Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 18:59
Static task
static1
Behavioral task
behavioral1
Sample
1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe
Resource
win10v2004-20230220-en
General
-
Target
1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe
-
Size
794KB
-
MD5
504f5c0bbc7fe50a5d9f48f28d4388e3
-
SHA1
bc5013865cfc0fef9a7b536143f4de03437092b8
-
SHA256
1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f
-
SHA512
d413a09d854d244311cf685343d00ef2c67d5d4d55e3aa7a5dfec7d21d8ab0ba0461b211415c8fcb254062920a6fd11a2863a57550c1a43c4ab9fcebf2450900
-
SSDEEP
12288:PMr+y90CB68k0+PE5WGXBbNkIMNPXj9BlP9gYTYRc2lfIb:hypB6vPNJdNPTLlPKCC2b
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9002fn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9002fn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9002fn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c72wd02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c72wd02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c72wd02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c72wd02.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9002fn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9002fn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9002fn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c72wd02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c72wd02.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3768-204-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-203-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-206-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-208-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-210-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-215-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-217-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-219-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-221-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-223-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-225-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-227-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-229-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-231-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-233-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-235-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-237-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/3768-239-0x0000000002740000-0x000000000277E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4316 tice1052.exe 1500 tice3859.exe 1504 b9002fn.exe 2288 c72wd02.exe 3768 dcyoy47.exe 3808 e23TL46.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c72wd02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c72wd02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9002fn.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice1052.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1052.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3859.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3784 2288 WerFault.exe 87 4724 3768 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1504 b9002fn.exe 1504 b9002fn.exe 2288 c72wd02.exe 2288 c72wd02.exe 3768 dcyoy47.exe 3768 dcyoy47.exe 3808 e23TL46.exe 3808 e23TL46.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1504 b9002fn.exe Token: SeDebugPrivilege 2288 c72wd02.exe Token: SeDebugPrivilege 3768 dcyoy47.exe Token: SeDebugPrivilege 3808 e23TL46.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4316 5044 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe 82 PID 5044 wrote to memory of 4316 5044 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe 82 PID 5044 wrote to memory of 4316 5044 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe 82 PID 4316 wrote to memory of 1500 4316 tice1052.exe 83 PID 4316 wrote to memory of 1500 4316 tice1052.exe 83 PID 4316 wrote to memory of 1500 4316 tice1052.exe 83 PID 1500 wrote to memory of 1504 1500 tice3859.exe 84 PID 1500 wrote to memory of 1504 1500 tice3859.exe 84 PID 1500 wrote to memory of 2288 1500 tice3859.exe 87 PID 1500 wrote to memory of 2288 1500 tice3859.exe 87 PID 1500 wrote to memory of 2288 1500 tice3859.exe 87 PID 4316 wrote to memory of 3768 4316 tice1052.exe 91 PID 4316 wrote to memory of 3768 4316 tice1052.exe 91 PID 4316 wrote to memory of 3768 4316 tice1052.exe 91 PID 5044 wrote to memory of 3808 5044 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe 101 PID 5044 wrote to memory of 3808 5044 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe 101 PID 5044 wrote to memory of 3808 5044 1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe"C:\Users\Admin\AppData\Local\Temp\1ede0f7f534e75815faa8e470a43eabe81b39fa54ab03d93f9b5947ef0f8a56f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1052.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1052.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3859.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9002fn.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9002fn.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c72wd02.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c72wd02.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 10845⤵
- Program crash
PID:3784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcyoy47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcyoy47.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 16564⤵
- Program crash
PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e23TL46.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e23TL46.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2288 -ip 22881⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3768 -ip 37681⤵PID:3316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
648KB
MD524e9caca252e9870002ae5559c78806f
SHA19e15c1eeb95d94f044a770c82fd5b490e18ab991
SHA256548f43d71640f3e784ff8b77ea6c2a97a5ca44040440b3499d6f565131bca9ef
SHA5126a20052f33ad6c9e284b159092196f53de7e5481e4aa467dac577beea0b4d2a6c7b44d2574c1ef801f185c42aead69d0a7d1cd355e7c2432cf354db695206f05
-
Filesize
648KB
MD524e9caca252e9870002ae5559c78806f
SHA19e15c1eeb95d94f044a770c82fd5b490e18ab991
SHA256548f43d71640f3e784ff8b77ea6c2a97a5ca44040440b3499d6f565131bca9ef
SHA5126a20052f33ad6c9e284b159092196f53de7e5481e4aa467dac577beea0b4d2a6c7b44d2574c1ef801f185c42aead69d0a7d1cd355e7c2432cf354db695206f05
-
Filesize
284KB
MD595b4e80a6604a693713a5478176b0938
SHA16f0075b205dc2e4a1cb4cb93839a7ac0b3fe8fdb
SHA25666dc64794ee0f7b4a75cda0794147f609ee07f4b8a4c29d3a7120ae00dc85cca
SHA512930ac8b8d0c5b8259b2bf63305da42004d46170e31605e3eac381700af45d484eba41dd6a6ee79a1e3152fffd0024cf8ceccd2e05faee10f0053618bb110a9cb
-
Filesize
284KB
MD595b4e80a6604a693713a5478176b0938
SHA16f0075b205dc2e4a1cb4cb93839a7ac0b3fe8fdb
SHA25666dc64794ee0f7b4a75cda0794147f609ee07f4b8a4c29d3a7120ae00dc85cca
SHA512930ac8b8d0c5b8259b2bf63305da42004d46170e31605e3eac381700af45d484eba41dd6a6ee79a1e3152fffd0024cf8ceccd2e05faee10f0053618bb110a9cb
-
Filesize
324KB
MD59312ca5a56679b67fd87ce89e856a873
SHA1ae81522f5accd3f6892060b3b58f7df1ccb3baed
SHA256c8f5ffcfd9de379ec9d37df23ba53c2ee4dc69792d06a24332abd7d74eae7ffb
SHA512c4051b28de5efe921df7d5d9a587ed0542c3de85b7cde45c0de53a7e9af1031191035756668bb756ea031971e351b35343428a3c0ca3941a0888db1b0d0141c3
-
Filesize
324KB
MD59312ca5a56679b67fd87ce89e856a873
SHA1ae81522f5accd3f6892060b3b58f7df1ccb3baed
SHA256c8f5ffcfd9de379ec9d37df23ba53c2ee4dc69792d06a24332abd7d74eae7ffb
SHA512c4051b28de5efe921df7d5d9a587ed0542c3de85b7cde45c0de53a7e9af1031191035756668bb756ea031971e351b35343428a3c0ca3941a0888db1b0d0141c3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5f485129884530b450099da673f51053b
SHA14d66f8364b569c8bc7cc9b9c8a8e9e17530068ab
SHA256b84ee1f1d202227a0065ed6b713986ebee3dd242d8fa0ff4ab9f5fe1418ef7e1
SHA5128d9fe19fd2b28970b5a115a373866f9501d82bc4017c74fda41e122c8334c7f8238d0c2bdf664b52c67c1789d9957a748bff98d35b8f6d8cd1c0dec854c954f6
-
Filesize
226KB
MD5f485129884530b450099da673f51053b
SHA14d66f8364b569c8bc7cc9b9c8a8e9e17530068ab
SHA256b84ee1f1d202227a0065ed6b713986ebee3dd242d8fa0ff4ab9f5fe1418ef7e1
SHA5128d9fe19fd2b28970b5a115a373866f9501d82bc4017c74fda41e122c8334c7f8238d0c2bdf664b52c67c1789d9957a748bff98d35b8f6d8cd1c0dec854c954f6