Analysis

  • max time kernel
    71s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/03/2023, 22:27

General

  • Target

    8d1bbb255a7f7922d9d43e841f399babb2780f6b9bd835b5486b6c0b63298516.exe

  • Size

    569KB

  • MD5

    d78601918e0f3bceb6dcc681398ec733

  • SHA1

    8d2cfa1f8551e2fb4eb120795e5abef014747681

  • SHA256

    8d1bbb255a7f7922d9d43e841f399babb2780f6b9bd835b5486b6c0b63298516

  • SHA512

    73e03373dd3835984757e05c127f1eb4f8f54af6c8ab588d38cc71a32e4ebe8121b3d32bb92eda9ccb6a8edea27dfd219cc6593d24b94f8af84ac7aeac6b5471

  • SSDEEP

    12288:AMrcy90Cahimz7AuxqVrhAfM7hjpKewASe4Ts3K:MybsVAuxY1T738pj

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d1bbb255a7f7922d9d43e841f399babb2780f6b9bd835b5486b6c0b63298516.exe
    "C:\Users\Admin\AppData\Local\Temp\8d1bbb255a7f7922d9d43e841f399babb2780f6b9bd835b5486b6c0b63298516.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7578EN.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7578EN.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w12Nt43.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w12Nt43.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7578EN.exe

    Filesize

    322KB

    MD5

    8141937b23cd1895e561d8e90fdeeff3

    SHA1

    6f810e9e480564f5837461f8ccdd07c951a1bece

    SHA256

    ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

    SHA512

    40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7578EN.exe

    Filesize

    322KB

    MD5

    8141937b23cd1895e561d8e90fdeeff3

    SHA1

    6f810e9e480564f5837461f8ccdd07c951a1bece

    SHA256

    ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

    SHA512

    40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w12Nt43.exe

    Filesize

    307KB

    MD5

    70031313e5c5d19e8a0a5b2129a0349c

    SHA1

    9ec5c0765581fc7b7c0b5546302566f39cc9b4a2

    SHA256

    11fabd86822c10caf14f9e189d3071ea1355dd996e437eac8eef01a0e419302c

    SHA512

    3d70c382b30ab570c76ee0ccc1a6fbbaf17ab4bd3985d0d7a2eb674f782dfa720698b08d22c0ce115de9c178d3327460a1701e1894cae69ed21dc66da52d9b2a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w12Nt43.exe

    Filesize

    307KB

    MD5

    70031313e5c5d19e8a0a5b2129a0349c

    SHA1

    9ec5c0765581fc7b7c0b5546302566f39cc9b4a2

    SHA256

    11fabd86822c10caf14f9e189d3071ea1355dd996e437eac8eef01a0e419302c

    SHA512

    3d70c382b30ab570c76ee0ccc1a6fbbaf17ab4bd3985d0d7a2eb674f782dfa720698b08d22c0ce115de9c178d3327460a1701e1894cae69ed21dc66da52d9b2a

  • memory/3652-127-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3652-128-0x00000000007E0000-0x00000000007FA000-memory.dmp

    Filesize

    104KB

  • memory/3652-129-0x0000000004DF0000-0x00000000052EE000-memory.dmp

    Filesize

    5.0MB

  • memory/3652-130-0x00000000022B0000-0x00000000022C8000-memory.dmp

    Filesize

    96KB

  • memory/3652-131-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-132-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-134-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-136-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-140-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-138-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-142-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-144-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-146-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-148-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-150-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-152-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-154-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-156-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-158-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3652-159-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3652-160-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3652-161-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3652-162-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/3652-164-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/4304-169-0x0000000002110000-0x0000000002156000-memory.dmp

    Filesize

    280KB

  • memory/4304-170-0x0000000004F40000-0x0000000004F84000-memory.dmp

    Filesize

    272KB

  • memory/4304-171-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-172-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-174-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-176-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-178-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-180-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-182-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-184-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-186-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-188-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-190-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-192-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-194-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-196-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-198-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-200-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-202-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-205-0x0000000001FE0000-0x000000000202B000-memory.dmp

    Filesize

    300KB

  • memory/4304-204-0x0000000004F40000-0x0000000004F7E000-memory.dmp

    Filesize

    248KB

  • memory/4304-207-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-209-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-212-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-1081-0x0000000005590000-0x0000000005B96000-memory.dmp

    Filesize

    6.0MB

  • memory/4304-1082-0x0000000005000000-0x000000000510A000-memory.dmp

    Filesize

    1.0MB

  • memory/4304-1083-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4304-1084-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-1085-0x0000000005160000-0x000000000519E000-memory.dmp

    Filesize

    248KB

  • memory/4304-1086-0x00000000052B0000-0x00000000052FB000-memory.dmp

    Filesize

    300KB

  • memory/4304-1087-0x0000000005440000-0x00000000054A6000-memory.dmp

    Filesize

    408KB

  • memory/4304-1088-0x0000000006140000-0x00000000061D2000-memory.dmp

    Filesize

    584KB

  • memory/4304-1089-0x00000000061E0000-0x0000000006256000-memory.dmp

    Filesize

    472KB

  • memory/4304-1090-0x0000000006260000-0x00000000062B0000-memory.dmp

    Filesize

    320KB

  • memory/4304-1092-0x00000000062F0000-0x00000000064B2000-memory.dmp

    Filesize

    1.8MB

  • memory/4304-1093-0x00000000064C0000-0x00000000069EC000-memory.dmp

    Filesize

    5.2MB

  • memory/4304-1094-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-1096-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-1095-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/4304-1097-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB