Analysis
-
max time kernel
52s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2023 04:49
Static task
static1
Behavioral task
behavioral1
Sample
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
Resource
win10-20230220-en
General
-
Target
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
-
Size
705KB
-
MD5
ea1feb0abf31d4223e3ac84ab4e55916
-
SHA1
e12551850ee0bde498cda0e9950f7288a8b2cfed
-
SHA256
3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b
-
SHA512
d2780eba841ab324655997f978a50a7d7c4bc79fad5d4bd65a338e85040dd931e7356dd9dc0422762d8d941a452b931cac2ab2dd96aa692db38661c77a9b11ea
-
SSDEEP
12288:+Mrny90hKmjwm5n52FnHTS6r7SfNWJuqGStQ6c7wS:dymj8inOnHTS6Z5dK77wS
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3805Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c51gp51.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral2/memory/1388-187-0x0000000002180000-0x00000000021C6000-memory.dmp family_redline behavioral2/memory/1388-188-0x0000000004A60000-0x0000000004AA4000-memory.dmp family_redline behavioral2/memory/1388-190-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-189-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-196-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-200-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-202-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-198-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-194-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-192-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-204-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-212-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-216-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-218-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-214-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-222-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-220-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-210-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-208-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline behavioral2/memory/1388-206-0x0000000004A60000-0x0000000004A9E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3028 nice9102.exe 3832 b3805Ve.exe 2940 c51gp51.exe 1388 dyceq67.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3805Ve.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c51gp51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c51gp51.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice9102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice9102.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3832 b3805Ve.exe 3832 b3805Ve.exe 2940 c51gp51.exe 2940 c51gp51.exe 1388 dyceq67.exe 1388 dyceq67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3832 b3805Ve.exe Token: SeDebugPrivilege 2940 c51gp51.exe Token: SeDebugPrivilege 1388 dyceq67.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3028 2488 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 66 PID 2488 wrote to memory of 3028 2488 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 66 PID 2488 wrote to memory of 3028 2488 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 66 PID 3028 wrote to memory of 3832 3028 nice9102.exe 67 PID 3028 wrote to memory of 3832 3028 nice9102.exe 67 PID 3028 wrote to memory of 2940 3028 nice9102.exe 68 PID 3028 wrote to memory of 2940 3028 nice9102.exe 68 PID 3028 wrote to memory of 2940 3028 nice9102.exe 68 PID 2488 wrote to memory of 1388 2488 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 69 PID 2488 wrote to memory of 1388 2488 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 69 PID 2488 wrote to memory of 1388 2488 3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe"C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
427KB
MD58f2ca724913cd4307f17f28b7881287e
SHA1a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb
SHA256ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45
SHA51288cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66
-
Filesize
343KB
MD5a5e1f3b0b34d889fbd3f5a4cd856940f
SHA11019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99
SHA2563eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8
SHA5125259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8
-
Filesize
343KB
MD5a5e1f3b0b34d889fbd3f5a4cd856940f
SHA11019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99
SHA2563eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8
SHA5125259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e
-
Filesize
376KB
MD5bff09b0b2e95855edf0d19a2016fdd90
SHA141934a2817ef8c187b6747c6e3d8bdc4589f782e
SHA256a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc
SHA5122629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e