Analysis

  • max time kernel
    40s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2023 22:17

General

  • Target

    21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe

  • Size

    667KB

  • MD5

    a41314f0329135715157149f9d220dc5

  • SHA1

    c259a299b8c27637c34cb12931440e6f9fed389e

  • SHA256

    21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99

  • SHA512

    5d72b0411440de816794389eb8db138978aa8aecf7419d0776c30016eed11284f0694657bd0f985f679d5fee82ad8814bf76015c64bb06b2153236b96f8467c1

  • SSDEEP

    12288:YMrjy90PM8VZDFkloe/6wDWvFNTotS8dsa/Cteo5CLv5D5YI8bzk1ggxzK:LyaFVEl5/6Uhkva6tZ5CLvFj67gxzK

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

well

C2

193.233.20.28:4125

Attributes
  • auth_value

    265e7373dd436339d88347c08a10b402

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe
    "C:\Users\Admin\AppData\Local\Temp\21526e3c6135cac7fc31c41747411ba6191fa0106f040780609537f03eb81b99.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe

    Filesize

    175KB

    MD5

    b3cbfcd14491f891be0baef768f2a4da

    SHA1

    47be5bb6f31976fad7f904f52a19a177f84e04de

    SHA256

    0c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f

    SHA512

    330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe

    Filesize

    175KB

    MD5

    b3cbfcd14491f891be0baef768f2a4da

    SHA1

    47be5bb6f31976fad7f904f52a19a177f84e04de

    SHA256

    0c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f

    SHA512

    330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe

    Filesize

    522KB

    MD5

    7818447aa8f250bb085a72f12d0a26ca

    SHA1

    ec97aa9f13bff33ee8c6625e9e55f7c7116504ad

    SHA256

    62566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060

    SHA512

    24b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe

    Filesize

    522KB

    MD5

    7818447aa8f250bb085a72f12d0a26ca

    SHA1

    ec97aa9f13bff33ee8c6625e9e55f7c7116504ad

    SHA256

    62566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060

    SHA512

    24b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe

    Filesize

    244KB

    MD5

    a4f6ef55bc240fa164dd7b91008e7258

    SHA1

    8656db9bc0d7fe133ec1d4848809d9b8ce363d68

    SHA256

    122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45

    SHA512

    f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe

    Filesize

    244KB

    MD5

    a4f6ef55bc240fa164dd7b91008e7258

    SHA1

    8656db9bc0d7fe133ec1d4848809d9b8ce363d68

    SHA256

    122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45

    SHA512

    f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe

    Filesize

    244KB

    MD5

    a4f6ef55bc240fa164dd7b91008e7258

    SHA1

    8656db9bc0d7fe133ec1d4848809d9b8ce363d68

    SHA256

    122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45

    SHA512

    f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe

    Filesize

    302KB

    MD5

    98dfda5eccb7864ae397ac064e4fb1a5

    SHA1

    b455802e4e992fcc90c025b94cd0826bfda105b2

    SHA256

    7912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba

    SHA512

    c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe

    Filesize

    302KB

    MD5

    98dfda5eccb7864ae397ac064e4fb1a5

    SHA1

    b455802e4e992fcc90c025b94cd0826bfda105b2

    SHA256

    7912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba

    SHA512

    c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe

    Filesize

    302KB

    MD5

    98dfda5eccb7864ae397ac064e4fb1a5

    SHA1

    b455802e4e992fcc90c025b94cd0826bfda105b2

    SHA256

    7912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba

    SHA512

    c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe

    Filesize

    175KB

    MD5

    b3cbfcd14491f891be0baef768f2a4da

    SHA1

    47be5bb6f31976fad7f904f52a19a177f84e04de

    SHA256

    0c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f

    SHA512

    330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xZAFh20.exe

    Filesize

    175KB

    MD5

    b3cbfcd14491f891be0baef768f2a4da

    SHA1

    47be5bb6f31976fad7f904f52a19a177f84e04de

    SHA256

    0c4f122d0b3d47a36ebe292558f5981b3a68f81316f235eec9625f55691ccf7f

    SHA512

    330844ff4f622df3912bbbaddf61d4b20e1ff5406bf9c5e218c794bb2f8a0e7fcd75ae8cb2a28384012413dc1835a4d5d038310aa199983b5744f17385a6abaf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe

    Filesize

    522KB

    MD5

    7818447aa8f250bb085a72f12d0a26ca

    SHA1

    ec97aa9f13bff33ee8c6625e9e55f7c7116504ad

    SHA256

    62566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060

    SHA512

    24b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ycWd6411Od.exe

    Filesize

    522KB

    MD5

    7818447aa8f250bb085a72f12d0a26ca

    SHA1

    ec97aa9f13bff33ee8c6625e9e55f7c7116504ad

    SHA256

    62566c263701a0825356fdc2a93f525fdd81c60117471ad04c23491b237df060

    SHA512

    24b94993e8e030e00555cb5fde723201de6310d3dbeccdd25f69886622594bf1ae9d4bc6702c2f8c96095f6e3a580f82bdc539fe090d80b19fe807717a486d8a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe

    Filesize

    244KB

    MD5

    a4f6ef55bc240fa164dd7b91008e7258

    SHA1

    8656db9bc0d7fe133ec1d4848809d9b8ce363d68

    SHA256

    122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45

    SHA512

    f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe

    Filesize

    244KB

    MD5

    a4f6ef55bc240fa164dd7b91008e7258

    SHA1

    8656db9bc0d7fe133ec1d4848809d9b8ce363d68

    SHA256

    122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45

    SHA512

    f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r8227fl.exe

    Filesize

    244KB

    MD5

    a4f6ef55bc240fa164dd7b91008e7258

    SHA1

    8656db9bc0d7fe133ec1d4848809d9b8ce363d68

    SHA256

    122332c5c1e93e7110ba79e621acec52161cc92e782cf8d8e724e959bad80f45

    SHA512

    f11a79c09331464d80a4cb3dc3b62a1b9fbdc0bc28e6c53ccf68eb054fddcf7f681c83a539dfabca0bcfc377322e107d65b2b4ecffcfa556a32eedd6753b0f4c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe

    Filesize

    302KB

    MD5

    98dfda5eccb7864ae397ac064e4fb1a5

    SHA1

    b455802e4e992fcc90c025b94cd0826bfda105b2

    SHA256

    7912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba

    SHA512

    c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe

    Filesize

    302KB

    MD5

    98dfda5eccb7864ae397ac064e4fb1a5

    SHA1

    b455802e4e992fcc90c025b94cd0826bfda105b2

    SHA256

    7912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba

    SHA512

    c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\w04wq45.exe

    Filesize

    302KB

    MD5

    98dfda5eccb7864ae397ac064e4fb1a5

    SHA1

    b455802e4e992fcc90c025b94cd0826bfda105b2

    SHA256

    7912c9629489d099c6dad7624ca5664f401054dd97d225e15156f72d8aa09dba

    SHA512

    c2e68738cad684109c0396d17e3538e0af5b1c9f58681657fd8efef7667842c3db379b73ec448bdd74bbb6acfb7884ccfd767e97b8dbcd099e378146bbddd348

  • memory/668-88-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-112-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/668-98-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-100-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-102-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-104-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-106-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-108-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-109-0x0000000004C50000-0x0000000004C90000-memory.dmp

    Filesize

    256KB

  • memory/668-110-0x0000000004C50000-0x0000000004C90000-memory.dmp

    Filesize

    256KB

  • memory/668-111-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/668-81-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-94-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-92-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-90-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-86-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-84-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-82-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-96-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

    Filesize

    72KB

  • memory/668-80-0x0000000000BE0000-0x0000000000BF8000-memory.dmp

    Filesize

    96KB

  • memory/668-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/668-79-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/1548-1043-0x0000000000FF0000-0x0000000001022000-memory.dmp

    Filesize

    200KB

  • memory/1548-1044-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1648-130-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-154-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-136-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-138-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-140-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-142-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-144-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-146-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-148-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-150-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-152-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-134-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-156-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-158-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-503-0x0000000000370000-0x00000000003BB000-memory.dmp

    Filesize

    300KB

  • memory/1648-505-0x0000000000BC0000-0x0000000000C00000-memory.dmp

    Filesize

    256KB

  • memory/1648-507-0x0000000000BC0000-0x0000000000C00000-memory.dmp

    Filesize

    256KB

  • memory/1648-1034-0x0000000000BC0000-0x0000000000C00000-memory.dmp

    Filesize

    256KB

  • memory/1648-132-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-126-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-128-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-125-0x00000000023E0000-0x000000000241E000-memory.dmp

    Filesize

    248KB

  • memory/1648-124-0x00000000023E0000-0x0000000002424000-memory.dmp

    Filesize

    272KB

  • memory/1648-123-0x0000000000660000-0x00000000006A6000-memory.dmp

    Filesize

    280KB