Analysis

  • max time kernel
    141s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2023, 04:55

General

  • Target

    f23a6139ec60560c50b0ab8988cb14b00f9fff47b3051b9e9b61db6eb9fa8b99.exe

  • Size

    577KB

  • MD5

    745fbb32399979f2ad7bc01c13d54054

  • SHA1

    f5c54548eb3194536592fbfbce2e2e34eb3d2bf7

  • SHA256

    f23a6139ec60560c50b0ab8988cb14b00f9fff47b3051b9e9b61db6eb9fa8b99

  • SHA512

    e30db3f76cd65b0e129ae9d010ece323a77445e4ed4966b15848a8d98fe56726fc36d5cf5e4ceecffbd7b4aea1a359ed04480d5367f4bd03149ece5f97197943

  • SSDEEP

    12288:kMrwy90Kahimz7AuxqVLxFYn54YgCiA6QBoNrSf8:cy7sVAuxYLIXgK6QBopSf8

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f23a6139ec60560c50b0ab8988cb14b00f9fff47b3051b9e9b61db6eb9fa8b99.exe
    "C:\Users\Admin\AppData\Local\Temp\f23a6139ec60560c50b0ab8988cb14b00f9fff47b3051b9e9b61db6eb9fa8b99.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7319eH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7319eH.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 1084
        3⤵
        • Program crash
        PID:3692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w46WW61.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w46WW61.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3300
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 1996
        3⤵
        • Program crash
        PID:4512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3116 -ip 3116
    1⤵
      PID:4348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3300 -ip 3300
      1⤵
        PID:2672

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7319eH.exe

              Filesize

              322KB

              MD5

              8141937b23cd1895e561d8e90fdeeff3

              SHA1

              6f810e9e480564f5837461f8ccdd07c951a1bece

              SHA256

              ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

              SHA512

              40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7319eH.exe

              Filesize

              322KB

              MD5

              8141937b23cd1895e561d8e90fdeeff3

              SHA1

              6f810e9e480564f5837461f8ccdd07c951a1bece

              SHA256

              ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

              SHA512

              40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w46WW61.exe

              Filesize

              323KB

              MD5

              13693461251149817425e66f1206913a

              SHA1

              998dbccbd83323f62a3b2b578a9605c0d933630f

              SHA256

              8e9c17eef3b9aea25037691c41032485a6bc4b768861ac8da022ae30c76a494a

              SHA512

              674b8043f203e5ec1e149775fc5ce7caf78e7a614be365e4dd719093a29ce4c37b7b3683262ce3e15f9df4f3854b63fec0176183766d9baa495b1fe7e4555b62

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w46WW61.exe

              Filesize

              323KB

              MD5

              13693461251149817425e66f1206913a

              SHA1

              998dbccbd83323f62a3b2b578a9605c0d933630f

              SHA256

              8e9c17eef3b9aea25037691c41032485a6bc4b768861ac8da022ae30c76a494a

              SHA512

              674b8043f203e5ec1e149775fc5ce7caf78e7a614be365e4dd719093a29ce4c37b7b3683262ce3e15f9df4f3854b63fec0176183766d9baa495b1fe7e4555b62

            • memory/3116-141-0x0000000004CE0000-0x0000000005284000-memory.dmp

              Filesize

              5.6MB

            • memory/3116-142-0x00000000005B0000-0x00000000005DD000-memory.dmp

              Filesize

              180KB

            • memory/3116-143-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3116-144-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3116-146-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-147-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-145-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3116-149-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-151-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-153-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-155-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-157-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-159-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-161-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-163-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-165-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-167-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-169-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-171-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-173-0x00000000023E0000-0x00000000023F2000-memory.dmp

              Filesize

              72KB

            • memory/3116-174-0x0000000000400000-0x00000000004D4000-memory.dmp

              Filesize

              848KB

            • memory/3116-175-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3116-176-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3116-177-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3116-179-0x0000000000400000-0x00000000004D4000-memory.dmp

              Filesize

              848KB

            • memory/3300-184-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-191-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-189-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-193-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-187-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-185-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-195-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-197-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-199-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-201-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-203-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-205-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-207-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-209-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-211-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-213-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-215-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-217-0x0000000004FE0000-0x000000000501E000-memory.dmp

              Filesize

              248KB

            • memory/3300-252-0x00000000020A0000-0x00000000020EB000-memory.dmp

              Filesize

              300KB

            • memory/3300-254-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-256-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-257-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-1094-0x0000000005070000-0x0000000005688000-memory.dmp

              Filesize

              6.1MB

            • memory/3300-1095-0x0000000005710000-0x000000000581A000-memory.dmp

              Filesize

              1.0MB

            • memory/3300-1096-0x0000000005850000-0x0000000005862000-memory.dmp

              Filesize

              72KB

            • memory/3300-1097-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-1098-0x0000000005970000-0x00000000059AC000-memory.dmp

              Filesize

              240KB

            • memory/3300-1100-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-1101-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-1102-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-1103-0x0000000002180000-0x0000000002190000-memory.dmp

              Filesize

              64KB

            • memory/3300-1104-0x0000000005CA0000-0x0000000005D06000-memory.dmp

              Filesize

              408KB

            • memory/3300-1105-0x0000000006470000-0x0000000006502000-memory.dmp

              Filesize

              584KB

            • memory/3300-1106-0x0000000006560000-0x0000000006722000-memory.dmp

              Filesize

              1.8MB

            • memory/3300-1107-0x0000000006730000-0x0000000006C5C000-memory.dmp

              Filesize

              5.2MB

            • memory/3300-1109-0x0000000006DA0000-0x0000000006E16000-memory.dmp

              Filesize

              472KB

            • memory/3300-1110-0x0000000006E30000-0x0000000006E80000-memory.dmp

              Filesize

              320KB