Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe
Resource
win10v2004-20230220-en
General
-
Target
f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe
-
Size
792KB
-
MD5
3c0f14e341dde8ff6e3a8f27efb5e65d
-
SHA1
7f80dd50cc7edc45f490cc775a2cf0df6d1afe24
-
SHA256
f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5
-
SHA512
c7c0d15dd759ef78cb007fbcd835ea986cf66ce862adab01f0981655d0412b26aa05708e6dca12006e6b24b44376a90f76a41beacd4d6ca9130615a651ac97ce
-
SSDEEP
24576:0yqjCpA/gZllx2QKfZyAsZExJwUAI85H:DqjCpA/Illx7UJ9AI8
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9615cV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9615cV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9615cV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9615cV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c01Ou24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c01Ou24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c01Ou24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9615cV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9615cV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c01Ou24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c01Ou24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c01Ou24.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4616-203-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-204-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-206-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-208-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-210-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-212-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-214-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-216-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-218-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-220-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-222-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-224-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-226-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-228-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-230-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-232-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-234-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-236-0x0000000002560000-0x000000000259E000-memory.dmp family_redline behavioral1/memory/4616-1123-0x0000000002300000-0x0000000002310000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3460 tice6458.exe 2280 tice5539.exe 1672 b9615cV.exe 5056 c01Ou24.exe 4616 dCzQv20.exe 4284 e78Kx03.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c01Ou24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9615cV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c01Ou24.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice5539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice5539.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice6458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice6458.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 964 5056 WerFault.exe 92 4832 4616 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1672 b9615cV.exe 1672 b9615cV.exe 5056 c01Ou24.exe 5056 c01Ou24.exe 4616 dCzQv20.exe 4616 dCzQv20.exe 4284 e78Kx03.exe 4284 e78Kx03.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1672 b9615cV.exe Token: SeDebugPrivilege 5056 c01Ou24.exe Token: SeDebugPrivilege 4616 dCzQv20.exe Token: SeDebugPrivilege 4284 e78Kx03.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3460 4120 f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe 85 PID 4120 wrote to memory of 3460 4120 f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe 85 PID 4120 wrote to memory of 3460 4120 f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe 85 PID 3460 wrote to memory of 2280 3460 tice6458.exe 86 PID 3460 wrote to memory of 2280 3460 tice6458.exe 86 PID 3460 wrote to memory of 2280 3460 tice6458.exe 86 PID 2280 wrote to memory of 1672 2280 tice5539.exe 87 PID 2280 wrote to memory of 1672 2280 tice5539.exe 87 PID 2280 wrote to memory of 5056 2280 tice5539.exe 92 PID 2280 wrote to memory of 5056 2280 tice5539.exe 92 PID 2280 wrote to memory of 5056 2280 tice5539.exe 92 PID 3460 wrote to memory of 4616 3460 tice6458.exe 100 PID 3460 wrote to memory of 4616 3460 tice6458.exe 100 PID 3460 wrote to memory of 4616 3460 tice6458.exe 100 PID 4120 wrote to memory of 4284 4120 f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe 103 PID 4120 wrote to memory of 4284 4120 f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe 103 PID 4120 wrote to memory of 4284 4120 f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe"C:\Users\Admin\AppData\Local\Temp\f9d1c64f83de5882f86c17e82759b2a2ec2d22b5d2856df0ff2ec10a55cf98e5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6458.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5539.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9615cV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9615cV.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c01Ou24.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c01Ou24.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10805⤵
- Program crash
PID:964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCzQv20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCzQv20.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 13484⤵
- Program crash
PID:4832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e78Kx03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e78Kx03.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 5056 -ip 50561⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4616 -ip 46161⤵PID:1512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
648KB
MD5fcf0b955503d453a6e73dc65bff53360
SHA1ab94c7241b61aa96eb785a7d98c1cf92451f9fd3
SHA256fe724300a57db11a987efe797a97277c8a2ce9d2d5cbda10cf7926fee68c3c3d
SHA512e1b264d3da15826f500314380e7745508715862d2e8d07872d6383543222dc935c2817ab22c0a6cb1622c7eb73c6f821e2d9623297f1a07a6bb5ca6941ce461d
-
Filesize
648KB
MD5fcf0b955503d453a6e73dc65bff53360
SHA1ab94c7241b61aa96eb785a7d98c1cf92451f9fd3
SHA256fe724300a57db11a987efe797a97277c8a2ce9d2d5cbda10cf7926fee68c3c3d
SHA512e1b264d3da15826f500314380e7745508715862d2e8d07872d6383543222dc935c2817ab22c0a6cb1622c7eb73c6f821e2d9623297f1a07a6bb5ca6941ce461d
-
Filesize
284KB
MD57d5f9293157ea7bbca72adac20e51218
SHA1bebeee830b086e3b49e5058ade12bd02e7a77cc5
SHA25676eca17da27740118f296117f6d26afdd93bf0bcbdca9bc3da3374061ebf31fd
SHA5127361db1cc4fd335cded5a513870c6ceed32a9523aece438cd2015a1ba247de96178d1a5ba0735d80aeadb0e119ad7361d86aa835df06fdcba5cf5c44c774909e
-
Filesize
284KB
MD57d5f9293157ea7bbca72adac20e51218
SHA1bebeee830b086e3b49e5058ade12bd02e7a77cc5
SHA25676eca17da27740118f296117f6d26afdd93bf0bcbdca9bc3da3374061ebf31fd
SHA5127361db1cc4fd335cded5a513870c6ceed32a9523aece438cd2015a1ba247de96178d1a5ba0735d80aeadb0e119ad7361d86aa835df06fdcba5cf5c44c774909e
-
Filesize
324KB
MD574e0c6a5b6c90e165676af8d98d14809
SHA167239565db728bebaa9ad04eb458ba917750c349
SHA256fa3b6f6c2fd8a0346835b7f7393de7bd7113a514ad52d8d2e9563d6969b6f892
SHA5125f03cac072117ac4d8e717ca883f23287b2db780a6daf94f393c552fb281a60c69edd3936cb86c40c15af140cb999e1fb7ed7d21d84b4e29d75fcb52936c27f2
-
Filesize
324KB
MD574e0c6a5b6c90e165676af8d98d14809
SHA167239565db728bebaa9ad04eb458ba917750c349
SHA256fa3b6f6c2fd8a0346835b7f7393de7bd7113a514ad52d8d2e9563d6969b6f892
SHA5125f03cac072117ac4d8e717ca883f23287b2db780a6daf94f393c552fb281a60c69edd3936cb86c40c15af140cb999e1fb7ed7d21d84b4e29d75fcb52936c27f2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD546b21403ddf5af62dd97e1e3639ed07a
SHA11b96cc77db3d98bcb4a399e419152275c7c48a17
SHA256ad7e45db62bcfffbd5597a03cea6968c763746ab707bde7ea87e7a7c3ad6f707
SHA512397408b2b9129fc8730d717028850c72845431539126210eee6b20a677a2dd8e75b2fd2f4ba2854c01551f090b9babf025d1c9701554fcabf5bebf7aaa91090f
-
Filesize
226KB
MD546b21403ddf5af62dd97e1e3639ed07a
SHA11b96cc77db3d98bcb4a399e419152275c7c48a17
SHA256ad7e45db62bcfffbd5597a03cea6968c763746ab707bde7ea87e7a7c3ad6f707
SHA512397408b2b9129fc8730d717028850c72845431539126210eee6b20a677a2dd8e75b2fd2f4ba2854c01551f090b9babf025d1c9701554fcabf5bebf7aaa91090f