Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-03-2023 22:34

General

  • Target

    6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe

  • Size

    787KB

  • MD5

    7faa376a765fa4c67f9e41610d8b9f83

  • SHA1

    73b34a47582792251b9558b8e12f255f575b2abe

  • SHA256

    6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a

  • SHA512

    d09678887da10d9ab541c68427f42e568a18a11ef16ea90438c2c0a8a30e70697b11694437a38e9492da87e12fd6ea5e59ff8b79da5f5cd010117ff3bbd8fa3d

  • SSDEEP

    12288:pMrfy90det6HLKupqAbIC82CHuDt29yakAh4JJUreGaYE/okR151M9dXYk12qL8W:yy8eWPq/MCHg0UalhwtGaYToL1yRYZM

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

rita

C2

193.233.20.28:4125

Attributes
  • auth_value

    5cf1bcf41b0a2f3710619223451dfd3a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe
    "C:\Users\Admin\AppData\Local\Temp\6bb69574b66315431a7ac43a225848df198b3f436e5c259d43cd8071b4f71a6a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7191.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7191.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8295.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8295.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1705wg.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1705wg.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4496
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c61Wk27.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c61Wk27.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCElh21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCElh21.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83rR91.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83rR91.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83rR91.exe

    Filesize

    175KB

    MD5

    8b0ea3120d3d291045b26bcea5ccef54

    SHA1

    07ed9587057ae936ca0610051142a4add4f7b6aa

    SHA256

    6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

    SHA512

    6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83rR91.exe

    Filesize

    175KB

    MD5

    8b0ea3120d3d291045b26bcea5ccef54

    SHA1

    07ed9587057ae936ca0610051142a4add4f7b6aa

    SHA256

    6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

    SHA512

    6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7191.exe

    Filesize

    642KB

    MD5

    546c7cee9a0bd5a9423b99e0545007ce

    SHA1

    f13e13989baa3e9d7b00660bc9d2fef80b0a6990

    SHA256

    83cdcbbcc7c8df55c6a2dec28687697cb4864eb72ff0e4d51f59eb296e234fcb

    SHA512

    a9635bcc580ace0cb6b297d7f8bc956f5bad8ef22380f849c515685d51d07bbd2d5f34abbd0ebf4a450847b23b18081247c1468e88c1ef92217e39034992654c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7191.exe

    Filesize

    642KB

    MD5

    546c7cee9a0bd5a9423b99e0545007ce

    SHA1

    f13e13989baa3e9d7b00660bc9d2fef80b0a6990

    SHA256

    83cdcbbcc7c8df55c6a2dec28687697cb4864eb72ff0e4d51f59eb296e234fcb

    SHA512

    a9635bcc580ace0cb6b297d7f8bc956f5bad8ef22380f849c515685d51d07bbd2d5f34abbd0ebf4a450847b23b18081247c1468e88c1ef92217e39034992654c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCElh21.exe

    Filesize

    295KB

    MD5

    8a9760b7c839de3a4e5662f7ec0f2870

    SHA1

    3dc501a9c99537dedc0ab0c14c163675930bd3dc

    SHA256

    8c9a5d864fa60572ec7d27305006ead78a9d63c703aa218e4bd7468bd39c3169

    SHA512

    0e07449e0dfe1c6f9ef1e5270bfd51c20cdd5ab1daab4830f4d85347fe4bd81a21fdfd70dcf53ce8cb711ab2c2a04c90db349b06aa0fae565900b9c6b4161880

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dCElh21.exe

    Filesize

    295KB

    MD5

    8a9760b7c839de3a4e5662f7ec0f2870

    SHA1

    3dc501a9c99537dedc0ab0c14c163675930bd3dc

    SHA256

    8c9a5d864fa60572ec7d27305006ead78a9d63c703aa218e4bd7468bd39c3169

    SHA512

    0e07449e0dfe1c6f9ef1e5270bfd51c20cdd5ab1daab4830f4d85347fe4bd81a21fdfd70dcf53ce8cb711ab2c2a04c90db349b06aa0fae565900b9c6b4161880

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8295.exe

    Filesize

    322KB

    MD5

    bc5fa60464149c1090e730378af88fdd

    SHA1

    68a1aec177a39c17315794aed957d3f195566ba1

    SHA256

    8ced6c8895d59d8b12a881e947ff3531048ee59edc8a1cadb4ec6fcb3bf02929

    SHA512

    52f8c43dab74fb82c59bd86a5a8b92f226a4ab030599013958cabc662de402f63a98da04744a30e84f2402fbfcf92107bd12ae444ce8c57cde397ad04b9812a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8295.exe

    Filesize

    322KB

    MD5

    bc5fa60464149c1090e730378af88fdd

    SHA1

    68a1aec177a39c17315794aed957d3f195566ba1

    SHA256

    8ced6c8895d59d8b12a881e947ff3531048ee59edc8a1cadb4ec6fcb3bf02929

    SHA512

    52f8c43dab74fb82c59bd86a5a8b92f226a4ab030599013958cabc662de402f63a98da04744a30e84f2402fbfcf92107bd12ae444ce8c57cde397ad04b9812a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1705wg.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1705wg.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c61Wk27.exe

    Filesize

    237KB

    MD5

    6c09b39d2aff3537fc19d9ed304ebde2

    SHA1

    2741f213121fd72b7c75a5960c66ba84d92befaf

    SHA256

    48813d108f8542ec58b0ee382a56fe975ebec180cfadb2333f3f53328f400d35

    SHA512

    af4eb8e3dd6ee3dc8c0abdc7af997ad2d82d95af98e8319c0e9a560970a6c408a619846a0749751bca4ef4d5c831efa5f40333176122cf6415cd6fe68479fbea

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c61Wk27.exe

    Filesize

    237KB

    MD5

    6c09b39d2aff3537fc19d9ed304ebde2

    SHA1

    2741f213121fd72b7c75a5960c66ba84d92befaf

    SHA256

    48813d108f8542ec58b0ee382a56fe975ebec180cfadb2333f3f53328f400d35

    SHA512

    af4eb8e3dd6ee3dc8c0abdc7af997ad2d82d95af98e8319c0e9a560970a6c408a619846a0749751bca4ef4d5c831efa5f40333176122cf6415cd6fe68479fbea

  • memory/1464-520-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-1102-0x00000000058F0000-0x0000000005902000-memory.dmp

    Filesize

    72KB

  • memory/1464-1116-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-1115-0x0000000006EA0000-0x0000000006EF0000-memory.dmp

    Filesize

    320KB

  • memory/1464-1114-0x0000000006E10000-0x0000000006E86000-memory.dmp

    Filesize

    472KB

  • memory/1464-1113-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-1112-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-1111-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-1110-0x0000000006570000-0x0000000006A9C000-memory.dmp

    Filesize

    5.2MB

  • memory/1464-1109-0x00000000063A0000-0x0000000006562000-memory.dmp

    Filesize

    1.8MB

  • memory/1464-1107-0x0000000005C90000-0x0000000005CF6000-memory.dmp

    Filesize

    408KB

  • memory/1464-1106-0x0000000005BF0000-0x0000000005C82000-memory.dmp

    Filesize

    584KB

  • memory/1464-1105-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-1104-0x0000000005A60000-0x0000000005AAB000-memory.dmp

    Filesize

    300KB

  • memory/1464-1103-0x0000000005910000-0x000000000594E000-memory.dmp

    Filesize

    248KB

  • memory/1464-1101-0x00000000057D0000-0x00000000058DA000-memory.dmp

    Filesize

    1.0MB

  • memory/1464-1100-0x00000000051C0000-0x00000000057C6000-memory.dmp

    Filesize

    6.0MB

  • memory/1464-516-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-517-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1464-514-0x00000000005B0000-0x00000000005FB000-memory.dmp

    Filesize

    300KB

  • memory/1464-223-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-221-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-219-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-217-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-215-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-213-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-188-0x00000000049E0000-0x0000000004A26000-memory.dmp

    Filesize

    280KB

  • memory/1464-189-0x0000000004A60000-0x0000000004AA4000-memory.dmp

    Filesize

    272KB

  • memory/1464-190-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-191-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-193-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-195-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-197-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-199-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-201-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-203-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-205-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-207-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-209-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1464-211-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/3892-1124-0x00000000050E0000-0x00000000050F0000-memory.dmp

    Filesize

    64KB

  • memory/3892-1123-0x00000000052C0000-0x000000000530B000-memory.dmp

    Filesize

    300KB

  • memory/3892-1122-0x0000000000880000-0x00000000008B2000-memory.dmp

    Filesize

    200KB

  • memory/4496-137-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB

  • memory/4920-167-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-161-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-178-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/4920-177-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-144-0x0000000004AF0000-0x0000000004FEE000-memory.dmp

    Filesize

    5.0MB

  • memory/4920-175-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-173-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-171-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-147-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/4920-169-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-145-0x00000000022D0000-0x00000000022E8000-memory.dmp

    Filesize

    96KB

  • memory/4920-165-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-163-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-179-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/4920-159-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-157-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-155-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-153-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-151-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-150-0x00000000022D0000-0x00000000022E2000-memory.dmp

    Filesize

    72KB

  • memory/4920-149-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/4920-148-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/4920-143-0x0000000002030000-0x000000000204A000-memory.dmp

    Filesize

    104KB

  • memory/4920-180-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/4920-181-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/4920-183-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/4920-146-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB