Analysis
-
max time kernel
143s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe
Resource
win10v2004-20230220-en
General
-
Target
f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe
-
Size
794KB
-
MD5
c5dfc2878fe3de48d25ca2e4b4be198b
-
SHA1
90e1864ba1a4f1ff46c5e87f33edeef5132a2972
-
SHA256
f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473
-
SHA512
f0fa09245ae10a60a8749ad75913996c8b0630ebe4adfb11fa229d1113cc5914c44a3c46419ee05dd66367b3996035cf42f531840d0153bc98f659b78c9c1983
-
SSDEEP
12288:8MrWy90krvSNs8qi/GQbTbDko0mHkPzLDu9xgXY3vKng87/sNrYkB25bf1K:6ylr6q8P/GQkorkPzPu8XYCZLs5Z2RU
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c66yK80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c66yK80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3282od.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3282od.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3282od.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c66yK80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c66yK80.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3282od.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3282od.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3282od.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c66yK80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c66yK80.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2784-203-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-204-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-206-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-208-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-210-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-212-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-214-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-216-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-218-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-220-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-222-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-224-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-226-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-228-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-230-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-232-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-234-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-236-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/2784-1124-0x0000000004D60000-0x0000000004D70000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1888 tice3947.exe 5020 tice8138.exe 4248 b3282od.exe 4100 c66yK80.exe 2784 dIzVS95.exe 1536 e66qV70.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c66yK80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3282od.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c66yK80.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8138.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3947.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3947.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8138.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4916 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2536 4100 WerFault.exe 92 3352 2784 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4248 b3282od.exe 4248 b3282od.exe 4100 c66yK80.exe 4100 c66yK80.exe 2784 dIzVS95.exe 2784 dIzVS95.exe 1536 e66qV70.exe 1536 e66qV70.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4248 b3282od.exe Token: SeDebugPrivilege 4100 c66yK80.exe Token: SeDebugPrivilege 2784 dIzVS95.exe Token: SeDebugPrivilege 1536 e66qV70.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1888 1256 f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe 84 PID 1256 wrote to memory of 1888 1256 f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe 84 PID 1256 wrote to memory of 1888 1256 f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe 84 PID 1888 wrote to memory of 5020 1888 tice3947.exe 85 PID 1888 wrote to memory of 5020 1888 tice3947.exe 85 PID 1888 wrote to memory of 5020 1888 tice3947.exe 85 PID 5020 wrote to memory of 4248 5020 tice8138.exe 86 PID 5020 wrote to memory of 4248 5020 tice8138.exe 86 PID 5020 wrote to memory of 4100 5020 tice8138.exe 92 PID 5020 wrote to memory of 4100 5020 tice8138.exe 92 PID 5020 wrote to memory of 4100 5020 tice8138.exe 92 PID 1888 wrote to memory of 2784 1888 tice3947.exe 95 PID 1888 wrote to memory of 2784 1888 tice3947.exe 95 PID 1888 wrote to memory of 2784 1888 tice3947.exe 95 PID 1256 wrote to memory of 1536 1256 f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe 103 PID 1256 wrote to memory of 1536 1256 f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe 103 PID 1256 wrote to memory of 1536 1256 f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe"C:\Users\Admin\AppData\Local\Temp\f573f2a4f944d2d2c377f80e2b672e94527ef9b3fb973af37b6b84ef4c1d1473.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3947.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8138.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3282od.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3282od.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c66yK80.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c66yK80.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 10805⤵
- Program crash
PID:2536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIzVS95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIzVS95.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 13484⤵
- Program crash
PID:3352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e66qV70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e66qV70.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4100 -ip 41001⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2784 -ip 27841⤵PID:4584
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
649KB
MD53408850cfdae8fe78a738ffc997e55af
SHA15de9cfd417c1b1c773fba87d8de84592176cfa6e
SHA256cfd1d2a12b7be4f7654cf4a16b7fa240b2110bd5294903ef2e0056b875465de2
SHA5123196a798093b7fec6b60cec6b7914e3ac0d35837164c91063af0361f4e3875276e8b75f0835bbd6e326ef319a0e2f1b2152aa7dc4a4970d7ef7d4e3cfcd527a1
-
Filesize
649KB
MD53408850cfdae8fe78a738ffc997e55af
SHA15de9cfd417c1b1c773fba87d8de84592176cfa6e
SHA256cfd1d2a12b7be4f7654cf4a16b7fa240b2110bd5294903ef2e0056b875465de2
SHA5123196a798093b7fec6b60cec6b7914e3ac0d35837164c91063af0361f4e3875276e8b75f0835bbd6e326ef319a0e2f1b2152aa7dc4a4970d7ef7d4e3cfcd527a1
-
Filesize
284KB
MD50ae0ab5aa838cc32f1345b4e23710aec
SHA17fcd79cf17ee88e4a5e3a387b4a1aa34645e60c0
SHA256a7490f1cc32c633da03b846f721b29f4096a89667342758298e5f5db59eadc23
SHA51284e71511eac0292e695ab0b4c0271349496b8e8dd0d9b02feb4a5c2985b617011c85ad2edc200f7ad102f16f9da761974847104ba3909381c54c5c0cc7bf3531
-
Filesize
284KB
MD50ae0ab5aa838cc32f1345b4e23710aec
SHA17fcd79cf17ee88e4a5e3a387b4a1aa34645e60c0
SHA256a7490f1cc32c633da03b846f721b29f4096a89667342758298e5f5db59eadc23
SHA51284e71511eac0292e695ab0b4c0271349496b8e8dd0d9b02feb4a5c2985b617011c85ad2edc200f7ad102f16f9da761974847104ba3909381c54c5c0cc7bf3531
-
Filesize
324KB
MD512a041db0da6790f6d697031f4a7f043
SHA1647e4ef25b3e1b895772d9c0299369fc7ffecdcf
SHA25688d2ecd5bcefd13fe43c4abf660f36b908cb501d7fa1d897f85dfdb1689a76ec
SHA512839b8a497661f8fdac58eed8ac4d32f630f6209f59f23eac783bcc757f5763e5baa8f10cb8c4628ab0608d87bbfb3b2f9534b477e52ee23437c7d95863b4d1c1
-
Filesize
324KB
MD512a041db0da6790f6d697031f4a7f043
SHA1647e4ef25b3e1b895772d9c0299369fc7ffecdcf
SHA25688d2ecd5bcefd13fe43c4abf660f36b908cb501d7fa1d897f85dfdb1689a76ec
SHA512839b8a497661f8fdac58eed8ac4d32f630f6209f59f23eac783bcc757f5763e5baa8f10cb8c4628ab0608d87bbfb3b2f9534b477e52ee23437c7d95863b4d1c1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD51aec0a362a69249469e6bc8c846334a8
SHA148b91ee15fb0373f35894aafaae046f51f22ae37
SHA2567c39f5b54734fcb6f8b36411217d1757aebb7b4fb4934ea6752488d1241d2da3
SHA5125994f0664922fbdf154cdf1c324ac96db58afda97884578550124868ae2bf92a068f73ec6280c7931b06163b37f125abeb157b47f2ab86556b731d713cb37f1f
-
Filesize
226KB
MD51aec0a362a69249469e6bc8c846334a8
SHA148b91ee15fb0373f35894aafaae046f51f22ae37
SHA2567c39f5b54734fcb6f8b36411217d1757aebb7b4fb4934ea6752488d1241d2da3
SHA5125994f0664922fbdf154cdf1c324ac96db58afda97884578550124868ae2bf92a068f73ec6280c7931b06163b37f125abeb157b47f2ab86556b731d713cb37f1f