Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/03/2023, 06:35

General

  • Target

    607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe

  • Size

    569KB

  • MD5

    38e20f8fb651a1a5a55d235c8960cdfc

  • SHA1

    cc907f508e48fb3298e89a95faadf431983d408e

  • SHA256

    607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f

  • SHA512

    6e9659da3febffbf63ac4bdc6d6f025681b3f9cd2f26450cbf015149c3e53dcc9ef5ed0dadfa6a4af3e22eb57666ebcb5339ea66222f5eb690cba2a244b13290

  • SSDEEP

    12288:0Mrjy90Wahimz7AuxqVd4K4Zu5gTDEgV9W0dGZRgN:3yHsVAuxYdzUuSDV9W0dGZR0

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe
    "C:\Users\Admin\AppData\Local\Temp\607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r4820Gv.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r4820Gv.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w84du34.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w84du34.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r4820Gv.exe

    Filesize

    322KB

    MD5

    8141937b23cd1895e561d8e90fdeeff3

    SHA1

    6f810e9e480564f5837461f8ccdd07c951a1bece

    SHA256

    ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

    SHA512

    40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r4820Gv.exe

    Filesize

    322KB

    MD5

    8141937b23cd1895e561d8e90fdeeff3

    SHA1

    6f810e9e480564f5837461f8ccdd07c951a1bece

    SHA256

    ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

    SHA512

    40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w84du34.exe

    Filesize

    382KB

    MD5

    0fd5641d84944663de4ff1c6ec73ac12

    SHA1

    3f6e79840d52ea9fceada90eac52384e2ee24d11

    SHA256

    cd3bde9a06c3e79fb85e88a38d93c654f0d8941108581fa7b2b883a04bc9e0b0

    SHA512

    4457ff95ee19887b58ad6ea2b5137b45a9bd447622f42f811d201cbe47731f45c578fd0a4305466e9dc0a47e03bba95e67a64c43596fd8efb9e0a7d9f6a08e61

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w84du34.exe

    Filesize

    382KB

    MD5

    0fd5641d84944663de4ff1c6ec73ac12

    SHA1

    3f6e79840d52ea9fceada90eac52384e2ee24d11

    SHA256

    cd3bde9a06c3e79fb85e88a38d93c654f0d8941108581fa7b2b883a04bc9e0b0

    SHA512

    4457ff95ee19887b58ad6ea2b5137b45a9bd447622f42f811d201cbe47731f45c578fd0a4305466e9dc0a47e03bba95e67a64c43596fd8efb9e0a7d9f6a08e61

  • memory/4684-129-0x00000000005B0000-0x00000000005DD000-memory.dmp

    Filesize

    180KB

  • memory/4684-130-0x0000000002200000-0x000000000221A000-memory.dmp

    Filesize

    104KB

  • memory/4684-131-0x0000000004A70000-0x0000000004F6E000-memory.dmp

    Filesize

    5.0MB

  • memory/4684-132-0x0000000004A00000-0x0000000004A18000-memory.dmp

    Filesize

    96KB

  • memory/4684-133-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-134-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-136-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-138-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-140-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-142-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-144-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-147-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/4684-150-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-149-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/4684-146-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-151-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/4684-153-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-155-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-157-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-159-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-161-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-163-0x0000000004A00000-0x0000000004A12000-memory.dmp

    Filesize

    72KB

  • memory/4684-164-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/4684-165-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/4684-166-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/4684-167-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/4684-169-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/4836-174-0x00000000049C0000-0x0000000004A06000-memory.dmp

    Filesize

    280KB

  • memory/4836-175-0x0000000004F60000-0x0000000004FA4000-memory.dmp

    Filesize

    272KB

  • memory/4836-176-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-177-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-179-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-181-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-183-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-185-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-187-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-189-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-191-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-193-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-195-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-197-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-199-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-201-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-203-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-205-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-207-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-209-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/4836-232-0x00000000005D0000-0x000000000061B000-memory.dmp

    Filesize

    300KB

  • memory/4836-233-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-235-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-237-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-1086-0x0000000005610000-0x0000000005C16000-memory.dmp

    Filesize

    6.0MB

  • memory/4836-1087-0x0000000005080000-0x000000000518A000-memory.dmp

    Filesize

    1.0MB

  • memory/4836-1088-0x00000000051C0000-0x00000000051D2000-memory.dmp

    Filesize

    72KB

  • memory/4836-1089-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/4836-1090-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-1091-0x0000000005330000-0x000000000537B000-memory.dmp

    Filesize

    300KB

  • memory/4836-1093-0x00000000054C0000-0x0000000005552000-memory.dmp

    Filesize

    584KB

  • memory/4836-1094-0x0000000005560000-0x00000000055C6000-memory.dmp

    Filesize

    408KB

  • memory/4836-1095-0x0000000006270000-0x0000000006432000-memory.dmp

    Filesize

    1.8MB

  • memory/4836-1096-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-1097-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-1099-0x0000000006440000-0x000000000696C000-memory.dmp

    Filesize

    5.2MB

  • memory/4836-1098-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB

  • memory/4836-1100-0x0000000006AA0000-0x0000000006B16000-memory.dmp

    Filesize

    472KB

  • memory/4836-1101-0x0000000006B30000-0x0000000006B80000-memory.dmp

    Filesize

    320KB

  • memory/4836-1102-0x0000000004A10000-0x0000000004A20000-memory.dmp

    Filesize

    64KB