Analysis
-
max time kernel
81s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe
Resource
win10v2004-20230221-en
General
-
Target
aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe
-
Size
875KB
-
MD5
9ed199a3c0336ecb3dec86b9977ede36
-
SHA1
83991734d9f28abc1b8d996d3dc825bee32f1bae
-
SHA256
aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e
-
SHA512
5cd7afc06d9c2a10f3159072020a9bef1ac4fde7443ce96c1c7d2fc5f4de34e7c4562cd6e2bdf13e5d799f5f0b60ae058cc1c265dde8fb4947bc8f7eecbc09d7
-
SSDEEP
24576:3y0ztfqNjpQJIsCxjgDaw7owhNc2CrnWMsZ2:CU5+1rxjgT7n+zSD
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0749qF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0749qF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0749qF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0749qF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c23xD56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c23xD56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c23xD56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c23xD56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c23xD56.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b0749qF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0749qF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c23xD56.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4388-203-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-204-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-206-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-208-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-210-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-212-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-214-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-216-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-218-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-222-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-223-0x00000000049D0000-0x00000000049E0000-memory.dmp family_redline behavioral1/memory/4388-226-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-228-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-230-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-232-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-234-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-236-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-238-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4388-240-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1144 tice7857.exe 2360 tice2926.exe 892 b0749qF.exe 3856 c23xD56.exe 4388 dVLbY05.exe 4532 e93KT66.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0749qF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c23xD56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c23xD56.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice2926.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice7857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice7857.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2926.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5100 3856 WerFault.exe 96 3192 4388 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 892 b0749qF.exe 892 b0749qF.exe 3856 c23xD56.exe 3856 c23xD56.exe 4388 dVLbY05.exe 4388 dVLbY05.exe 4532 e93KT66.exe 4532 e93KT66.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 892 b0749qF.exe Token: SeDebugPrivilege 3856 c23xD56.exe Token: SeDebugPrivilege 4388 dVLbY05.exe Token: SeDebugPrivilege 4532 e93KT66.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1144 2288 aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe 86 PID 2288 wrote to memory of 1144 2288 aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe 86 PID 2288 wrote to memory of 1144 2288 aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe 86 PID 1144 wrote to memory of 2360 1144 tice7857.exe 87 PID 1144 wrote to memory of 2360 1144 tice7857.exe 87 PID 1144 wrote to memory of 2360 1144 tice7857.exe 87 PID 2360 wrote to memory of 892 2360 tice2926.exe 88 PID 2360 wrote to memory of 892 2360 tice2926.exe 88 PID 2360 wrote to memory of 3856 2360 tice2926.exe 96 PID 2360 wrote to memory of 3856 2360 tice2926.exe 96 PID 2360 wrote to memory of 3856 2360 tice2926.exe 96 PID 1144 wrote to memory of 4388 1144 tice7857.exe 99 PID 1144 wrote to memory of 4388 1144 tice7857.exe 99 PID 1144 wrote to memory of 4388 1144 tice7857.exe 99 PID 2288 wrote to memory of 4532 2288 aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe 104 PID 2288 wrote to memory of 4532 2288 aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe 104 PID 2288 wrote to memory of 4532 2288 aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe"C:\Users\Admin\AppData\Local\Temp\aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7857.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7857.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2926.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0749qF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0749qF.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23xD56.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23xD56.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 10805⤵
- Program crash
PID:5100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dVLbY05.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dVLbY05.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 13404⤵
- Program crash
PID:3192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e93KT66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e93KT66.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3856 -ip 38561⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4388 -ip 43881⤵PID:1480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
730KB
MD57afd0db9e5c81734b7ab3070bb84a250
SHA1d092928b32d2b27b1705b341e54af83da35e17fb
SHA2564bbca8d7289ced21fbda01114fd51d33369df264fe24dd9db1ac22cb8610f1f9
SHA512d6394d0f0272dab08af28038070e726f8d8ae6f15765be27172ca256b1f4bf23fcc647338a3804dd033f31040a6275fbfe61feec4f76755affe73c12ab83878f
-
Filesize
730KB
MD57afd0db9e5c81734b7ab3070bb84a250
SHA1d092928b32d2b27b1705b341e54af83da35e17fb
SHA2564bbca8d7289ced21fbda01114fd51d33369df264fe24dd9db1ac22cb8610f1f9
SHA512d6394d0f0272dab08af28038070e726f8d8ae6f15765be27172ca256b1f4bf23fcc647338a3804dd033f31040a6275fbfe61feec4f76755affe73c12ab83878f
-
Filesize
408KB
MD53e0d3fd8290daf3488dd3657882ef7b6
SHA1845cc0275cc5aa92adfe1095793660d3af407c1f
SHA2560f56f2bd086c93e1118204b2fe561033a6aee4d3e32489cfd2e7008a05b5d2b6
SHA512344f18dae3dbf9062e5240cd1149bebb879b271426e98e61524f8fd66899ebe9636bcc366ed06e47432872cf0551c00a3192c427af8ab3d72e12c2081f13b892
-
Filesize
408KB
MD53e0d3fd8290daf3488dd3657882ef7b6
SHA1845cc0275cc5aa92adfe1095793660d3af407c1f
SHA2560f56f2bd086c93e1118204b2fe561033a6aee4d3e32489cfd2e7008a05b5d2b6
SHA512344f18dae3dbf9062e5240cd1149bebb879b271426e98e61524f8fd66899ebe9636bcc366ed06e47432872cf0551c00a3192c427af8ab3d72e12c2081f13b892
-
Filesize
365KB
MD54a9b25ad4c76e89796fa1a1c9b4bfecf
SHA16d6acc6f9a67fb30d579b8c2b1c73f2d5624bf46
SHA256d3c4539237b01972c1c2c5d43c7793c6bbefcc6b66e547af66674373d310521c
SHA5121c8e449bca32a9279a78a5429c7ee85cf2cea79d0ed16404945f723fbd149b9f43281723ca128959b095cbc8612c8fcde8f88a0b88681024872733554b0a2240
-
Filesize
365KB
MD54a9b25ad4c76e89796fa1a1c9b4bfecf
SHA16d6acc6f9a67fb30d579b8c2b1c73f2d5624bf46
SHA256d3c4539237b01972c1c2c5d43c7793c6bbefcc6b66e547af66674373d310521c
SHA5121c8e449bca32a9279a78a5429c7ee85cf2cea79d0ed16404945f723fbd149b9f43281723ca128959b095cbc8612c8fcde8f88a0b88681024872733554b0a2240
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
350KB
MD52fb114a60b673047139bf6e34aa705dc
SHA19f7a56042897eae8538c9968db8a02e1f7a47a96
SHA256f038fe763ad396c488b7aabd8f9e4152d16ab700f2d32a49090c5b3ae4b7557b
SHA51218e850bbcc77ff4696ba128fdf2d61d87d6dbab1f5d236b5deeedb7757f909765f5552148687de7bdc988c916755962c206d49dbbdc6c5b8c8f6decda3a24da4
-
Filesize
350KB
MD52fb114a60b673047139bf6e34aa705dc
SHA19f7a56042897eae8538c9968db8a02e1f7a47a96
SHA256f038fe763ad396c488b7aabd8f9e4152d16ab700f2d32a49090c5b3ae4b7557b
SHA51218e850bbcc77ff4696ba128fdf2d61d87d6dbab1f5d236b5deeedb7757f909765f5552148687de7bdc988c916755962c206d49dbbdc6c5b8c8f6decda3a24da4