Analysis
-
max time kernel
55s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2023 20:22
Static task
static1
Behavioral task
behavioral1
Sample
7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe
Resource
win10-20230220-en
General
-
Target
7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe
-
Size
864KB
-
MD5
65ddff5746426bad6de2bc2435083395
-
SHA1
43935608396a20c3b1006988c5f7393703709cba
-
SHA256
7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20
-
SHA512
8dd5430c0f37e40b6ba0114d1100e97e22887766c9fd4a2edc089752dba1e33a879f7b80497b1a3fcfeab484af29784e792b3e0eb366ccd78a1627bd3607e022
-
SSDEEP
24576:QyMD0NZj1Os4p260HI9NGKSHysrQKFYJm:XYF2fHIWKSHvrQKFY
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6090SM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6090SM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c23YZ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6090SM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6090SM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6090SM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c23YZ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c23YZ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c23YZ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c23YZ37.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4684-189-0x00000000049B0000-0x00000000049F6000-memory.dmp family_redline behavioral1/memory/4684-190-0x0000000004C70000-0x0000000004CB4000-memory.dmp family_redline behavioral1/memory/4684-191-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-192-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-196-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-194-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-198-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-200-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-202-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-206-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-204-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-208-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-210-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-215-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-219-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-217-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-223-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-225-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-227-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/4684-221-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3196 tice1520.exe 324 tice2921.exe 4300 b6090SM.exe 2944 c23YZ37.exe 4684 dXsza50.exe 4832 e22TR53.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6090SM.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c23YZ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c23YZ37.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1520.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice2921.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice1520.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4300 b6090SM.exe 4300 b6090SM.exe 2944 c23YZ37.exe 2944 c23YZ37.exe 4684 dXsza50.exe 4684 dXsza50.exe 4832 e22TR53.exe 4832 e22TR53.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4300 b6090SM.exe Token: SeDebugPrivilege 2944 c23YZ37.exe Token: SeDebugPrivilege 4684 dXsza50.exe Token: SeDebugPrivilege 4832 e22TR53.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3196 2552 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe 66 PID 2552 wrote to memory of 3196 2552 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe 66 PID 2552 wrote to memory of 3196 2552 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe 66 PID 3196 wrote to memory of 324 3196 tice1520.exe 67 PID 3196 wrote to memory of 324 3196 tice1520.exe 67 PID 3196 wrote to memory of 324 3196 tice1520.exe 67 PID 324 wrote to memory of 4300 324 tice2921.exe 68 PID 324 wrote to memory of 4300 324 tice2921.exe 68 PID 324 wrote to memory of 2944 324 tice2921.exe 69 PID 324 wrote to memory of 2944 324 tice2921.exe 69 PID 324 wrote to memory of 2944 324 tice2921.exe 69 PID 3196 wrote to memory of 4684 3196 tice1520.exe 70 PID 3196 wrote to memory of 4684 3196 tice1520.exe 70 PID 3196 wrote to memory of 4684 3196 tice1520.exe 70 PID 2552 wrote to memory of 4832 2552 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe 72 PID 2552 wrote to memory of 4832 2552 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe 72 PID 2552 wrote to memory of 4832 2552 7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe"C:\Users\Admin\AppData\Local\Temp\7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1520.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1520.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2921.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6090SM.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6090SM.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23YZ37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23YZ37.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXsza50.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXsza50.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e22TR53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e22TR53.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
719KB
MD54dd7979710f06eb097063383f56c4269
SHA19fb38b8c653e5db44255347470461e6395827ee0
SHA2566f8e1756821fd1a2d439049d802342d85622d1a2ccd88da62d976826feaf2a3f
SHA512cd9be22527405e7af9d48b763d9154256620e7ced39a231f0f698a1d09b7415023e3020e91beb1cf1548dbbc2ed5ab161fd2bc2ca538fcb47a9c1577d89ac2e7
-
Filesize
719KB
MD54dd7979710f06eb097063383f56c4269
SHA19fb38b8c653e5db44255347470461e6395827ee0
SHA2566f8e1756821fd1a2d439049d802342d85622d1a2ccd88da62d976826feaf2a3f
SHA512cd9be22527405e7af9d48b763d9154256620e7ced39a231f0f698a1d09b7415023e3020e91beb1cf1548dbbc2ed5ab161fd2bc2ca538fcb47a9c1577d89ac2e7
-
Filesize
401KB
MD50b60199c3670257289d46942d7289afe
SHA1275e546b3156ad342a2e4993ec6da0fa5d698abb
SHA256230cc23ef4929db51896808839bb11899f6f07c2bcc0dbad97d9233db3087d69
SHA512be63498aff7447fd33b40ee4665b0c4bcec3db64ee335201a28a469b5a6f1f41f2077b1322cd5250db70d576f3e91a0e056b1c1692355b8deb288548b6e57bca
-
Filesize
401KB
MD50b60199c3670257289d46942d7289afe
SHA1275e546b3156ad342a2e4993ec6da0fa5d698abb
SHA256230cc23ef4929db51896808839bb11899f6f07c2bcc0dbad97d9233db3087d69
SHA512be63498aff7447fd33b40ee4665b0c4bcec3db64ee335201a28a469b5a6f1f41f2077b1322cd5250db70d576f3e91a0e056b1c1692355b8deb288548b6e57bca
-
Filesize
360KB
MD54e3eefe2f87deee7c78ce03606d46ee7
SHA1628f496b5374d998b21486d5ee6ff1afeaec7caa
SHA256de4ff7c7268e267da369470ea79714976c67dd5b4de5eeb45cb562fdfb3cc49e
SHA512b114fa39d5666d1b3e528729e72656ef6c866e37da0755951d845de5247ba9c5c98e1fb2e2ac5c51cfb537ecaaf0091b3ae3ac7f8328dffe461614fa3217a3ef
-
Filesize
360KB
MD54e3eefe2f87deee7c78ce03606d46ee7
SHA1628f496b5374d998b21486d5ee6ff1afeaec7caa
SHA256de4ff7c7268e267da369470ea79714976c67dd5b4de5eeb45cb562fdfb3cc49e
SHA512b114fa39d5666d1b3e528729e72656ef6c866e37da0755951d845de5247ba9c5c98e1fb2e2ac5c51cfb537ecaaf0091b3ae3ac7f8328dffe461614fa3217a3ef
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
343KB
MD5b4e520fb843a4ab8c74ef06261b12ad8
SHA15f56035167c0f524bc3c849e0a98399fd4b935dd
SHA256c795609c8d2da3337acb82e7923a8bf11634dc624eb685455a76921ac850e0b4
SHA51262ef0ba405220ad63e55903c1f73bb3b8e1dab45d6af5407d852af08548119d02598b9371e6df785aa48445cbc0bf64535b53aefa7fe84018179b0b25e2e7a52
-
Filesize
343KB
MD5b4e520fb843a4ab8c74ef06261b12ad8
SHA15f56035167c0f524bc3c849e0a98399fd4b935dd
SHA256c795609c8d2da3337acb82e7923a8bf11634dc624eb685455a76921ac850e0b4
SHA51262ef0ba405220ad63e55903c1f73bb3b8e1dab45d6af5407d852af08548119d02598b9371e6df785aa48445cbc0bf64535b53aefa7fe84018179b0b25e2e7a52