Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 04:49
Static task
static1
Behavioral task
behavioral1
Sample
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
Resource
win10-20230220-en
General
-
Target
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
-
Size
705KB
-
MD5
ea1feb0abf31d4223e3ac84ab4e55916
-
SHA1
e12551850ee0bde498cda0e9950f7288a8b2cfed
-
SHA256
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b
-
SHA512
d2780eba841ab324655997f978a50a7d7c4bc79fad5d4bd65a338e85040dd931e7356dd9dc0422762d8d941a452b931cac2ab2dd96aa692db38661c77a9b11ea
-
SSDEEP
12288:+Mrny90hKmjwm5n52FnHTS6r7SfNWJuqGStQ6c7wS:dymj8inOnHTS6Z5dK77wS
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c51gp51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c51gp51.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/1884-128-0x0000000000B90000-0x0000000000BD6000-memory.dmp family_redline behavioral1/memory/1884-129-0x0000000000BD0000-0x0000000000C14000-memory.dmp family_redline behavioral1/memory/1884-130-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-131-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-133-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-135-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-139-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-137-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-143-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-141-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-145-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-149-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-147-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-151-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-157-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-155-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-153-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-163-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-161-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-159-0x0000000000BD0000-0x0000000000C0E000-memory.dmp family_redline behavioral1/memory/1884-585-0x0000000000B00000-0x0000000000B40000-memory.dmp family_redline behavioral1/memory/1884-1039-0x0000000000B00000-0x0000000000B40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1744 nice9102.exe 432 b3805Ve.exe 468 c51gp51.exe 1884 dyceq67.exe -
Loads dropped DLL 9 IoCs
pid Process 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 1744 nice9102.exe 1744 nice9102.exe 1744 nice9102.exe 1744 nice9102.exe 468 c51gp51.exe 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 1884 dyceq67.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c51gp51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3805Ve.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features c51gp51.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice9102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice9102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 432 b3805Ve.exe 432 b3805Ve.exe 468 c51gp51.exe 468 c51gp51.exe 1884 dyceq67.exe 1884 dyceq67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 432 b3805Ve.exe Token: SeDebugPrivilege 468 c51gp51.exe Token: SeDebugPrivilege 1884 dyceq67.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1580 wrote to memory of 1744 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 28 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 432 1744 nice9102.exe 29 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1744 wrote to memory of 468 1744 nice9102.exe 30 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31 PID 1580 wrote to memory of 1884 1580 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe"C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
343KB
MD5a5e1f3b0b34d889fbd3f5a4cd856940f
SHA11019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99
SHA2563eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8
SHA5125259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8
-
Filesize
343KB
MD5a5e1f3b0b34d889fbd3f5a4cd856940f
SHA11019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99
SHA2563eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8
SHA5125259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
343KB
MD5a5e1f3b0b34d889fbd3f5a4cd856940f
SHA11019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99
SHA2563eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8
SHA5125259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8
-
Filesize
343KB
MD5a5e1f3b0b34d889fbd3f5a4cd856940f
SHA11019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99
SHA2563eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8
SHA5125259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e