Analysis
-
max time kernel
55s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/03/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe
Resource
win10-20230220-en
General
-
Target
1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe
-
Size
811KB
-
MD5
0101f7fba4cca5940eb98610fcccf8ff
-
SHA1
f8d2d334708a505f3c58182a8d60061a0505cc6f
-
SHA256
1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8
-
SHA512
de07141736e0db901ff521856f8856a3dc4026c6c2b112d6e936759ac9f43178c97553beb474e9db6d462684aab0f99394d013f14ce118085288f45ba997c263
-
SSDEEP
12288:WMrvy90Dut4vbJdPQeDkAF8GZ8ozAnauG8pwSHE/x4yi6KhH8QNVxo7+a4f:Nycut4vjQIk48G8na98pwN/x4kIsdO
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
well
193.233.20.28:4125
-
auth_value
265e7373dd436339d88347c08a10b402
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3118CS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c87Ib37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c87Ib37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c87Ib37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3118CS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3118CS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3118CS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3118CS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c87Ib37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c87Ib37.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral2/memory/4260-192-0x0000000002560000-0x00000000025A6000-memory.dmp family_redline behavioral2/memory/4260-193-0x0000000004B70000-0x0000000004BB4000-memory.dmp family_redline behavioral2/memory/4260-194-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-195-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-197-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-201-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-199-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-203-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-205-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-207-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-209-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-211-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-213-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-215-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-217-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-219-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-221-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-223-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-225-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-227-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral2/memory/4260-294-0x0000000004BC0000-0x0000000004BD0000-memory.dmp family_redline behavioral2/memory/4260-297-0x0000000004BC0000-0x0000000004BD0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3000 nice8835.exe 4044 nice3964.exe 992 b3118CS.exe 4196 c87Ib37.exe 4260 dZAUR95.exe 3236 e20Vf25.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3118CS.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c87Ib37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c87Ib37.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice8835.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice8835.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice3964.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nice3964.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 992 b3118CS.exe 992 b3118CS.exe 4196 c87Ib37.exe 4196 c87Ib37.exe 4260 dZAUR95.exe 4260 dZAUR95.exe 3236 e20Vf25.exe 3236 e20Vf25.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 992 b3118CS.exe Token: SeDebugPrivilege 4196 c87Ib37.exe Token: SeDebugPrivilege 4260 dZAUR95.exe Token: SeDebugPrivilege 3236 e20Vf25.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2448 wrote to memory of 3000 2448 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe 66 PID 2448 wrote to memory of 3000 2448 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe 66 PID 2448 wrote to memory of 3000 2448 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe 66 PID 3000 wrote to memory of 4044 3000 nice8835.exe 67 PID 3000 wrote to memory of 4044 3000 nice8835.exe 67 PID 3000 wrote to memory of 4044 3000 nice8835.exe 67 PID 4044 wrote to memory of 992 4044 nice3964.exe 68 PID 4044 wrote to memory of 992 4044 nice3964.exe 68 PID 4044 wrote to memory of 4196 4044 nice3964.exe 69 PID 4044 wrote to memory of 4196 4044 nice3964.exe 69 PID 4044 wrote to memory of 4196 4044 nice3964.exe 69 PID 3000 wrote to memory of 4260 3000 nice8835.exe 70 PID 3000 wrote to memory of 4260 3000 nice8835.exe 70 PID 3000 wrote to memory of 4260 3000 nice8835.exe 70 PID 2448 wrote to memory of 3236 2448 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe 72 PID 2448 wrote to memory of 3236 2448 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe 72 PID 2448 wrote to memory of 3236 2448 1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe"C:\Users\Admin\AppData\Local\Temp\1b7769882b45f287c1d95c95439f94bfba5c1336ca26379521754faa67805bd8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice8835.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice8835.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice3964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice3964.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3118CS.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3118CS.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c87Ib37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c87Ib37.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dZAUR95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dZAUR95.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e20Vf25.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e20Vf25.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b3cbfcd14491f891be0baef768f2a4da
SHA147be5bb6f31976fad7f904f52a19a177f84e04de
SHA2560c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f
SHA512330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf
-
Filesize
175KB
MD5b3cbfcd14491f891be0baef768f2a4da
SHA147be5bb6f31976fad7f904f52a19a177f84e04de
SHA2560c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f
SHA512330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf
-
Filesize
667KB
MD541a27ef8eada2fe5f57106d9f3bb7aaf
SHA18695095e49188079408b29d8c90efbe74e0bd928
SHA25607b68fe0574bc544fccb85ca2607a552a00281119361088e2521f2e3a2906f18
SHA5129aabf244a5767db29fdb582c1d30c9bb5e7fd29e4acd8954ba2650cf82e406af651b0043694a9acd6994f955b557eb28661067251df557c0325a6af6ee57574f
-
Filesize
667KB
MD541a27ef8eada2fe5f57106d9f3bb7aaf
SHA18695095e49188079408b29d8c90efbe74e0bd928
SHA25607b68fe0574bc544fccb85ca2607a552a00281119361088e2521f2e3a2906f18
SHA5129aabf244a5767db29fdb582c1d30c9bb5e7fd29e4acd8954ba2650cf82e406af651b0043694a9acd6994f955b557eb28661067251df557c0325a6af6ee57574f
-
Filesize
380KB
MD511578680e5cc5eaf77b4a3e8875c5d46
SHA1e05e763ab2ac4baa60f2b8128aec88ffe8e97176
SHA256f2c9ed2fbc38eca160acd888f1d26aaddbd9c87dc4fa00f9ed09091ba4905e5a
SHA512b1e040a27453eca4303e45da8a673f6fc6e4706769b54a10f20dfc21ca5750aef2e926495c6a1475aa7b0e61bbeab67b2e8d5633a3b73017b9887a4fee65b3ca
-
Filesize
380KB
MD511578680e5cc5eaf77b4a3e8875c5d46
SHA1e05e763ab2ac4baa60f2b8128aec88ffe8e97176
SHA256f2c9ed2fbc38eca160acd888f1d26aaddbd9c87dc4fa00f9ed09091ba4905e5a
SHA512b1e040a27453eca4303e45da8a673f6fc6e4706769b54a10f20dfc21ca5750aef2e926495c6a1475aa7b0e61bbeab67b2e8d5633a3b73017b9887a4fee65b3ca
-
Filesize
334KB
MD50c869ef75028b301f6804bd4b34e34f9
SHA1784e5e5f989c4a484905a9b7dc75d80cc5fed662
SHA256ab4ecc022359f4b974a998e15098266bc1bba232a7a17b36e6310c6fe9054235
SHA512240cfd81fe60877f22aaebead2c023955925d29182c77b8b0f0639ffd189111bb857eed1bc4a326b02aaa2079a443c5fdf030ecceccb42dea36e67770f1af02f
-
Filesize
334KB
MD50c869ef75028b301f6804bd4b34e34f9
SHA1784e5e5f989c4a484905a9b7dc75d80cc5fed662
SHA256ab4ecc022359f4b974a998e15098266bc1bba232a7a17b36e6310c6fe9054235
SHA512240cfd81fe60877f22aaebead2c023955925d29182c77b8b0f0639ffd189111bb857eed1bc4a326b02aaa2079a443c5fdf030ecceccb42dea36e67770f1af02f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
322KB
MD566e638dd40c04ae2c1f490d8c04225a4
SHA11247b57d08ed556ca96e63c180d1d2eb1606a930
SHA25632174a7d6723067ad250eeea577bba6d0702d392c53b90d933b30c7689fed9d3
SHA512ffc24d87547d62721f368750a95cf8e3b9a5685698f376ba1d2f9d5f2828538fd25cd2dba4dd3680c4c27b3b76b1cf5a88ab90c9479badd80b7c08b65c035c29
-
Filesize
322KB
MD566e638dd40c04ae2c1f490d8c04225a4
SHA11247b57d08ed556ca96e63c180d1d2eb1606a930
SHA25632174a7d6723067ad250eeea577bba6d0702d392c53b90d933b30c7689fed9d3
SHA512ffc24d87547d62721f368750a95cf8e3b9a5685698f376ba1d2f9d5f2828538fd25cd2dba4dd3680c4c27b3b76b1cf5a88ab90c9479badd80b7c08b65c035c29