e5dad6031a57881f4b66807
-
SHA1
808afe3006c432444731191511efb7e727f1adcd
-
SHA256
a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb
-
SHA512
93fcd9126ba63fd8a208a9e5bb81a6c28074bf060c43eb6ea97302fc6953f20049a2a00bb2f5857f954fb462ebfa0d05078fe01219a294dabe985b37c65b0d4e
-
SSDEEP
24576:7ypGdZtAISONA04CYn77YXCwwpBZ4gR5W:uskISONRYnnw0
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c36FZ01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c36FZ01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7219UL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7219UL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c36FZ01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c36FZ01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7219UL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7219UL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7219UL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c36FZ01.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2472-191-0x00000000049F0000-0x0000000004A36000-memory.dmp family_redline behavioral1/memory/2472-192-0x0000000004A70000-0x0000000004AB4000-memory.dmp family_redline behavioral1/memory/2472-193-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-194-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-196-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-198-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-200-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-204-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-206-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-208-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-202-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-210-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-212-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-214-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-216-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-218-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-220-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-222-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-224-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2472-226-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2372 tice8785.exe 2540 tice6418.exe 2828 b7219UL.exe 4868 c36FZ01.exe 2472 dRsle30.exe 4300 e12YK83.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7219UL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c36FZ01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c36FZ01.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice8785.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice6418.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice6418.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2828 b7219UL.exe 2828 b7219UL.exe 4868 c36FZ01.exe 4868 c36FZ01.exe 2472 dRsle30.exe 2472 dRsle30.exe 4300 e12YK83.exe 4300 e12YK83.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2828 b7219UL.exe Token: SeDebugPrivilege 4868 c36FZ01.exe Token: SeDebugPrivilege 2472 dRsle30.exe Token: SeDebugPrivilege 4300 e12YK83.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2372 2140 a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe 66 PID 2140 wrote to memory of 2372 2140 a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe 66 PID 2140 wrote to memory of 2372 2140 a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe 66 PID 2372 wrote to memory of 2540 2372 tice8785.exe 67 PID 2372 wrote to memory of 2540 2372 tice8785.exe 67 PID 2372 wrote to memory of 2540 2372 tice8785.exe 67 PID 2540 wrote to memory of 2828 2540 tice6418.exe 68 PID 2540 wrote to memory of 2828 2540 tice6418.exe 68 PID 2540 wrote to memory of 4868 2540 tice6418.exe 69 PID 2540 wrote to memory of 4868 2540 tice6418.exe 69 PID 2540 wrote to memory of 4868 2540 tice6418.exe 69 PID 2372 wrote to memory of 2472 2372 tice8785.exe 70 PID 2372 wrote to memory of 2472 2372 tice8785.exe 70 PID 2372 wrote to memory of 2472 2372 tice8785.exe 70 PID 2140 wrote to memory of 4300 2140 a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe 72 PID 2140 wrote to memory of 4300 2140 a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe 72 PID 2140 wrote to memory of 4300 2140 a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe"C:\Users\Admin\AppData\Local\Temp\a427caf1e2802878cdc41894f8202873b85fa9e1edaacd8169caf3e5a94f4beb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6418.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7219UL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7219UL.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c36FZ01.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c36FZ01.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRsle30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRsle30.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e12YK83.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e12YK83.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
645KB
MD59cca2a55b276374790930c5328f29b02
SHA13d9782ee4cb51fdc4c5e049a0a0a25d53116ff9c
SHA25677907bcce5453b65100e509de1db72725fe566f8d5e5ea3e7f0731b8e19e90e6
SHA512d541cb6f055fe43c81666fbeacd33d7ab4cd1af19491a1b68e2ea40531dbdfad980a239fa1f31004d9a926aae388ca1811cdbeca4b77e4c621060dfe82708560
-
Filesize
645KB
MD59cca2a55b276374790930c5328f29b02
SHA13d9782ee4cb51fdc4c5e049a0a0a25d53116ff9c
SHA25677907bcce5453b65100e509de1db72725fe566f8d5e5ea3e7f0731b8e19e90e6
SHA512d541cb6f055fe43c81666fbeacd33d7ab4cd1af19491a1b68e2ea40531dbdfad980a239fa1f31004d9a926aae388ca1811cdbeca4b77e4c621060dfe82708560
-
Filesize
296KB
MD588f1eb2a5ac78d81245e46f954de96e6
SHA1f73af0ee5bcb6029f9b8fb7f562ac37d1286f042
SHA25608f38c8907cd895807bdd7524234084612853d807aa2094d0a6a6638c136eeea
SHA512cd008dcc2c6d827e4a4f34a0cf80416cff490a0fb88277997e9d1690b8e555cc3d21f66809afa7b8c836cadcf21d52c75f08e8b5808dcd2e8eaf6e58e1d43aad
-
Filesize
296KB
MD588f1eb2a5ac78d81245e46f954de96e6
SHA1f73af0ee5bcb6029f9b8fb7f562ac37d1286f042
SHA25608f38c8907cd895807bdd7524234084612853d807aa2094d0a6a6638c136eeea
SHA512cd008dcc2c6d827e4a4f34a0cf80416cff490a0fb88277997e9d1690b8e555cc3d21f66809afa7b8c836cadcf21d52c75f08e8b5808dcd2e8eaf6e58e1d43aad
-
Filesize
323KB
MD5ec46b6a23ce8d810a29afaff241a3d05
SHA1174e310f87e0f3e9c392037949a2dc8e67c65ef0
SHA256180ae074763804d194ba12c6d1e2e9a0895d68c36a807b1f022ec8b71723dee1
SHA5122955b73fb9ce97fcea9a9bc995138189096c3fb6747a8c0f998aafef93262be4b7526555a8c2dec23aa25bb1e51c51b3bcb996471e4e046509b044f1bad35508
-
Filesize
323KB
MD5ec46b6a23ce8d810a29afaff241a3d05
SHA1174e310f87e0f3e9c392037949a2dc8e67c65ef0
SHA256180ae074763804d194ba12c6d1e2e9a0895d68c36a807b1f022ec8b71723dee1
SHA5122955b73fb9ce97fcea9a9bc995138189096c3fb6747a8c0f998aafef93262be4b7526555a8c2dec23aa25bb1e51c51b3bcb996471e4e046509b044f1bad35508
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD55df934a16e80676a9c964feb3135458f
SHA106ad20f806c987c2c02a0867f1f08f3d9e47ff1d
SHA256f1283c7d0ff9fd30e8328cb701f54b7414c8c3b6c9c15e0930051a2a1c1f531d
SHA512734135670cd653e46d9d3ff9e76a37877840fc8b087c1fb0ef6cd336e57bcab340838c1a9d70801ac3f57d69392e465833e80a1d5c182214832cfe30c130606e
-
Filesize
239KB
MD55df934a16e80676a9c964feb3135458f
SHA106ad20f806c987c2c02a0867f1f08f3d9e47ff1d
SHA256f1283c7d0ff9fd30e8328cb701f54b7414c8c3b6c9c15e0930051a2a1c1f531d
SHA512734135670cd653e46d9d3ff9e76a37877840fc8b087c1fb0ef6cd336e57bcab340838c1a9d70801ac3f57d69392e465833e80a1d5c182214832cfe30c130606e