Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2023, 10:07

General

  • Target

    0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe

  • Size

    689KB

  • MD5

    add17b12448a3c08be7a02ac1041798f

  • SHA1

    f4b8c3693f1314c668f76726a0cf1ba9de19416a

  • SHA256

    0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1

  • SHA512

    67170b0d8942c9943e74c290d5b54b8671a9a7d22946220770679364ec9e6e5bea981f62e87f2852cc2d1ae94b168740cafdef9d9e9bf0eb6cd36dd113ac82e6

  • SSDEEP

    12288:UMrUy90+BfxuV70S8fGMGyILyW/DK2+6tGg0wiTcs5MJMd32K9rdnUab7HP+Wsa+:oyBfIV7bYZ6Db+6tGgoTPMFKNdUab7HE

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

diza

C2

193.56.146.11:4173

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe
    "C:\Users\Admin\AppData\Local\Temp\0b6ee2ab038fbb9e2d0f46e34946094d79d7cfa52143076cb4e6251fa72252f1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nZB3635Uc.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nZB3635Uc.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4045Ka.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4045Ka.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c57ro19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c57ro19.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbBvU09.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbBvU09.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbBvU09.exe

    Filesize

    175KB

    MD5

    5c65803d42d5d06e302798faee3a11cd

    SHA1

    1e8de783b9994a3e422d9799437e4ad0ce554cc6

    SHA256

    a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2

    SHA512

    71a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbBvU09.exe

    Filesize

    175KB

    MD5

    5c65803d42d5d06e302798faee3a11cd

    SHA1

    1e8de783b9994a3e422d9799437e4ad0ce554cc6

    SHA256

    a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2

    SHA512

    71a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nZB3635Uc.exe

    Filesize

    544KB

    MD5

    d286a00edbdd7bcab705dcfef65e4a8e

    SHA1

    38ef8f9ae427e34b938fc2c76429fb0030b1e244

    SHA256

    e1f1d88e3b517198747dab189102ac87057294ef968025fcd6e108ceb37481dd

    SHA512

    9faaec4eafe99297c7345fefbfb8981adf0df86e1d32c90687369ac1dddb21847e3583857c683b2e29df1a6dd5d392bf4934adb0653f1ff78ffd1b511df7d345

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nZB3635Uc.exe

    Filesize

    544KB

    MD5

    d286a00edbdd7bcab705dcfef65e4a8e

    SHA1

    38ef8f9ae427e34b938fc2c76429fb0030b1e244

    SHA256

    e1f1d88e3b517198747dab189102ac87057294ef968025fcd6e108ceb37481dd

    SHA512

    9faaec4eafe99297c7345fefbfb8981adf0df86e1d32c90687369ac1dddb21847e3583857c683b2e29df1a6dd5d392bf4934adb0653f1ff78ffd1b511df7d345

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4045Ka.exe

    Filesize

    323KB

    MD5

    ee43881ab62092621b2d2e22a0295878

    SHA1

    0339221e3f787602fea6a0541817565d751a293c

    SHA256

    2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

    SHA512

    df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4045Ka.exe

    Filesize

    323KB

    MD5

    ee43881ab62092621b2d2e22a0295878

    SHA1

    0339221e3f787602fea6a0541817565d751a293c

    SHA256

    2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

    SHA512

    df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c57ro19.exe

    Filesize

    381KB

    MD5

    84a42dfba694347808c6a154ea6a4b1a

    SHA1

    ef6f18e9d028dcfdb29474d779d815a9e2dde5fa

    SHA256

    9548c5b9299705d044097563f54f45861b1e48ca61ba5451c6af0f625c027881

    SHA512

    5ca5aceb035fd8696212a1c3c86c68955acc1f01dd1f594c8ccd270af969d4c164c0c08b96ced106dfe0606ee2e8f5093512f30a47ce39a5e6e658405b971ef4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c57ro19.exe

    Filesize

    381KB

    MD5

    84a42dfba694347808c6a154ea6a4b1a

    SHA1

    ef6f18e9d028dcfdb29474d779d815a9e2dde5fa

    SHA256

    9548c5b9299705d044097563f54f45861b1e48ca61ba5451c6af0f625c027881

    SHA512

    5ca5aceb035fd8696212a1c3c86c68955acc1f01dd1f594c8ccd270af969d4c164c0c08b96ced106dfe0606ee2e8f5093512f30a47ce39a5e6e658405b971ef4

  • memory/1460-148-0x0000000004C90000-0x0000000005234000-memory.dmp

    Filesize

    5.6MB

  • memory/1460-149-0x00000000004E0000-0x000000000050D000-memory.dmp

    Filesize

    180KB

  • memory/1460-150-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/1460-151-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-152-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-154-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-156-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-158-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-160-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-162-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-164-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-166-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-168-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-170-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-172-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-174-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-176-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-178-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/1460-179-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1460-180-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/1460-181-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/1460-182-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/1460-184-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/2280-189-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-190-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-192-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-194-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-196-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-198-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-200-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-202-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-204-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-206-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-208-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-210-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-212-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-214-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-216-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-219-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-218-0x00000000005C0000-0x000000000060B000-memory.dmp

    Filesize

    300KB

  • memory/2280-220-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2280-222-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2280-223-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-225-0x0000000005080000-0x00000000050BE000-memory.dmp

    Filesize

    248KB

  • memory/2280-1098-0x0000000005230000-0x0000000005848000-memory.dmp

    Filesize

    6.1MB

  • memory/2280-1099-0x00000000058D0000-0x00000000059DA000-memory.dmp

    Filesize

    1.0MB

  • memory/2280-1100-0x0000000005A10000-0x0000000005A22000-memory.dmp

    Filesize

    72KB

  • memory/2280-1101-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2280-1102-0x0000000005B30000-0x0000000005B6C000-memory.dmp

    Filesize

    240KB

  • memory/2280-1103-0x0000000005D20000-0x0000000005D86000-memory.dmp

    Filesize

    408KB

  • memory/2280-1104-0x00000000063E0000-0x0000000006472000-memory.dmp

    Filesize

    584KB

  • memory/2280-1106-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2280-1107-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2280-1108-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2280-1109-0x0000000006720000-0x0000000006796000-memory.dmp

    Filesize

    472KB

  • memory/2280-1110-0x00000000067B0000-0x0000000006800000-memory.dmp

    Filesize

    320KB

  • memory/2280-1111-0x0000000006950000-0x0000000006B12000-memory.dmp

    Filesize

    1.8MB

  • memory/2280-1112-0x0000000006B60000-0x000000000708C000-memory.dmp

    Filesize

    5.2MB

  • memory/2280-1113-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

    Filesize

    64KB

  • memory/2552-1119-0x0000000000900000-0x0000000000932000-memory.dmp

    Filesize

    200KB

  • memory/2552-1120-0x00000000054C0000-0x00000000054D0000-memory.dmp

    Filesize

    64KB