Analysis
-
max time kernel
93s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe
Resource
win10v2004-20230221-en
General
-
Target
ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe
-
Size
874KB
-
MD5
b94127c0c7490cd5db6c1e460bebc039
-
SHA1
beb9599a00aaa968148b6c226704de37df804387
-
SHA256
ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0
-
SHA512
a4d4424cd97ab801001871210f2886d7d6556891247ad586cd0cac17e355e105f3df420580240a4c3d7fa655cd6d8d5214d33b183715b16aedf67c0430f77161
-
SSDEEP
12288:eMrgy90bI+Pt0VGxbrv0oj/wIohFpGNOpNjeLqOZ0aSBhrS+mtp40JES7ZQUMgdH:WySIYuVG5LMF0EvEPSnrcrETUMkWY
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1392so.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1392so.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c56xd69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c56xd69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c56xd69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c56xd69.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1392so.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1392so.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1392so.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1392so.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c56xd69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c56xd69.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1172-203-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-204-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-210-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-214-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-207-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-216-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-218-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-220-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-222-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-224-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-226-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-228-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-230-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-232-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-234-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-238-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-236-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1172-240-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3284 tice9930.exe 3260 tice6859.exe 4776 b1392so.exe 1860 c56xd69.exe 1172 diTyr63.exe 2808 e69if03.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1392so.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c56xd69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c56xd69.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice6859.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9930.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice6859.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1340 1860 WerFault.exe 93 3260 1172 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4776 b1392so.exe 4776 b1392so.exe 1860 c56xd69.exe 1860 c56xd69.exe 1172 diTyr63.exe 1172 diTyr63.exe 2808 e69if03.exe 2808 e69if03.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4776 b1392so.exe Token: SeDebugPrivilege 1860 c56xd69.exe Token: SeDebugPrivilege 1172 diTyr63.exe Token: SeDebugPrivilege 2808 e69if03.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3284 3096 ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe 84 PID 3096 wrote to memory of 3284 3096 ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe 84 PID 3096 wrote to memory of 3284 3096 ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe 84 PID 3284 wrote to memory of 3260 3284 tice9930.exe 85 PID 3284 wrote to memory of 3260 3284 tice9930.exe 85 PID 3284 wrote to memory of 3260 3284 tice9930.exe 85 PID 3260 wrote to memory of 4776 3260 tice6859.exe 86 PID 3260 wrote to memory of 4776 3260 tice6859.exe 86 PID 3260 wrote to memory of 1860 3260 tice6859.exe 93 PID 3260 wrote to memory of 1860 3260 tice6859.exe 93 PID 3260 wrote to memory of 1860 3260 tice6859.exe 93 PID 3284 wrote to memory of 1172 3284 tice9930.exe 101 PID 3284 wrote to memory of 1172 3284 tice9930.exe 101 PID 3284 wrote to memory of 1172 3284 tice9930.exe 101 PID 3096 wrote to memory of 2808 3096 ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe 112 PID 3096 wrote to memory of 2808 3096 ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe 112 PID 3096 wrote to memory of 2808 3096 ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe"C:\Users\Admin\AppData\Local\Temp\ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9930.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6859.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1392so.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1392so.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56xd69.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56xd69.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 10965⤵
- Program crash
PID:1340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diTyr63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diTyr63.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 13484⤵
- Program crash
PID:3260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e69if03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e69if03.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1860 -ip 18601⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1172 -ip 11721⤵PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
729KB
MD54d6170c128bef3d25d6526417894314e
SHA17d866c2ab91a3ffc11616e0ee4c7ae895291c582
SHA2563910f09e6a53425e4b793905c6bbec83f982620bed0e158c64e319291dd6e637
SHA512f71d4e7fd2bc1dd889b9a4852719acc5fa9fc089407a01a3d66a6ae1fcaaf11d4c493f729b1623e7850bfaa07f7c30cd3036214530477e1fbfe3f784c2fb8be0
-
Filesize
729KB
MD54d6170c128bef3d25d6526417894314e
SHA17d866c2ab91a3ffc11616e0ee4c7ae895291c582
SHA2563910f09e6a53425e4b793905c6bbec83f982620bed0e158c64e319291dd6e637
SHA512f71d4e7fd2bc1dd889b9a4852719acc5fa9fc089407a01a3d66a6ae1fcaaf11d4c493f729b1623e7850bfaa07f7c30cd3036214530477e1fbfe3f784c2fb8be0
-
Filesize
408KB
MD514b7ce905f66a4ffa96811b4d35d83c3
SHA1ef7ecc810bed1819d4c7a4a885d1ba16beb476eb
SHA256ec80b2d311892f4ade3679a9c8d4c80d9c5cbdc41da4632d6447d9a98e12a0b2
SHA512450b55a8e6ab9e51659f78a8045aee384a518c1d0ad9fea1080a5bc931194ed06f6d0f86908fb42484c4c601f15e1d95dba5ac5f0d21ae20557bcdd485707546
-
Filesize
408KB
MD514b7ce905f66a4ffa96811b4d35d83c3
SHA1ef7ecc810bed1819d4c7a4a885d1ba16beb476eb
SHA256ec80b2d311892f4ade3679a9c8d4c80d9c5cbdc41da4632d6447d9a98e12a0b2
SHA512450b55a8e6ab9e51659f78a8045aee384a518c1d0ad9fea1080a5bc931194ed06f6d0f86908fb42484c4c601f15e1d95dba5ac5f0d21ae20557bcdd485707546
-
Filesize
365KB
MD5829693d279756b69ee21666eaefadd93
SHA1573e524bb635f9f478917b1761da897b5cfb017b
SHA256eb9aed307be2b9d2124420a77b4561bf326adfb65e249ff96a8144175735b28d
SHA5122c05e5fb844cf1d820762259677f345b64b2097deeb10b7a698e185299aba2989dd709c3a7ba82ad7154e58c0a8ce22d86f0c0e6950fb7c22790165e225cac83
-
Filesize
365KB
MD5829693d279756b69ee21666eaefadd93
SHA1573e524bb635f9f478917b1761da897b5cfb017b
SHA256eb9aed307be2b9d2124420a77b4561bf326adfb65e249ff96a8144175735b28d
SHA5122c05e5fb844cf1d820762259677f345b64b2097deeb10b7a698e185299aba2989dd709c3a7ba82ad7154e58c0a8ce22d86f0c0e6950fb7c22790165e225cac83
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD52ba1db05edad86dfb9151abe5f2b02be
SHA1e59314bd2fad2b4c76ba7d0b8949e77455e71265
SHA256ffb7aaf45b56423a5d311190231c8339fe2736a32965e132a36c357a41173ca1
SHA5128415e2094b8dc8a22c3b63890f7e008b2a11f020046a733d91bf54e48bcbc6a7076e77315db827203b1f9d9e475d5f3e3edc2068b7865f29d8ae48988256b116
-
Filesize
351KB
MD52ba1db05edad86dfb9151abe5f2b02be
SHA1e59314bd2fad2b4c76ba7d0b8949e77455e71265
SHA256ffb7aaf45b56423a5d311190231c8339fe2736a32965e132a36c357a41173ca1
SHA5128415e2094b8dc8a22c3b63890f7e008b2a11f020046a733d91bf54e48bcbc6a7076e77315db827203b1f9d9e475d5f3e3edc2068b7865f29d8ae48988256b116