Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe
Resource
win10v2004-20230220-en
General
-
Target
bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe
-
Size
875KB
-
MD5
34df3b34ca269169ab45969d37d2bb41
-
SHA1
c38af40a551aa77493785711fc8b259ba1461991
-
SHA256
bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741
-
SHA512
1131b8c96dd2f03046680ff34a11ca7f89dc274f65340c7c88f8f71edf68f5e1a1ad4fcb967bde59a53e1118343b299db8172e6c2a1605edb6c41d85928f6e59
-
SSDEEP
12288:PMrxy90J+U5Ly76h3lP573nscdjdCfwBc6tgzzprU4jXSPaShGSAxbX+qVjVO/DT:Cy05Ly761l5g8jdCKCG4ePaXS94hObT
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9287Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c88Il43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c88Il43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c88Il43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9287Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9287Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9287Uy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c88Il43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c88Il43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c88Il43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9287Uy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9287Uy.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/4256-206-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-207-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-209-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-211-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-213-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-215-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-217-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-219-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-221-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-223-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-225-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-227-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-229-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-231-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-233-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-235-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline behavioral1/memory/4256-237-0x00000000076C0000-0x00000000076FE000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 2676 tice2692.exe 4396 tice6843.exe 2996 b9287Uy.exe 1652 c88Il43.exe 4256 dncrk09.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9287Uy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c88Il43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c88Il43.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2692.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2692.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice6843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice6843.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2152 1652 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2996 b9287Uy.exe 2996 b9287Uy.exe 1652 c88Il43.exe 1652 c88Il43.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2996 b9287Uy.exe Token: SeDebugPrivilege 1652 c88Il43.exe Token: SeDebugPrivilege 4256 dncrk09.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 620 wrote to memory of 2676 620 bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe 85 PID 620 wrote to memory of 2676 620 bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe 85 PID 620 wrote to memory of 2676 620 bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe 85 PID 2676 wrote to memory of 4396 2676 tice2692.exe 86 PID 2676 wrote to memory of 4396 2676 tice2692.exe 86 PID 2676 wrote to memory of 4396 2676 tice2692.exe 86 PID 4396 wrote to memory of 2996 4396 tice6843.exe 87 PID 4396 wrote to memory of 2996 4396 tice6843.exe 87 PID 4396 wrote to memory of 1652 4396 tice6843.exe 93 PID 4396 wrote to memory of 1652 4396 tice6843.exe 93 PID 4396 wrote to memory of 1652 4396 tice6843.exe 93 PID 2676 wrote to memory of 4256 2676 tice2692.exe 98 PID 2676 wrote to memory of 4256 2676 tice2692.exe 98 PID 2676 wrote to memory of 4256 2676 tice2692.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe"C:\Users\Admin\AppData\Local\Temp\bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2692.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2692.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6843.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6843.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9287Uy.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9287Uy.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Il43.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Il43.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10845⤵
- Program crash
PID:2152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dncrk09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dncrk09.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1652 -ip 16521⤵PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
730KB
MD55d0d6e670da22114593f774986bdde65
SHA1b4abb1977720a2216eff1dce50e814c79460c5aa
SHA256a4216f3f36f8e30489f552a4e6050e8dc50c198782ca476223a9182415f49f03
SHA512702ce5b4fe148a8556e1f28803ec9d2551ed542ca1a4805f9c24ca53927373d75564162ce7a855ccac7f4db67f6f37523d1c00168746e471465b0b44fdacc9a5
-
Filesize
730KB
MD55d0d6e670da22114593f774986bdde65
SHA1b4abb1977720a2216eff1dce50e814c79460c5aa
SHA256a4216f3f36f8e30489f552a4e6050e8dc50c198782ca476223a9182415f49f03
SHA512702ce5b4fe148a8556e1f28803ec9d2551ed542ca1a4805f9c24ca53927373d75564162ce7a855ccac7f4db67f6f37523d1c00168746e471465b0b44fdacc9a5
-
Filesize
409KB
MD5682d5d23c6a8d907c2a031cb308754f5
SHA1c190258b39c14b3da8aa60e583fa620fb4714695
SHA256101397632a447029cbda14e56df92c0dae86053fdfc84879431c2e7c40cc2385
SHA512bb1064445b2c60a571d9189fad73694257c79950de67b497a6a776726179c2fb8d5d867e12f099054cd63db119005b604719ec72873e40b661b1d4d51cbe9374
-
Filesize
409KB
MD5682d5d23c6a8d907c2a031cb308754f5
SHA1c190258b39c14b3da8aa60e583fa620fb4714695
SHA256101397632a447029cbda14e56df92c0dae86053fdfc84879431c2e7c40cc2385
SHA512bb1064445b2c60a571d9189fad73694257c79950de67b497a6a776726179c2fb8d5d867e12f099054cd63db119005b604719ec72873e40b661b1d4d51cbe9374
-
Filesize
365KB
MD570c50312a24b23ec655b5c26b4fe6ae0
SHA1714835fd5485349ca5db1fd3dd69063f3a4d86ab
SHA256d2968ccad261b137207c8aa0888b3e3e1e3fe21a1de51578054d9e8336551b0c
SHA51273bd22c835622514f573d301658cf4aa9235d214babdf8c57ec4b8722be43e015681b746d5730331aa41c00cd669766cd8a3ebb4eb541c8ac7df37ff69cfbcc8
-
Filesize
365KB
MD570c50312a24b23ec655b5c26b4fe6ae0
SHA1714835fd5485349ca5db1fd3dd69063f3a4d86ab
SHA256d2968ccad261b137207c8aa0888b3e3e1e3fe21a1de51578054d9e8336551b0c
SHA51273bd22c835622514f573d301658cf4aa9235d214babdf8c57ec4b8722be43e015681b746d5730331aa41c00cd669766cd8a3ebb4eb541c8ac7df37ff69cfbcc8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD57ee75eabf13665c136fda3d3828beb0d
SHA1549821cdb87611d59ed9b24b83a0f25c383dc5ad
SHA256672d2877e18029e2bdcb0b32b01bca0bec170f3f805757815eae84d3e662fc29
SHA512152430e66587f84b2b296621fa79fc54399c5eae86ad9e581748661469927751187b92e4ea9944838d4bf4a1c246785d75e5833266bf1f8b7c3cb30c72e7aeee
-
Filesize
351KB
MD57ee75eabf13665c136fda3d3828beb0d
SHA1549821cdb87611d59ed9b24b83a0f25c383dc5ad
SHA256672d2877e18029e2bdcb0b32b01bca0bec170f3f805757815eae84d3e662fc29
SHA512152430e66587f84b2b296621fa79fc54399c5eae86ad9e581748661469927751187b92e4ea9944838d4bf4a1c246785d75e5833266bf1f8b7c3cb30c72e7aeee