Analysis
-
max time kernel
87s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe
Resource
win10v2004-20230220-en
General
-
Target
2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe
-
Size
864KB
-
MD5
260fc5fc90b05fee37068cb7d869d437
-
SHA1
19fe9a7e57264facfc874fe29229179473138f39
-
SHA256
2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25
-
SHA512
60e0f3704194152b1181fed72a4d2cf7113b29d8bdff6d723d9d816232fc2049cb148f6caa3114cdb354d0b466ad1667f36602288b576365db38e950ee62ec78
-
SSDEEP
24576:TyEAfUjM4tp+PkcrsIzDZ9Y2dA0wWMYmo:m74tpvQrPZ9Y2+ZW
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8567qR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c98SZ28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c98SZ28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c98SZ28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c98SZ28.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8567qR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8567qR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8567qR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8567qR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8567qR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c98SZ28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c98SZ28.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2028-203-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-205-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-210-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-212-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-214-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-208-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-216-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-218-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-220-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-222-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-224-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-228-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-226-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-230-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-232-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-234-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-236-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline behavioral1/memory/2028-238-0x0000000007690000-0x00000000076CE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4688 tice2536.exe 4956 tice3333.exe 708 b8567qR.exe 1976 c98SZ28.exe 2028 dvQtk77.exe 3912 e89Ay93.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8567qR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c98SZ28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c98SZ28.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2536.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2536.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3333.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3696 1976 WerFault.exe 88 4788 2028 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 708 b8567qR.exe 708 b8567qR.exe 1976 c98SZ28.exe 1976 c98SZ28.exe 2028 dvQtk77.exe 2028 dvQtk77.exe 3912 e89Ay93.exe 3912 e89Ay93.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 708 b8567qR.exe Token: SeDebugPrivilege 1976 c98SZ28.exe Token: SeDebugPrivilege 2028 dvQtk77.exe Token: SeDebugPrivilege 3912 e89Ay93.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2312 wrote to memory of 4688 2312 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe 83 PID 2312 wrote to memory of 4688 2312 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe 83 PID 2312 wrote to memory of 4688 2312 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe 83 PID 4688 wrote to memory of 4956 4688 tice2536.exe 84 PID 4688 wrote to memory of 4956 4688 tice2536.exe 84 PID 4688 wrote to memory of 4956 4688 tice2536.exe 84 PID 4956 wrote to memory of 708 4956 tice3333.exe 85 PID 4956 wrote to memory of 708 4956 tice3333.exe 85 PID 4956 wrote to memory of 1976 4956 tice3333.exe 88 PID 4956 wrote to memory of 1976 4956 tice3333.exe 88 PID 4956 wrote to memory of 1976 4956 tice3333.exe 88 PID 4688 wrote to memory of 2028 4688 tice2536.exe 91 PID 4688 wrote to memory of 2028 4688 tice2536.exe 91 PID 4688 wrote to memory of 2028 4688 tice2536.exe 91 PID 2312 wrote to memory of 3912 2312 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe 97 PID 2312 wrote to memory of 3912 2312 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe 97 PID 2312 wrote to memory of 3912 2312 2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe"C:\Users\Admin\AppData\Local\Temp\2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2536.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2536.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3333.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3333.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8567qR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8567qR.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:708
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c98SZ28.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c98SZ28.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 10805⤵
- Program crash
PID:3696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvQtk77.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvQtk77.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 11924⤵
- Program crash
PID:4788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e89Ay93.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e89Ay93.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1976 -ip 19761⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2028 -ip 20281⤵PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
719KB
MD5c63a745a767cfc43b710f68803832395
SHA1abb24b037b7876b2a0182ba9bb8e0610023eb385
SHA2568a5575810c4bf6865bd3853a92349a3c6b261e351418fe24ef8d03f1defd27cf
SHA5121ceabfd6177d03d6751f1c1fbce8e263637e88d6f45504aa7a8bd99161d752f6413e2bcce8145dfcd8a5c1334def504cf09ca8fc19d728c761bfbf97c80aba5f
-
Filesize
719KB
MD5c63a745a767cfc43b710f68803832395
SHA1abb24b037b7876b2a0182ba9bb8e0610023eb385
SHA2568a5575810c4bf6865bd3853a92349a3c6b261e351418fe24ef8d03f1defd27cf
SHA5121ceabfd6177d03d6751f1c1fbce8e263637e88d6f45504aa7a8bd99161d752f6413e2bcce8145dfcd8a5c1334def504cf09ca8fc19d728c761bfbf97c80aba5f
-
Filesize
399KB
MD58394b813be89a7225621761f31152227
SHA14f3f7ac90aa0ccea2b1d2ae9226b4cdd48ea20b3
SHA256f9052010fbead3601323287739f36e103c47dcea6a1dbc732ff3664aa009a4d2
SHA5123a018c30234f8d9534124fed3524c7b4b531e159e43a20a9f4d816e79600a5653d1d88a837299790408fddc92a8d22616f21792ccabf508dd6732c06afc83a5d
-
Filesize
399KB
MD58394b813be89a7225621761f31152227
SHA14f3f7ac90aa0ccea2b1d2ae9226b4cdd48ea20b3
SHA256f9052010fbead3601323287739f36e103c47dcea6a1dbc732ff3664aa009a4d2
SHA5123a018c30234f8d9534124fed3524c7b4b531e159e43a20a9f4d816e79600a5653d1d88a837299790408fddc92a8d22616f21792ccabf508dd6732c06afc83a5d
-
Filesize
360KB
MD59d64d1256520224ba125baec1089cc74
SHA1c6110564ad826b502ad063aa67237c452980d3d6
SHA256e9939162f1d70a35c9cbde6cf000d830b5722b1d064d5ef4efa999fd971b8567
SHA512d7c85cdb5ae6ddf2f734121894dd2cdad641da5e2b68fd0180b9a710d06838e2515c5626b245e5cfc890c4605b354e259fb8a52fbb718c0f5dbee8dd0a0e5ce3
-
Filesize
360KB
MD59d64d1256520224ba125baec1089cc74
SHA1c6110564ad826b502ad063aa67237c452980d3d6
SHA256e9939162f1d70a35c9cbde6cf000d830b5722b1d064d5ef4efa999fd971b8567
SHA512d7c85cdb5ae6ddf2f734121894dd2cdad641da5e2b68fd0180b9a710d06838e2515c5626b245e5cfc890c4605b354e259fb8a52fbb718c0f5dbee8dd0a0e5ce3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5026d84beaf4966c0b1b4e66bcaf3467c
SHA187cff0c0a72c40436730babd36b36ddcca4b170b
SHA256ab6a20d7f3b2ed677b823643f6e5f473be6415ffeb9d107b8e2ae2aa5d400637
SHA512ddf35d85544f2c773af11af99e47d110d55a58e97049992dd6becbb71ac956e89108a472ddff4cda590a583951d5ef637fb346f47d78cd0aa90c0f1eb7dfbdde
-
Filesize
342KB
MD5026d84beaf4966c0b1b4e66bcaf3467c
SHA187cff0c0a72c40436730babd36b36ddcca4b170b
SHA256ab6a20d7f3b2ed677b823643f6e5f473be6415ffeb9d107b8e2ae2aa5d400637
SHA512ddf35d85544f2c773af11af99e47d110d55a58e97049992dd6becbb71ac956e89108a472ddff4cda590a583951d5ef637fb346f47d78cd0aa90c0f1eb7dfbdde