Analysis

  • max time kernel
    87s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/03/2023, 11:04

General

  • Target

    30cf7f0094fa89e25b6a2a3fcf179253dc77feb58bd0f4879981454661104fe4.exe

  • Size

    693KB

  • MD5

    6e1f5bfcddf64802e3746a8c9726f0a8

  • SHA1

    ce9be2ff55f9f42fd32f841d87ebc14e18206757

  • SHA256

    30cf7f0094fa89e25b6a2a3fcf179253dc77feb58bd0f4879981454661104fe4

  • SHA512

    f06ea5dba48586aea2c6a5f6673410b13cdc0a6b3912dfa04014c8f4f8cb9276013d33fab78b427e919ee6b70b67b28ed55dbc8d02997a6383fd71e69137d167

  • SSDEEP

    12288:iMrDy90rB2gyc1CMwxyoIK2+ut8g0wi+cu1nUxOMEOtc8cwxnsBEpb:VyA+c1CMwY1b+ut8go+rnUxWsxnsepb

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

diza

C2

193.56.146.11:4173

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30cf7f0094fa89e25b6a2a3fcf179253dc77feb58bd0f4879981454661104fe4.exe
    "C:\Users\Admin\AppData\Local\Temp\30cf7f0094fa89e25b6a2a3fcf179253dc77feb58bd0f4879981454661104fe4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEj2324gr.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEj2324gr.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2594KQ.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2594KQ.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84cf66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84cf66.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dYXdT14.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dYXdT14.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dYXdT14.exe

    Filesize

    175KB

    MD5

    5c65803d42d5d06e302798faee3a11cd

    SHA1

    1e8de783b9994a3e422d9799437e4ad0ce554cc6

    SHA256

    a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2

    SHA512

    71a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dYXdT14.exe

    Filesize

    175KB

    MD5

    5c65803d42d5d06e302798faee3a11cd

    SHA1

    1e8de783b9994a3e422d9799437e4ad0ce554cc6

    SHA256

    a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2

    SHA512

    71a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEj2324gr.exe

    Filesize

    548KB

    MD5

    a3953bb335e222199ad8f7f6dbe707b7

    SHA1

    df477df6259b4c8a9ff670bb970ff024fe113c3a

    SHA256

    945abc51c9c25561e50d9331e9b001136c1c08a57e5aaa1a00235c289c480cb0

    SHA512

    28037610a88462d9ddf224432be322648e1850681a39faa139a90b317dd20e80403b4fd94ccc9bca264f932743b11371891d2e721276f9b7b3ab08981835bdcf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEj2324gr.exe

    Filesize

    548KB

    MD5

    a3953bb335e222199ad8f7f6dbe707b7

    SHA1

    df477df6259b4c8a9ff670bb970ff024fe113c3a

    SHA256

    945abc51c9c25561e50d9331e9b001136c1c08a57e5aaa1a00235c289c480cb0

    SHA512

    28037610a88462d9ddf224432be322648e1850681a39faa139a90b317dd20e80403b4fd94ccc9bca264f932743b11371891d2e721276f9b7b3ab08981835bdcf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2594KQ.exe

    Filesize

    323KB

    MD5

    ee43881ab62092621b2d2e22a0295878

    SHA1

    0339221e3f787602fea6a0541817565d751a293c

    SHA256

    2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

    SHA512

    df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2594KQ.exe

    Filesize

    323KB

    MD5

    ee43881ab62092621b2d2e22a0295878

    SHA1

    0339221e3f787602fea6a0541817565d751a293c

    SHA256

    2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

    SHA512

    df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84cf66.exe

    Filesize

    380KB

    MD5

    cd30df0759fea97083bdf62f610ec081

    SHA1

    864bf5a66a31bf4bd217fa7c5496c9759211da26

    SHA256

    7ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0

    SHA512

    13491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c84cf66.exe

    Filesize

    380KB

    MD5

    cd30df0759fea97083bdf62f610ec081

    SHA1

    864bf5a66a31bf4bd217fa7c5496c9759211da26

    SHA256

    7ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0

    SHA512

    13491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b

  • memory/2592-136-0x0000000000910000-0x000000000092A000-memory.dmp

    Filesize

    104KB

  • memory/2592-137-0x0000000004C80000-0x000000000517E000-memory.dmp

    Filesize

    5.0MB

  • memory/2592-138-0x0000000002510000-0x0000000002528000-memory.dmp

    Filesize

    96KB

  • memory/2592-139-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-140-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-142-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-144-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-146-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-148-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2592-151-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2592-153-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-154-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2592-156-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-150-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2592-149-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-158-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-162-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-160-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-164-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-166-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-168-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-170-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2592-171-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/2592-172-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2592-173-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2592-174-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2592-176-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/3560-181-0x0000000002390000-0x00000000023D6000-memory.dmp

    Filesize

    280KB

  • memory/3560-182-0x0000000002770000-0x00000000027B4000-memory.dmp

    Filesize

    272KB

  • memory/3560-184-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-183-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-192-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-190-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-188-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-186-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-194-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-200-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-198-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-208-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-206-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-204-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-202-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-196-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-214-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-212-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-216-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-210-0x0000000002770000-0x00000000027AE000-memory.dmp

    Filesize

    248KB

  • memory/3560-242-0x00000000005F0000-0x000000000063B000-memory.dmp

    Filesize

    300KB

  • memory/3560-247-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-246-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-244-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-1093-0x0000000005770000-0x0000000005D76000-memory.dmp

    Filesize

    6.0MB

  • memory/3560-1094-0x0000000005160000-0x000000000526A000-memory.dmp

    Filesize

    1.0MB

  • memory/3560-1095-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

    Filesize

    72KB

  • memory/3560-1096-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/3560-1097-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-1098-0x0000000005370000-0x00000000053BB000-memory.dmp

    Filesize

    300KB

  • memory/3560-1100-0x00000000054C0000-0x0000000005526000-memory.dmp

    Filesize

    408KB

  • memory/3560-1101-0x0000000006070000-0x0000000006102000-memory.dmp

    Filesize

    584KB

  • memory/3560-1102-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-1103-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-1104-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-1105-0x00000000064C0000-0x0000000006682000-memory.dmp

    Filesize

    1.8MB

  • memory/3560-1106-0x00000000066A0000-0x0000000006BCC000-memory.dmp

    Filesize

    5.2MB

  • memory/3560-1107-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/3560-1108-0x0000000006E40000-0x0000000006EB6000-memory.dmp

    Filesize

    472KB

  • memory/3560-1109-0x0000000006ED0000-0x0000000006F20000-memory.dmp

    Filesize

    320KB

  • memory/3972-1115-0x0000000000910000-0x0000000000942000-memory.dmp

    Filesize

    200KB

  • memory/3972-1116-0x0000000005350000-0x000000000539B000-memory.dmp

    Filesize

    300KB

  • memory/3972-1117-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB