Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2023, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe
Resource
win10v2004-20230220-en
General
-
Target
4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe
-
Size
792KB
-
MD5
db6c32be549378b8e0c931b6b1de3f1a
-
SHA1
1dd9ba11211e51660a3011acb1ffe5e1719fa0ba
-
SHA256
4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059
-
SHA512
d0ed91c750f1dc39858b37ce4ec533df447783cfbac943827cbeb7722342332a4fec64695874393fb8072dbf4550f94a2813b259b66a6f963592a0b5915accea
-
SSDEEP
12288:CMrYy90pcQXoaV6xND44z5sbUcppWzaQ0QyItUvZdoInI7b2eGXhPqDXh3wKYPv1:iy8V6b2UIpS0jIozoII7b2eMMaTkUr
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c57Ip50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c57Ip50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c57Ip50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c57Ip50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b4438Hk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4438Hk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4438Hk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c57Ip50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4438Hk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4438Hk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4438Hk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c57Ip50.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4928-202-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-203-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-205-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-207-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-211-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-209-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-213-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-215-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-217-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-219-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-221-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-223-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-229-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-227-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-225-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-231-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-233-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-235-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/4928-448-0x0000000004B10000-0x0000000004B20000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1000 tice1051.exe 3988 tice4157.exe 4748 b4438Hk.exe 4320 c57Ip50.exe 4928 dMKer74.exe 224 e59RG64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c57Ip50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c57Ip50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4438Hk.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice1051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1051.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4157.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4157.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2012 4320 WerFault.exe 89 3280 4928 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4748 b4438Hk.exe 4748 b4438Hk.exe 4320 c57Ip50.exe 4320 c57Ip50.exe 4928 dMKer74.exe 4928 dMKer74.exe 224 e59RG64.exe 224 e59RG64.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4748 b4438Hk.exe Token: SeDebugPrivilege 4320 c57Ip50.exe Token: SeDebugPrivilege 4928 dMKer74.exe Token: SeDebugPrivilege 224 e59RG64.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1000 5036 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe 86 PID 5036 wrote to memory of 1000 5036 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe 86 PID 5036 wrote to memory of 1000 5036 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe 86 PID 1000 wrote to memory of 3988 1000 tice1051.exe 87 PID 1000 wrote to memory of 3988 1000 tice1051.exe 87 PID 1000 wrote to memory of 3988 1000 tice1051.exe 87 PID 3988 wrote to memory of 4748 3988 tice4157.exe 88 PID 3988 wrote to memory of 4748 3988 tice4157.exe 88 PID 3988 wrote to memory of 4320 3988 tice4157.exe 89 PID 3988 wrote to memory of 4320 3988 tice4157.exe 89 PID 3988 wrote to memory of 4320 3988 tice4157.exe 89 PID 1000 wrote to memory of 4928 1000 tice1051.exe 92 PID 1000 wrote to memory of 4928 1000 tice1051.exe 92 PID 1000 wrote to memory of 4928 1000 tice1051.exe 92 PID 5036 wrote to memory of 224 5036 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe 97 PID 5036 wrote to memory of 224 5036 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe 97 PID 5036 wrote to memory of 224 5036 4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe"C:\Users\Admin\AppData\Local\Temp\4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4157.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4438Hk.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4438Hk.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c57Ip50.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c57Ip50.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 10805⤵
- Program crash
PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMKer74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMKer74.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 13484⤵
- Program crash
PID:3280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e59RG64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e59RG64.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4320 -ip 43201⤵PID:848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4928 -ip 49281⤵PID:2360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
647KB
MD508453d87463d3a7b636875b5ce575520
SHA1fb3e3eb865e78b7403de238a3e9e80a2d54aac53
SHA2562e89aee93de3eaa132044b95dcdc30d2bd19e30cbbe492e222293e4b00872082
SHA5122506a5b257ca579a52da00b91a4b593191b0e08161d58f75c0d1dcc8cbc1bf5a2bf52f0a6afb0d854c4af005286d01374ff306b5c680ed7a0ce03da802bcbdd0
-
Filesize
647KB
MD508453d87463d3a7b636875b5ce575520
SHA1fb3e3eb865e78b7403de238a3e9e80a2d54aac53
SHA2562e89aee93de3eaa132044b95dcdc30d2bd19e30cbbe492e222293e4b00872082
SHA5122506a5b257ca579a52da00b91a4b593191b0e08161d58f75c0d1dcc8cbc1bf5a2bf52f0a6afb0d854c4af005286d01374ff306b5c680ed7a0ce03da802bcbdd0
-
Filesize
283KB
MD540096b79ad1e14c98984951f525a553f
SHA1389899a50afead50353c685112031a59571634e9
SHA2566c60f2349984f569705fad7cdb7905f2c6edb2d927ef75b50d9e7e6783086811
SHA51235f7b2d3e18bff8e9492c8928f084145aa2eac331b57fbfb3c3026e2c2284b82af99de35d65b3721215648bf0ffce955b64e5cf7245c1ada2923bf07f277f05e
-
Filesize
283KB
MD540096b79ad1e14c98984951f525a553f
SHA1389899a50afead50353c685112031a59571634e9
SHA2566c60f2349984f569705fad7cdb7905f2c6edb2d927ef75b50d9e7e6783086811
SHA51235f7b2d3e18bff8e9492c8928f084145aa2eac331b57fbfb3c3026e2c2284b82af99de35d65b3721215648bf0ffce955b64e5cf7245c1ada2923bf07f277f05e
-
Filesize
324KB
MD5e0d9a619b307310f02608ec99aa52c16
SHA1edddff60b3030fd792f6e2714a862446107e1045
SHA256c170acf7216d5e2226f412ad95c160ef79925c139f963ddd03769ad67b1ca66a
SHA512a89eb2b731f81b8ab4fb730da091bcba2115a6e6946860f9f34af045f6e783fec9e2711f62610bba0005962af35241b5530de8dfcfc4c9a65c171472a7346e7b
-
Filesize
324KB
MD5e0d9a619b307310f02608ec99aa52c16
SHA1edddff60b3030fd792f6e2714a862446107e1045
SHA256c170acf7216d5e2226f412ad95c160ef79925c139f963ddd03769ad67b1ca66a
SHA512a89eb2b731f81b8ab4fb730da091bcba2115a6e6946860f9f34af045f6e783fec9e2711f62610bba0005962af35241b5530de8dfcfc4c9a65c171472a7346e7b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD51a8915343282d3b407dc11e70d62d4be
SHA1669bfe62b4318910d7cbc8a3a7fdbd1576e6b847
SHA2563ca19fe19ca56c5cd2f236b489b478db15a8379c4df4250b19958c1cac8aa5cd
SHA5129d68ab8f4534090bc2cf3f4cd7d12f8b5766cdab3b1dbaea979d986738372c7549476ddfebeab4e349bbe782f966fecc1998626be2c9e77279bad4fd70001433
-
Filesize
226KB
MD51a8915343282d3b407dc11e70d62d4be
SHA1669bfe62b4318910d7cbc8a3a7fdbd1576e6b847
SHA2563ca19fe19ca56c5cd2f236b489b478db15a8379c4df4250b19958c1cac8aa5cd
SHA5129d68ab8f4534090bc2cf3f4cd7d12f8b5766cdab3b1dbaea979d986738372c7549476ddfebeab4e349bbe782f966fecc1998626be2c9e77279bad4fd70001433