Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe
Resource
win10-20230220-en
General
-
Target
90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe
-
Size
864KB
-
MD5
e1cb202c79e69d973b576d0be31ae479
-
SHA1
d375601ef6702e09da2d53c6435d97c48694e80c
-
SHA256
90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d
-
SHA512
d453ae964f41811bb0f8ff1dab2a7ae1814e7933470ce0528ef7d1b0e3d80648cfc56cda95333871de77059d98af021d3d64018878eafc7886d1ead356aecb4d
-
SSDEEP
24576:IyR0mCTO16suY1UXh8a4HzVn7vv+RbsUXnoY:PR0mz1COa+JTGxd
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c26wW14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c26wW14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c26wW14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9384ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9384ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9384ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c26wW14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9384ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9384ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c26wW14.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4020-189-0x0000000004660000-0x00000000046A6000-memory.dmp family_redline behavioral1/memory/4020-190-0x0000000007090000-0x00000000070D4000-memory.dmp family_redline behavioral1/memory/4020-192-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-191-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-194-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-196-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-198-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-200-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-202-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-204-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-206-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-208-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-210-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-212-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-214-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-216-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-218-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-220-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-222-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline behavioral1/memory/4020-224-0x0000000007090000-0x00000000070CE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4452 tice9878.exe 1832 tice4575.exe 420 b9384ye.exe 1700 c26wW14.exe 4020 ddBWa18.exe 1848 e15Zv58.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9384ye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c26wW14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c26wW14.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9878.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4575.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 420 b9384ye.exe 420 b9384ye.exe 1700 c26wW14.exe 1700 c26wW14.exe 4020 ddBWa18.exe 4020 ddBWa18.exe 1848 e15Zv58.exe 1848 e15Zv58.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 420 b9384ye.exe Token: SeDebugPrivilege 1700 c26wW14.exe Token: SeDebugPrivilege 4020 ddBWa18.exe Token: SeDebugPrivilege 1848 e15Zv58.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4452 3152 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe 66 PID 3152 wrote to memory of 4452 3152 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe 66 PID 3152 wrote to memory of 4452 3152 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe 66 PID 4452 wrote to memory of 1832 4452 tice9878.exe 67 PID 4452 wrote to memory of 1832 4452 tice9878.exe 67 PID 4452 wrote to memory of 1832 4452 tice9878.exe 67 PID 1832 wrote to memory of 420 1832 tice4575.exe 68 PID 1832 wrote to memory of 420 1832 tice4575.exe 68 PID 1832 wrote to memory of 1700 1832 tice4575.exe 69 PID 1832 wrote to memory of 1700 1832 tice4575.exe 69 PID 1832 wrote to memory of 1700 1832 tice4575.exe 69 PID 4452 wrote to memory of 4020 4452 tice9878.exe 70 PID 4452 wrote to memory of 4020 4452 tice9878.exe 70 PID 4452 wrote to memory of 4020 4452 tice9878.exe 70 PID 3152 wrote to memory of 1848 3152 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe 72 PID 3152 wrote to memory of 1848 3152 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe 72 PID 3152 wrote to memory of 1848 3152 90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe"C:\Users\Admin\AppData\Local\Temp\90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9878.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9878.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4575.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4575.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9384ye.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9384ye.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c26wW14.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c26wW14.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddBWa18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddBWa18.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e15Zv58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e15Zv58.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
719KB
MD512ad500336240e49b8c8a83ecac7d694
SHA1b105dcd294dd67c45cf6aaffc8fc0f4585a2c15b
SHA256c86854af3a0c9f21121711c897c73f0ee1f197894f7f60425cfe761d10c67e61
SHA5129bd0ad7c06bde6a95c5e0b590e29dc3a0e78fa9e0c52bfe5b07640e49f277789aed8a6526ade4115da915a47b2e077704e72fa447c42c64e81ddf834b1e7d21c
-
Filesize
719KB
MD512ad500336240e49b8c8a83ecac7d694
SHA1b105dcd294dd67c45cf6aaffc8fc0f4585a2c15b
SHA256c86854af3a0c9f21121711c897c73f0ee1f197894f7f60425cfe761d10c67e61
SHA5129bd0ad7c06bde6a95c5e0b590e29dc3a0e78fa9e0c52bfe5b07640e49f277789aed8a6526ade4115da915a47b2e077704e72fa447c42c64e81ddf834b1e7d21c
-
Filesize
400KB
MD5bdb488e408687bf9d68cb4b465f56b91
SHA1392ef554e7e3d757f653077997826b5a289dff95
SHA2566af793f98b18cd5bbc093d2a3aa3625e5ebbd761377e0feda64d49ad820e5b67
SHA5122a9a55d7c0d6062906f68208a9c5f266f22c113b930f628c0cf803cfd4c80f7bfeda7c9181d1308dbb5483c4bfec2d7f447d2c0a5548fe45c4477bd6801bf8e4
-
Filesize
400KB
MD5bdb488e408687bf9d68cb4b465f56b91
SHA1392ef554e7e3d757f653077997826b5a289dff95
SHA2566af793f98b18cd5bbc093d2a3aa3625e5ebbd761377e0feda64d49ad820e5b67
SHA5122a9a55d7c0d6062906f68208a9c5f266f22c113b930f628c0cf803cfd4c80f7bfeda7c9181d1308dbb5483c4bfec2d7f447d2c0a5548fe45c4477bd6801bf8e4
-
Filesize
359KB
MD55251f684db5be50c0202c5463622f9ae
SHA19b4dce7a6b9025cd166ef2de1583d2d336296ea4
SHA256206fefabfc5009cdd66b8e07a716dc97927042eb1468b327141c0c399c17b306
SHA512e47c34b56062aadc142045563af22e57041f981cb5c8547fcba7adcf91b6bb11c395a6425b0c09f34b3cc0284318c84d8e2a7a7c1454e11a393a277594fe9668
-
Filesize
359KB
MD55251f684db5be50c0202c5463622f9ae
SHA19b4dce7a6b9025cd166ef2de1583d2d336296ea4
SHA256206fefabfc5009cdd66b8e07a716dc97927042eb1468b327141c0c399c17b306
SHA512e47c34b56062aadc142045563af22e57041f981cb5c8547fcba7adcf91b6bb11c395a6425b0c09f34b3cc0284318c84d8e2a7a7c1454e11a393a277594fe9668
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD57f664394518e83c179802d9d839fc951
SHA13a0dcb0d631784d43f20ce150f30ed8869ebcca0
SHA256f1e990120ed7d559aaf0ed150b16a65ade6809fd970701fb3ef2039c1cbd5e90
SHA5120c3cbd5ec37e7a076fed763d6efbcbdf077aba40a303ccc69988538c033403bb1106ab2900a6c264ce1c93c11c1360d2b40ccfdd12118d18e1d7216e8aeed924
-
Filesize
342KB
MD57f664394518e83c179802d9d839fc951
SHA13a0dcb0d631784d43f20ce150f30ed8869ebcca0
SHA256f1e990120ed7d559aaf0ed150b16a65ade6809fd970701fb3ef2039c1cbd5e90
SHA5120c3cbd5ec37e7a076fed763d6efbcbdf077aba40a303ccc69988538c033403bb1106ab2900a6c264ce1c93c11c1360d2b40ccfdd12118d18e1d7216e8aeed924