Analysis

  • max time kernel
    77s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2023, 15:29

General

  • Target

    3c75f1591c4061d2111f8b6e0725f6bff1197cd3207222806a5d948b2bb9e1cc.exe

  • Size

    696KB

  • MD5

    31a2cce84a65d262a8cf28bfc2ec4dc0

  • SHA1

    e7e3ade7f1e9868a2be6add74f3b6bc6c3721f98

  • SHA256

    3c75f1591c4061d2111f8b6e0725f6bff1197cd3207222806a5d948b2bb9e1cc

  • SHA512

    040d89973091f57f602dfc671bc84de43666bb3b1e8fb64a8175fde97221d46c425583f7f764b7bc04089563287d03b510b5c14e55e7b27db7be333ad7348e3d

  • SSDEEP

    12288:rMrSy90eQKVK1001IFuFK2+Ctqg0wiwctvUVMLf4xjhl9QA:Ry2KVcnhFb+Ctqgow2/LQxjhQA

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

dezik

C2

193.56.146.220:4174

Attributes
  • auth_value

    d39f21dca8edc10800b036ab83f4d75e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c75f1591c4061d2111f8b6e0725f6bff1197cd3207222806a5d948b2bb9e1cc.exe
    "C:\Users\Admin\AppData\Local\Temp\3c75f1591c4061d2111f8b6e0725f6bff1197cd3207222806a5d948b2bb9e1cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nxB6908HY.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nxB6908HY.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3820KZ.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3820KZ.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c06Bs93.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c06Bs93.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 1476
          4⤵
          • Program crash
          PID:3452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dLSCl33.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dLSCl33.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4372 -ip 4372
    1⤵
      PID:340

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dLSCl33.exe

      Filesize

      175KB

      MD5

      92f2a148b8f701e50e2f838f73d4d7b7

      SHA1

      324d8546e35d4f4285cac15b21620299ba5cb023

      SHA256

      9ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04

      SHA512

      3300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dLSCl33.exe

      Filesize

      175KB

      MD5

      92f2a148b8f701e50e2f838f73d4d7b7

      SHA1

      324d8546e35d4f4285cac15b21620299ba5cb023

      SHA256

      9ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04

      SHA512

      3300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nxB6908HY.exe

      Filesize

      552KB

      MD5

      09909746c8c79a8b0bea4cd302192e8f

      SHA1

      c1770f36ed95c4e9a7332fae1f864e1e5cd3eef3

      SHA256

      8c8488193254cb13e992ae794d8c2edb86bb25dd867839190c547979f0f0de9a

      SHA512

      b63312a83b848fca217c957f9c9cfdb06198c2b34edd4e34a459d6919fe13760d2a4e007bd7210847b8568da52e2fb8c65a5b2e53115e47dd840f4b95b407157

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nxB6908HY.exe

      Filesize

      552KB

      MD5

      09909746c8c79a8b0bea4cd302192e8f

      SHA1

      c1770f36ed95c4e9a7332fae1f864e1e5cd3eef3

      SHA256

      8c8488193254cb13e992ae794d8c2edb86bb25dd867839190c547979f0f0de9a

      SHA512

      b63312a83b848fca217c957f9c9cfdb06198c2b34edd4e34a459d6919fe13760d2a4e007bd7210847b8568da52e2fb8c65a5b2e53115e47dd840f4b95b407157

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3820KZ.exe

      Filesize

      323KB

      MD5

      ee43881ab62092621b2d2e22a0295878

      SHA1

      0339221e3f787602fea6a0541817565d751a293c

      SHA256

      2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

      SHA512

      df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3820KZ.exe

      Filesize

      323KB

      MD5

      ee43881ab62092621b2d2e22a0295878

      SHA1

      0339221e3f787602fea6a0541817565d751a293c

      SHA256

      2764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d

      SHA512

      df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c06Bs93.exe

      Filesize

      381KB

      MD5

      79183f88b273bd94752126e28a74a872

      SHA1

      4969ee7676f48a9c26c21da543322993704c403f

      SHA256

      35c6bb7d3f63d1c1b25b5dba53cbbbc3b3876baf9c02688ca95768b2b4062f21

      SHA512

      c7f4663100fef6e7206b9f879afb6b1309460ef14af23444f9ef0e115e2d7892831e04dd4a344eac4d77654d400360223c45d1343638cf5f45edaefc1e569899

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c06Bs93.exe

      Filesize

      381KB

      MD5

      79183f88b273bd94752126e28a74a872

      SHA1

      4969ee7676f48a9c26c21da543322993704c403f

      SHA256

      35c6bb7d3f63d1c1b25b5dba53cbbbc3b3876baf9c02688ca95768b2b4062f21

      SHA512

      c7f4663100fef6e7206b9f879afb6b1309460ef14af23444f9ef0e115e2d7892831e04dd4a344eac4d77654d400360223c45d1343638cf5f45edaefc1e569899

    • memory/1484-148-0x0000000004A60000-0x0000000005004000-memory.dmp

      Filesize

      5.6MB

    • memory/1484-150-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/1484-149-0x00000000005E0000-0x000000000060D000-memory.dmp

      Filesize

      180KB

    • memory/1484-151-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/1484-152-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-153-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-155-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-157-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-159-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-161-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-163-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-165-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-167-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-169-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-171-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-173-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-175-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-177-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-179-0x0000000002300000-0x0000000002312000-memory.dmp

      Filesize

      72KB

    • memory/1484-180-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/1484-181-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/1484-183-0x0000000000400000-0x00000000004D4000-memory.dmp

      Filesize

      848KB

    • memory/2844-1121-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

      Filesize

      64KB

    • memory/2844-1120-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

      Filesize

      64KB

    • memory/2844-1119-0x00000000003C0000-0x00000000003F2000-memory.dmp

      Filesize

      200KB

    • memory/4372-195-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-1098-0x0000000005360000-0x0000000005978000-memory.dmp

      Filesize

      6.1MB

    • memory/4372-197-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-199-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-201-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-203-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-205-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-207-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-209-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-211-0x00000000005C0000-0x000000000060B000-memory.dmp

      Filesize

      300KB

    • memory/4372-212-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-215-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-213-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-216-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-218-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-219-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-221-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-223-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-225-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-193-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-1099-0x0000000005980000-0x0000000005A8A000-memory.dmp

      Filesize

      1.0MB

    • memory/4372-1100-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/4372-1101-0x0000000004B40000-0x0000000004B7C000-memory.dmp

      Filesize

      240KB

    • memory/4372-1102-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-1103-0x0000000005D20000-0x0000000005DB2000-memory.dmp

      Filesize

      584KB

    • memory/4372-1104-0x0000000005DC0000-0x0000000005E26000-memory.dmp

      Filesize

      408KB

    • memory/4372-1106-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-1107-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-1108-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4372-1109-0x0000000006860000-0x0000000006A22000-memory.dmp

      Filesize

      1.8MB

    • memory/4372-1110-0x0000000006A40000-0x0000000006F6C000-memory.dmp

      Filesize

      5.2MB

    • memory/4372-1111-0x00000000070C0000-0x0000000007136000-memory.dmp

      Filesize

      472KB

    • memory/4372-191-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-188-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-189-0x00000000023A0000-0x00000000023DE000-memory.dmp

      Filesize

      248KB

    • memory/4372-1112-0x0000000007140000-0x0000000007190000-memory.dmp

      Filesize

      320KB

    • memory/4372-1113-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB