Analysis

  • max time kernel
    51s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/03/2023, 03:01

General

  • Target

    d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda.exe

  • Size

    577KB

  • MD5

    2cadd06e6d90e68120b518506dbce8c7

  • SHA1

    197bea7c66ba034032d8c3b4848a4f3ee2614a55

  • SHA256

    d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda

  • SHA512

    2fd12581504f0373c08c6c035fef40ae73f898e3901d4fe5cd7957efb178346e9953a01b1343595ba0dcef759e044f64d7dad3071af7cf9d999e4a4318673162

  • SSDEEP

    12288:8MrGy90Mahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd44:CyZsVAuxYyustPkSeUMIxAy

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda.exe
    "C:\Users\Admin\AppData\Local\Temp\d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r3147BZ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r3147BZ.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w03xP98.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w03xP98.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r3147BZ.exe

    Filesize

    322KB

    MD5

    8141937b23cd1895e561d8e90fdeeff3

    SHA1

    6f810e9e480564f5837461f8ccdd07c951a1bece

    SHA256

    ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

    SHA512

    40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r3147BZ.exe

    Filesize

    322KB

    MD5

    8141937b23cd1895e561d8e90fdeeff3

    SHA1

    6f810e9e480564f5837461f8ccdd07c951a1bece

    SHA256

    ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

    SHA512

    40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w03xP98.exe

    Filesize

    323KB

    MD5

    a18bc052dac76e8b0b9945594d2e8eab

    SHA1

    9342f954e199cb1e8375daf861d91b877f1c6ad9

    SHA256

    d8a2a5c2cc4691861d4f8409f2877cac35b3e82ae94b90a45160ae204a4cf7d2

    SHA512

    898156d3be9e60ae438033b2b9d9d30891781cb43841dd00e3dc6431d9ae458d61fd060348a6780d5d594b08c2a67978a62e81a37d7d777c8c8d5868ebdd33b6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w03xP98.exe

    Filesize

    323KB

    MD5

    a18bc052dac76e8b0b9945594d2e8eab

    SHA1

    9342f954e199cb1e8375daf861d91b877f1c6ad9

    SHA256

    d8a2a5c2cc4691861d4f8409f2877cac35b3e82ae94b90a45160ae204a4cf7d2

    SHA512

    898156d3be9e60ae438033b2b9d9d30891781cb43841dd00e3dc6431d9ae458d61fd060348a6780d5d594b08c2a67978a62e81a37d7d777c8c8d5868ebdd33b6

  • memory/4100-206-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-1085-0x00000000055A0000-0x0000000005BA6000-memory.dmp

    Filesize

    6.0MB

  • memory/4100-1101-0x0000000006BC0000-0x0000000006C10000-memory.dmp

    Filesize

    320KB

  • memory/4100-1100-0x0000000006B40000-0x0000000006BB6000-memory.dmp

    Filesize

    472KB

  • memory/4100-1099-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-1098-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-1097-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-1096-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-1095-0x00000000064D0000-0x00000000069FC000-memory.dmp

    Filesize

    5.2MB

  • memory/4100-1094-0x0000000006300000-0x00000000064C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4100-1092-0x0000000006140000-0x00000000061D2000-memory.dmp

    Filesize

    584KB

  • memory/4100-1091-0x0000000005440000-0x00000000054A6000-memory.dmp

    Filesize

    408KB

  • memory/4100-1090-0x00000000052B0000-0x00000000052FB000-memory.dmp

    Filesize

    300KB

  • memory/4100-1089-0x0000000005160000-0x000000000519E000-memory.dmp

    Filesize

    248KB

  • memory/4100-1088-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-1087-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4100-180-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-183-0x0000000000580000-0x00000000005CB000-memory.dmp

    Filesize

    300KB

  • memory/4100-1086-0x0000000005000000-0x000000000510A000-memory.dmp

    Filesize

    1.0MB

  • memory/4100-192-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-212-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-210-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-208-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-204-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-202-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-200-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-198-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-173-0x0000000002560000-0x00000000025A6000-memory.dmp

    Filesize

    280KB

  • memory/4100-174-0x0000000004F50000-0x0000000004F94000-memory.dmp

    Filesize

    272KB

  • memory/4100-175-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-176-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-178-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-196-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-186-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-194-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-185-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-182-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-187-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/4100-190-0x0000000004F50000-0x0000000004F8E000-memory.dmp

    Filesize

    248KB

  • memory/4100-189-0x0000000002100000-0x0000000002110000-memory.dmp

    Filesize

    64KB

  • memory/5048-156-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-158-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-131-0x00000000006D0000-0x00000000006FD000-memory.dmp

    Filesize

    180KB

  • memory/5048-129-0x0000000004B80000-0x000000000507E000-memory.dmp

    Filesize

    5.0MB

  • memory/5048-130-0x00000000021B0000-0x00000000021C8000-memory.dmp

    Filesize

    96KB

  • memory/5048-168-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/5048-166-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/5048-128-0x0000000002050000-0x000000000206A000-memory.dmp

    Filesize

    104KB

  • memory/5048-165-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/5048-164-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/5048-163-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/5048-162-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-160-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-154-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-152-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-150-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-148-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-146-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-144-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-142-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-140-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-138-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-136-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-135-0x00000000021B0000-0x00000000021C2000-memory.dmp

    Filesize

    72KB

  • memory/5048-134-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/5048-132-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/5048-133-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB