Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2023 07:02
Static task
static1
Behavioral task
behavioral1
Sample
25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe
Resource
win10v2004-20230220-en
General
-
Target
25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe
-
Size
1.0MB
-
MD5
f7e469503c0699679d8d960684826bf3
-
SHA1
385d3213b1362cdef07145314571191890e73ed2
-
SHA256
25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a
-
SHA512
0561093e01cbf9844a74cc70e7ff5591a58f7a24dd1726624cab0d048b6b3b85d221bba7edbfd43f9b1fe026266c17fff8c28fce1f8e2ecfa79d748d4d15eeb0
-
SSDEEP
24576:qtpqPLoJS2nPsuAVc2PStfnxdwZNYfrMXoIemTNFB3iLUI46B:tLssPa2InxyLYkoI5NriLUI
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
Processes:
bus6679.execon7032.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" con7032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" con7032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" con7032.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" con7032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus6679.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection con7032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" con7032.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-215-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-216-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-218-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-220-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-222-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-224-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-226-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-228-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-230-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-232-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-234-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-236-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-238-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-240-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-242-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-244-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral2/memory/3776-370-0x00000000027B0000-0x00000000027C0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
kino4461.exekino6268.exekino0354.exebus6679.execon7032.exedtF55s07.exepid process 2920 kino4461.exe 1396 kino6268.exe 2428 kino0354.exe 2164 bus6679.exe 4144 con7032.exe 3776 dtF55s07.exe -
Processes:
bus6679.execon7032.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus6679.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features con7032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" con7032.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kino0354.exe25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exekino4461.exekino6268.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino0354.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino4461.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino4461.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino6268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino6268.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino0354.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2352 4144 WerFault.exe con7032.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bus6679.execon7032.exepid process 2164 bus6679.exe 2164 bus6679.exe 4144 con7032.exe 4144 con7032.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bus6679.execon7032.exedtF55s07.exedescription pid process Token: SeDebugPrivilege 2164 bus6679.exe Token: SeDebugPrivilege 4144 con7032.exe Token: SeDebugPrivilege 3776 dtF55s07.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exekino4461.exekino6268.exekino0354.exedescription pid process target process PID 4928 wrote to memory of 2920 4928 25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe kino4461.exe PID 4928 wrote to memory of 2920 4928 25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe kino4461.exe PID 4928 wrote to memory of 2920 4928 25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe kino4461.exe PID 2920 wrote to memory of 1396 2920 kino4461.exe kino6268.exe PID 2920 wrote to memory of 1396 2920 kino4461.exe kino6268.exe PID 2920 wrote to memory of 1396 2920 kino4461.exe kino6268.exe PID 1396 wrote to memory of 2428 1396 kino6268.exe kino0354.exe PID 1396 wrote to memory of 2428 1396 kino6268.exe kino0354.exe PID 1396 wrote to memory of 2428 1396 kino6268.exe kino0354.exe PID 2428 wrote to memory of 2164 2428 kino0354.exe bus6679.exe PID 2428 wrote to memory of 2164 2428 kino0354.exe bus6679.exe PID 2428 wrote to memory of 4144 2428 kino0354.exe con7032.exe PID 2428 wrote to memory of 4144 2428 kino0354.exe con7032.exe PID 2428 wrote to memory of 4144 2428 kino0354.exe con7032.exe PID 1396 wrote to memory of 3776 1396 kino6268.exe dtF55s07.exe PID 1396 wrote to memory of 3776 1396 kino6268.exe dtF55s07.exe PID 1396 wrote to memory of 3776 1396 kino6268.exe dtF55s07.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe"C:\Users\Admin\AppData\Local\Temp\25d21e4fc131a2fc482ad5257402e435f9679e6037797884e5d1ab13a8890d0a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4461.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino6268.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0354.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0354.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6679.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6679.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con7032.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con7032.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 10966⤵
- Program crash
PID:2352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dtF55s07.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dtF55s07.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4144 -ip 41441⤵PID:3808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD540e17b7882e1b7779e51c063e5f3dcd4
SHA1289cf988bb744b05c62f44dbc7d1ff80de7260a0
SHA256a653981acf8c7fceca9d7d816afed40699b80c3d63b84eda17a1b3209aacab37
SHA51266b777809b49272654bb56b318d536d1be4ecac6825b7042fe0844328196cb9de3002997ec65b8c4ec9f26bde2f7481daa2652799bdc1a5fe4d3594da3a1e3f4
-
Filesize
777KB
MD540e17b7882e1b7779e51c063e5f3dcd4
SHA1289cf988bb744b05c62f44dbc7d1ff80de7260a0
SHA256a653981acf8c7fceca9d7d816afed40699b80c3d63b84eda17a1b3209aacab37
SHA51266b777809b49272654bb56b318d536d1be4ecac6825b7042fe0844328196cb9de3002997ec65b8c4ec9f26bde2f7481daa2652799bdc1a5fe4d3594da3a1e3f4
-
Filesize
635KB
MD5f9f2b7c6e6b2e5c41fa1b2c771558de5
SHA18ab0eeda6e1dff07ac1cb0aaa50caea51120f468
SHA2562af12fac864213e0f75a345c50731f9c8646754aceaf760d0a68d6721ded737e
SHA5120dde26f4dffa08c27e4a91e0799c1ebbb8537a0d2216e3f984e6d9937807425d45deaaac40ce924e57344009b2764737b13be0ef60e97e53cbb324d17cf5731b
-
Filesize
635KB
MD5f9f2b7c6e6b2e5c41fa1b2c771558de5
SHA18ab0eeda6e1dff07ac1cb0aaa50caea51120f468
SHA2562af12fac864213e0f75a345c50731f9c8646754aceaf760d0a68d6721ded737e
SHA5120dde26f4dffa08c27e4a91e0799c1ebbb8537a0d2216e3f984e6d9937807425d45deaaac40ce924e57344009b2764737b13be0ef60e97e53cbb324d17cf5731b
-
Filesize
283KB
MD53ef668543a6f7d73b132474398f33787
SHA141ce59d5e8f49a94725b93ccc1d05b360806385b
SHA256ee7306ade345d7e5bf0fd00778d02875b57cabe7a9e24c9b1769ca08a4c9267d
SHA512c8d09351a08b3ef0caddeab3dfa9e82c93d7d1e478121e564355f27b81a8196d9f1c65fe33622e7bd8660a730bfaff378c36ac096b3053fa0d4c2b3b10d43588
-
Filesize
283KB
MD53ef668543a6f7d73b132474398f33787
SHA141ce59d5e8f49a94725b93ccc1d05b360806385b
SHA256ee7306ade345d7e5bf0fd00778d02875b57cabe7a9e24c9b1769ca08a4c9267d
SHA512c8d09351a08b3ef0caddeab3dfa9e82c93d7d1e478121e564355f27b81a8196d9f1c65fe33622e7bd8660a730bfaff378c36ac096b3053fa0d4c2b3b10d43588
-
Filesize
315KB
MD595577b2b8e1acfae23d1004e64f7de32
SHA1131b16daa12da8ffc55840bb69ef36bd6a1443dc
SHA25617c574a6be3246206ec7a934f2b0cd4e246e54e9dc169a01eb16fcb3ffe78fdb
SHA512b85a3fd091044b71df25e1bf6bb3466faefd3a745b244c2d663e594d3661bd73118855eea18e58fb635553ef5f68cc62d46618be7c83b2ba1df4ec1903106d2b
-
Filesize
315KB
MD595577b2b8e1acfae23d1004e64f7de32
SHA1131b16daa12da8ffc55840bb69ef36bd6a1443dc
SHA25617c574a6be3246206ec7a934f2b0cd4e246e54e9dc169a01eb16fcb3ffe78fdb
SHA512b85a3fd091044b71df25e1bf6bb3466faefd3a745b244c2d663e594d3661bd73118855eea18e58fb635553ef5f68cc62d46618be7c83b2ba1df4ec1903106d2b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD56ec4e46cba5aa76b85ff5e5740c60a7f
SHA161f441e25a2a540f9db394d978541b02f57e8dea
SHA25677fe2d3859e55e6fd759bd7193fc6b8548af991e231beaea30628b7366d3a785
SHA5125fa870fecc863c72ce7b03141d6511d15671a984d7b3d50483576a22c45dce5cd9cfbb2ad8cd31a1df29c5d111af370fb73b2dd282cad82239c42d5bfc078ba1
-
Filesize
226KB
MD56ec4e46cba5aa76b85ff5e5740c60a7f
SHA161f441e25a2a540f9db394d978541b02f57e8dea
SHA25677fe2d3859e55e6fd759bd7193fc6b8548af991e231beaea30628b7366d3a785
SHA5125fa870fecc863c72ce7b03141d6511d15671a984d7b3d50483576a22c45dce5cd9cfbb2ad8cd31a1df29c5d111af370fb73b2dd282cad82239c42d5bfc078ba1