Analysis
-
max time kernel
92s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 00:14
Static task
static1
Behavioral task
behavioral1
Sample
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe
Resource
win10v2004-20230221-en
General
-
Target
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe
-
Size
895KB
-
MD5
92292ae32d5bc0f563806bebde590945
-
SHA1
6cb0d54c0d1547ccfbf46ca928499a1907963f21
-
SHA256
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85
-
SHA512
69c2120baddda6d3525096ade32937823a498c5a9ad9d8809f77cfd304fa4cf87f3053b2793c4a185263bbdb05d4224470cee6d3a830134df21ed0b2b18d06ab
-
SSDEEP
24576:8ycoXlS0wPCedav90AAY74FmfJWlata8:rcoXlS0URda1774FwWla4
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c34JM32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c34JM32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c34JM32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5461ma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5461ma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5461ma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5461ma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c34JM32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5461ma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5461ma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c34JM32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c34JM32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2408-206-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-208-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-210-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-212-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-214-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-216-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-218-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-220-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-222-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-224-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-228-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-226-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-230-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-232-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-234-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-236-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-238-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/2408-240-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 684 tice8856.exe 1088 tice7775.exe 1696 b5461ma.exe 3964 c34JM32.exe 2408 drjSh73.exe 3880 e86vT91.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5461ma.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c34JM32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c34JM32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice8856.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice7775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice7775.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4256 3964 WerFault.exe 86 332 2408 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1696 b5461ma.exe 1696 b5461ma.exe 3964 c34JM32.exe 3964 c34JM32.exe 2408 drjSh73.exe 2408 drjSh73.exe 3880 e86vT91.exe 3880 e86vT91.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1696 b5461ma.exe Token: SeDebugPrivilege 3964 c34JM32.exe Token: SeDebugPrivilege 2408 drjSh73.exe Token: SeDebugPrivilege 3880 e86vT91.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1704 wrote to memory of 684 1704 c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe 83 PID 1704 wrote to memory of 684 1704 c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe 83 PID 1704 wrote to memory of 684 1704 c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe 83 PID 684 wrote to memory of 1088 684 tice8856.exe 84 PID 684 wrote to memory of 1088 684 tice8856.exe 84 PID 684 wrote to memory of 1088 684 tice8856.exe 84 PID 1088 wrote to memory of 1696 1088 tice7775.exe 85 PID 1088 wrote to memory of 1696 1088 tice7775.exe 85 PID 1088 wrote to memory of 3964 1088 tice7775.exe 86 PID 1088 wrote to memory of 3964 1088 tice7775.exe 86 PID 1088 wrote to memory of 3964 1088 tice7775.exe 86 PID 684 wrote to memory of 2408 684 tice8856.exe 90 PID 684 wrote to memory of 2408 684 tice8856.exe 90 PID 684 wrote to memory of 2408 684 tice8856.exe 90 PID 1704 wrote to memory of 3880 1704 c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe 101 PID 1704 wrote to memory of 3880 1704 c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe 101 PID 1704 wrote to memory of 3880 1704 c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe"C:\Users\Admin\AppData\Local\Temp\c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8856.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8856.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice7775.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5461ma.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5461ma.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c34JM32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c34JM32.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 10805⤵
- Program crash
PID:4256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drjSh73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drjSh73.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 13244⤵
- Program crash
PID:332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e86vT91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e86vT91.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3964 -ip 39641⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2408 -ip 24081⤵PID:2112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
750KB
MD51901769a47dcf2bf8bcd993395c5533a
SHA196e75919ab7edfb72c3c7a03074bb0a176574619
SHA2569d4ac41c2b7e338fe462659d517ad39455ecdaa112b5caa9e83e1a1d4d56bca1
SHA5129a907bd0ec2c795b73474ad4ba186f306931f3b0930c6f23053086b1722e585c54be0d059695ec1f85e6c2a7f4a6c72c8ece2871a84b1611f767b712f1c2e5ac
-
Filesize
750KB
MD51901769a47dcf2bf8bcd993395c5533a
SHA196e75919ab7edfb72c3c7a03074bb0a176574619
SHA2569d4ac41c2b7e338fe462659d517ad39455ecdaa112b5caa9e83e1a1d4d56bca1
SHA5129a907bd0ec2c795b73474ad4ba186f306931f3b0930c6f23053086b1722e585c54be0d059695ec1f85e6c2a7f4a6c72c8ece2871a84b1611f767b712f1c2e5ac
-
Filesize
446KB
MD527ca2e288f5c5cc4dde5e2ce72390a58
SHA18d74401b74b0dc572a5bc260a7f9e53f816a9cfc
SHA256ca9e92aac415536aa81075dd0d76155a4631d736a51816f94b97f916eaf6c11e
SHA512d59f533240f9bf3e5f2b501e9e3426d9b7b3d85f6594f9b77bda3fd1c4332e300ccaf424aeffe47eaf311e34e2500acbbb80648145e3d253ddc0ca9ba9610a2c
-
Filesize
446KB
MD527ca2e288f5c5cc4dde5e2ce72390a58
SHA18d74401b74b0dc572a5bc260a7f9e53f816a9cfc
SHA256ca9e92aac415536aa81075dd0d76155a4631d736a51816f94b97f916eaf6c11e
SHA512d59f533240f9bf3e5f2b501e9e3426d9b7b3d85f6594f9b77bda3fd1c4332e300ccaf424aeffe47eaf311e34e2500acbbb80648145e3d253ddc0ca9ba9610a2c
-
Filesize
375KB
MD527c31b2961a5a2c8ea95f12219a8f78d
SHA14bc9ebaf2a2cedad046fa157ba06bdb6924a19e9
SHA256a24cb0f18b9d08014720511f617fda4b52ec4ee656461ee8c4a729424ae73406
SHA512851f3bf89d2cbf3834a93125ce9133e626c67a28263d8e325a4e6983abd5c8e54a0874db3dd1401ffada42445f74e2da6c3941097e037d25b0fc69ae5ca35591
-
Filesize
375KB
MD527c31b2961a5a2c8ea95f12219a8f78d
SHA14bc9ebaf2a2cedad046fa157ba06bdb6924a19e9
SHA256a24cb0f18b9d08014720511f617fda4b52ec4ee656461ee8c4a729424ae73406
SHA512851f3bf89d2cbf3834a93125ce9133e626c67a28263d8e325a4e6983abd5c8e54a0874db3dd1401ffada42445f74e2da6c3941097e037d25b0fc69ae5ca35591
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
388KB
MD5acd39e3709d007c04a46ae319b2d483e
SHA141b8653c72ff0dea2bbfdd3d506b00aeccff4334
SHA256d53c52a95cb7064a06bd55d8cbe635b5505169445c80b480cd8efb996c05be72
SHA512ded9ec6b7f57eaa47cca3ca98fc3ce8ec0e8dcd1ecf3f90f549d0eeb9117694e6746651c146b3f9e5ac984aad42e9a89fb4ad2ce75f14fad32f1c25a75aa7976
-
Filesize
388KB
MD5acd39e3709d007c04a46ae319b2d483e
SHA141b8653c72ff0dea2bbfdd3d506b00aeccff4334
SHA256d53c52a95cb7064a06bd55d8cbe635b5505169445c80b480cd8efb996c05be72
SHA512ded9ec6b7f57eaa47cca3ca98fc3ce8ec0e8dcd1ecf3f90f549d0eeb9117694e6746651c146b3f9e5ac984aad42e9a89fb4ad2ce75f14fad32f1c25a75aa7976