Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2023, 11:07

General

  • Target

    9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe

  • Size

    693KB

  • MD5

    ac62810c082b0794432baed6dc540d66

  • SHA1

    bcbd1f50037687fc0d5ce4acbecf5bf8a77e967b

  • SHA256

    9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504

  • SHA512

    d6bbe772d4681fe9e9d020c27a23d830ec953b7a4912919389222cf9b02b115941e37e23048a259060c265f741c56744f97e3746768b1e287a7917e07d828d80

  • SSDEEP

    12288:fMrWy90nfKQrW9TYNwuRK2+Otcg0wiPcodeUxzS0zEOYn8cTrJ+2gQBm:xyofzWybb+OtcgoPXoUxzcVrlf8

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

diza

C2

193.56.146.11:4173

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe
    "C:\Users\Admin\AppData\Local\Temp\9747596dc3ba7fafc938accfd4e1357728f1f6942554c8055c853ea79fe7c504.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nso1607CH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nso1607CH.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1576Ye.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1576Ye.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c31XF55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c31XF55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1924
          4⤵
          • Program crash
          PID:2072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daxlV87.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daxlV87.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4848 -ip 4848
    1⤵
      PID:1640

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daxlV87.exe

            Filesize

            175KB

            MD5

            5c65803d42d5d06e302798faee3a11cd

            SHA1

            1e8de783b9994a3e422d9799437e4ad0ce554cc6

            SHA256

            a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2

            SHA512

            71a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\daxlV87.exe

            Filesize

            175KB

            MD5

            5c65803d42d5d06e302798faee3a11cd

            SHA1

            1e8de783b9994a3e422d9799437e4ad0ce554cc6

            SHA256

            a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2

            SHA512

            71a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nso1607CH.exe

            Filesize

            548KB

            MD5

            ea2aaafa953291bb7f2a229f7d02a787

            SHA1

            3e31b81f03d19a5d0d81c3d8c6bd7196db35808e

            SHA256

            030dd8ec834b999a05a8128ba7ec39e0ed17f760b37233dadb83a15123f8809a

            SHA512

            77a53eb0940de75feee669a2f4881e9f44c6bd989c7603f4c5b235c5ed32efd8c21697aeab933eccdb95de8dd8332811b11a83acc390032a71ebb7aa04abcc81

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nso1607CH.exe

            Filesize

            548KB

            MD5

            ea2aaafa953291bb7f2a229f7d02a787

            SHA1

            3e31b81f03d19a5d0d81c3d8c6bd7196db35808e

            SHA256

            030dd8ec834b999a05a8128ba7ec39e0ed17f760b37233dadb83a15123f8809a

            SHA512

            77a53eb0940de75feee669a2f4881e9f44c6bd989c7603f4c5b235c5ed32efd8c21697aeab933eccdb95de8dd8332811b11a83acc390032a71ebb7aa04abcc81

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1576Ye.exe

            Filesize

            323KB

            MD5

            ee43881ab62092621b2d2e22a0295878

            SHA1

            0339221e3f787602fea6a0541817565d751a293c

            SHA256

            2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

            SHA512

            df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1576Ye.exe

            Filesize

            323KB

            MD5

            ee43881ab62092621b2d2e22a0295878

            SHA1

            0339221e3f787602fea6a0541817565d751a293c

            SHA256

            2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

            SHA512

            df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c31XF55.exe

            Filesize

            380KB

            MD5

            cd30df0759fea97083bdf62f610ec081

            SHA1

            864bf5a66a31bf4bd217fa7c5496c9759211da26

            SHA256

            7ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0

            SHA512

            13491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c31XF55.exe

            Filesize

            380KB

            MD5

            cd30df0759fea97083bdf62f610ec081

            SHA1

            864bf5a66a31bf4bd217fa7c5496c9759211da26

            SHA256

            7ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0

            SHA512

            13491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b

          • memory/2308-162-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-168-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-150-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-151-0x00000000004E0000-0x000000000050D000-memory.dmp

            Filesize

            180KB

          • memory/2308-154-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-155-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

            Filesize

            64KB

          • memory/2308-157-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

            Filesize

            64KB

          • memory/2308-158-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-153-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

            Filesize

            64KB

          • memory/2308-160-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-148-0x0000000004CE0000-0x0000000005284000-memory.dmp

            Filesize

            5.6MB

          • memory/2308-164-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-166-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-149-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-170-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-172-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-174-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-176-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-178-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-180-0x0000000002570000-0x0000000002582000-memory.dmp

            Filesize

            72KB

          • memory/2308-181-0x0000000000400000-0x00000000004D4000-memory.dmp

            Filesize

            848KB

          • memory/2308-182-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

            Filesize

            64KB

          • memory/2308-183-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

            Filesize

            64KB

          • memory/2308-184-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

            Filesize

            64KB

          • memory/2308-186-0x0000000000400000-0x00000000004D4000-memory.dmp

            Filesize

            848KB

          • memory/2684-1123-0x0000000004E20000-0x0000000004E30000-memory.dmp

            Filesize

            64KB

          • memory/2684-1122-0x0000000004E20000-0x0000000004E30000-memory.dmp

            Filesize

            64KB

          • memory/2684-1121-0x00000000001E0000-0x0000000000212000-memory.dmp

            Filesize

            200KB

          • memory/4848-192-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-198-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-200-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-202-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-204-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-206-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-208-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-210-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-215-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB

          • memory/4848-213-0x0000000000610000-0x000000000065B000-memory.dmp

            Filesize

            300KB

          • memory/4848-212-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-218-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB

          • memory/4848-220-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-217-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-216-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB

          • memory/4848-222-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-224-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-226-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-228-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-1101-0x0000000005260000-0x0000000005878000-memory.dmp

            Filesize

            6.1MB

          • memory/4848-1102-0x00000000058D0000-0x00000000059DA000-memory.dmp

            Filesize

            1.0MB

          • memory/4848-1103-0x0000000005A10000-0x0000000005A22000-memory.dmp

            Filesize

            72KB

          • memory/4848-1104-0x0000000005A30000-0x0000000005A6C000-memory.dmp

            Filesize

            240KB

          • memory/4848-1105-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB

          • memory/4848-1107-0x0000000005D20000-0x0000000005DB2000-memory.dmp

            Filesize

            584KB

          • memory/4848-1108-0x0000000005DC0000-0x0000000005E26000-memory.dmp

            Filesize

            408KB

          • memory/4848-1109-0x00000000064C0000-0x0000000006536000-memory.dmp

            Filesize

            472KB

          • memory/4848-1110-0x0000000006550000-0x00000000065A0000-memory.dmp

            Filesize

            320KB

          • memory/4848-1111-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB

          • memory/4848-1112-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB

          • memory/4848-1113-0x0000000006700000-0x00000000068C2000-memory.dmp

            Filesize

            1.8MB

          • memory/4848-196-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-194-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-191-0x00000000050E0000-0x000000000511E000-memory.dmp

            Filesize

            248KB

          • memory/4848-1114-0x00000000068E0000-0x0000000006E0C000-memory.dmp

            Filesize

            5.2MB

          • memory/4848-1115-0x0000000002380000-0x0000000002390000-memory.dmp

            Filesize

            64KB