Analysis
-
max time kernel
90s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2023, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe
Resource
win10-20230220-en
General
-
Target
337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe
-
Size
864KB
-
MD5
3014af0f96843daaec1db8cd15f4b072
-
SHA1
689e81e1cfd9fde05373ba4ed28ecb052ef24019
-
SHA256
337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5
-
SHA512
1b3c88a3fbd667acdc0caa66691c6ae85fc378d836aeb644711d2a226e5a8f0f6c1c6fe1156c1317d8e51cd3ba4f01a800728663d8d989570bd6ba7651a068c9
-
SSDEEP
12288:ZMrjy909B5TJjSzrOGL3ijdVV6C6r3HojiVMTNBNgqSO5HDQwNVSIO:Gy2FpS/hLKVVvW3ojFTPNgqN50wrFO
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9244mM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c13zy29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c13zy29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c13zy29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c13zy29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c13zy29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9244mM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9244mM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9244mM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9244mM.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4956-193-0x0000000007040000-0x0000000007086000-memory.dmp family_redline behavioral1/memory/4956-194-0x00000000075C0000-0x0000000007604000-memory.dmp family_redline behavioral1/memory/4956-195-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-196-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-198-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-200-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-202-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-206-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-204-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-208-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-213-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-215-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-217-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-219-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-221-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-225-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-223-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-227-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-229-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/4956-231-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2112 tice3196.exe 4292 tice2976.exe 2740 b9244mM.exe 2744 c13zy29.exe 4956 dntmm96.exe 3444 e48tW54.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9244mM.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c13zy29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c13zy29.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2976.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice2976.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2740 b9244mM.exe 2740 b9244mM.exe 2744 c13zy29.exe 2744 c13zy29.exe 4956 dntmm96.exe 4956 dntmm96.exe 3444 e48tW54.exe 3444 e48tW54.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2740 b9244mM.exe Token: SeDebugPrivilege 2744 c13zy29.exe Token: SeDebugPrivilege 4956 dntmm96.exe Token: SeDebugPrivilege 3444 e48tW54.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2112 3012 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe 66 PID 3012 wrote to memory of 2112 3012 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe 66 PID 3012 wrote to memory of 2112 3012 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe 66 PID 2112 wrote to memory of 4292 2112 tice3196.exe 67 PID 2112 wrote to memory of 4292 2112 tice3196.exe 67 PID 2112 wrote to memory of 4292 2112 tice3196.exe 67 PID 4292 wrote to memory of 2740 4292 tice2976.exe 68 PID 4292 wrote to memory of 2740 4292 tice2976.exe 68 PID 4292 wrote to memory of 2744 4292 tice2976.exe 69 PID 4292 wrote to memory of 2744 4292 tice2976.exe 69 PID 4292 wrote to memory of 2744 4292 tice2976.exe 69 PID 2112 wrote to memory of 4956 2112 tice3196.exe 70 PID 2112 wrote to memory of 4956 2112 tice3196.exe 70 PID 2112 wrote to memory of 4956 2112 tice3196.exe 70 PID 3012 wrote to memory of 3444 3012 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe 72 PID 3012 wrote to memory of 3444 3012 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe 72 PID 3012 wrote to memory of 3444 3012 337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe"C:\Users\Admin\AppData\Local\Temp\337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3196.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3196.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2976.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2976.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9244mM.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9244mM.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c13zy29.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c13zy29.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dntmm96.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dntmm96.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48tW54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48tW54.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
719KB
MD59e0b2c3045997121d7f40b34b2f6871f
SHA18a32b5a5b560336e092deeedd3e8cff824c74d0a
SHA2567eeb8dc65ddd24c0464fb92501a2bd4534b82b3b9c257caf41ade3e12eb145d1
SHA5126d832bf549316d6655d592999d42504475055a7c42a95bd50ea9dda88b711c4d30dcf5266968f366a9f394baedfe5845245e7226ea7a2056b281fb248a2ac355
-
Filesize
719KB
MD59e0b2c3045997121d7f40b34b2f6871f
SHA18a32b5a5b560336e092deeedd3e8cff824c74d0a
SHA2567eeb8dc65ddd24c0464fb92501a2bd4534b82b3b9c257caf41ade3e12eb145d1
SHA5126d832bf549316d6655d592999d42504475055a7c42a95bd50ea9dda88b711c4d30dcf5266968f366a9f394baedfe5845245e7226ea7a2056b281fb248a2ac355
-
Filesize
399KB
MD5235c77c94961115333e0c3b408e50c95
SHA1f8bb55c32a08e15da9e037cc34cd56c62b0a9e93
SHA2562957be35a896e9ba185c890eaaf49c233e39432871166eb7833bc33f3626022c
SHA5129936ef4ec349742e3a80b352e4c68423960167053fdf2c104a06ecf142780e064d6e19aff3df36f7345b32401bc3ced95b0b1b4681ec4a36281c31b9e93d0029
-
Filesize
399KB
MD5235c77c94961115333e0c3b408e50c95
SHA1f8bb55c32a08e15da9e037cc34cd56c62b0a9e93
SHA2562957be35a896e9ba185c890eaaf49c233e39432871166eb7833bc33f3626022c
SHA5129936ef4ec349742e3a80b352e4c68423960167053fdf2c104a06ecf142780e064d6e19aff3df36f7345b32401bc3ced95b0b1b4681ec4a36281c31b9e93d0029
-
Filesize
360KB
MD545d27f13d0c9dc38d1f0b18d7f4a2394
SHA13a2120c455e7d067cc2b7440401e957c9e4f5853
SHA256e4b141651e0d55273580d13ec943a54c34d170b315bffb6248fe12c216b42843
SHA51201fa4a3c34763b22f907c9be9265b33c32d1f831b624802c1cbe5e410d02159aa6a476f3a5a2e0f30da734748327406a2ac4fe4381677af2186b3a14b0cec88f
-
Filesize
360KB
MD545d27f13d0c9dc38d1f0b18d7f4a2394
SHA13a2120c455e7d067cc2b7440401e957c9e4f5853
SHA256e4b141651e0d55273580d13ec943a54c34d170b315bffb6248fe12c216b42843
SHA51201fa4a3c34763b22f907c9be9265b33c32d1f831b624802c1cbe5e410d02159aa6a476f3a5a2e0f30da734748327406a2ac4fe4381677af2186b3a14b0cec88f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5c510dd10f5d16e1bfe187df93c8b7c61
SHA175f50ab7d32d92ece4a7de6e9a72422159fe9420
SHA2562f0abe65e2d48a1567b38249931d8591f03e4ad5d0147ad662333070632f3cb9
SHA51230ff8d5a3426961c59f564a9b156397c047d9aea60efeecacf8019fec2ceb068aea4b319181147fb6b3f2faefb73582eb646915e494c5a6e9e73f13bfff579f9
-
Filesize
342KB
MD5c510dd10f5d16e1bfe187df93c8b7c61
SHA175f50ab7d32d92ece4a7de6e9a72422159fe9420
SHA2562f0abe65e2d48a1567b38249931d8591f03e4ad5d0147ad662333070632f3cb9
SHA51230ff8d5a3426961c59f564a9b156397c047d9aea60efeecacf8019fec2ceb068aea4b319181147fb6b3f2faefb73582eb646915e494c5a6e9e73f13bfff579f9