Analysis

  • max time kernel
    84s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2023, 19:05

General

  • Target

    4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe

  • Size

    641KB

  • MD5

    d6160908f24e2e986a056512dc59531a

  • SHA1

    cba98920784f276390bcdf2873be8da6267423f9

  • SHA256

    4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340

  • SHA512

    c71219f03ffa25e78a8363a0c8d03dce8d06de6d75c11901951723f18d6fc1974f78dfcf096f0e8de88a88643aae30696a60e31c9e211cc83e6744ae8ff24b13

  • SSDEEP

    12288:aMrty90OSV80A2Hiv8phep3eHlKHc0jn+F2BdcKY5nRfjyM1xWRB7ay4P:PyqV8QE+Y3slKHcKdcKYpNjyXadP

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe
    "C:\Users\Admin\AppData\Local\Temp\4a417d2c29ebcfe61f33009630831f4d4717b23766aace48d25faeb439c97340.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6880.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6880.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6330PW.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6330PW.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51rk84.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51rk84.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4308
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1084
          4⤵
          • Program crash
          PID:4372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drKeg51.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drKeg51.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 1516
        3⤵
        • Program crash
        PID:2576
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4308 -ip 4308
    1⤵
      PID:3764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4672 -ip 4672
      1⤵
        PID:3160

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drKeg51.exe

              Filesize

              294KB

              MD5

              cf3ee4546a323347008054f4b91f9438

              SHA1

              a4bb8384973f2ad02d844bd27ab79414cc3fa17d

              SHA256

              531fb4ac66006bf06661d3c8f409372b006fbdce3c0a95e85210ce822ed6c13e

              SHA512

              1778e0b780f5665dd24082968ca0e70b598f4e5b6029ca8cd48f7623b3be42f5e60dba7a1faedef566f0cf283e440f62ec1f6410d3ef14bdde4615b96ae127cd

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\drKeg51.exe

              Filesize

              294KB

              MD5

              cf3ee4546a323347008054f4b91f9438

              SHA1

              a4bb8384973f2ad02d844bd27ab79414cc3fa17d

              SHA256

              531fb4ac66006bf06661d3c8f409372b006fbdce3c0a95e85210ce822ed6c13e

              SHA512

              1778e0b780f5665dd24082968ca0e70b598f4e5b6029ca8cd48f7623b3be42f5e60dba7a1faedef566f0cf283e440f62ec1f6410d3ef14bdde4615b96ae127cd

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6880.exe

              Filesize

              321KB

              MD5

              96829d0b4e4ee169d8de82f9bf05fde7

              SHA1

              371841be4cd51844812c50b16a72d0879e682f8c

              SHA256

              3e26c0b1696584bfb67655e44d5d1587d330516c20802cbd02fb55f2d6b9b177

              SHA512

              2410a5a1b0c94b9a516562b362dc33d38e2973bbb6a7cd9825996765989c3b7c0cf67d1a70a93409cf556070ffcfa12ba3260c172a97c9f62beda3c05de93415

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice6880.exe

              Filesize

              321KB

              MD5

              96829d0b4e4ee169d8de82f9bf05fde7

              SHA1

              371841be4cd51844812c50b16a72d0879e682f8c

              SHA256

              3e26c0b1696584bfb67655e44d5d1587d330516c20802cbd02fb55f2d6b9b177

              SHA512

              2410a5a1b0c94b9a516562b362dc33d38e2973bbb6a7cd9825996765989c3b7c0cf67d1a70a93409cf556070ffcfa12ba3260c172a97c9f62beda3c05de93415

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6330PW.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6330PW.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51rk84.exe

              Filesize

              237KB

              MD5

              d9622cefc0c6a001f5f9d95fb4f2e834

              SHA1

              a62da56b085abf7c1dabbbc86bd2b58de7ec4784

              SHA256

              8afbefcdf1c5cd694eb82d78e0d20e6b41c3d00ec587eae4cae5c7082c8aae48

              SHA512

              c57762b3fb94b9067a3ed23f6718eab43d3406b2af586f4a7ca479979ba762fed7618135f09d7b42d40876d920aec79ee14eb29f6fd41ba3aa4f2dbb4d29042c

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51rk84.exe

              Filesize

              237KB

              MD5

              d9622cefc0c6a001f5f9d95fb4f2e834

              SHA1

              a62da56b085abf7c1dabbbc86bd2b58de7ec4784

              SHA256

              8afbefcdf1c5cd694eb82d78e0d20e6b41c3d00ec587eae4cae5c7082c8aae48

              SHA512

              c57762b3fb94b9067a3ed23f6718eab43d3406b2af586f4a7ca479979ba762fed7618135f09d7b42d40876d920aec79ee14eb29f6fd41ba3aa4f2dbb4d29042c

            • memory/2268-147-0x00000000009A0000-0x00000000009AA000-memory.dmp

              Filesize

              40KB

            • memory/4308-153-0x0000000004CB0000-0x0000000005254000-memory.dmp

              Filesize

              5.6MB

            • memory/4308-155-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-156-0x0000000000500000-0x000000000052D000-memory.dmp

              Filesize

              180KB

            • memory/4308-154-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-159-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

              Filesize

              64KB

            • memory/4308-158-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-161-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

              Filesize

              64KB

            • memory/4308-163-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

              Filesize

              64KB

            • memory/4308-162-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-165-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-167-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-169-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-171-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-173-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-175-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-177-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-179-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-181-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-183-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-185-0x00000000025E0000-0x00000000025F2000-memory.dmp

              Filesize

              72KB

            • memory/4308-186-0x0000000000400000-0x00000000004BA000-memory.dmp

              Filesize

              744KB

            • memory/4308-187-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

              Filesize

              64KB

            • memory/4308-188-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

              Filesize

              64KB

            • memory/4308-189-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

              Filesize

              64KB

            • memory/4308-191-0x0000000000400000-0x00000000004BA000-memory.dmp

              Filesize

              744KB

            • memory/4672-196-0x0000000002110000-0x000000000215B000-memory.dmp

              Filesize

              300KB

            • memory/4672-198-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-199-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-197-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-200-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-203-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-202-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-205-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-207-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-211-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-209-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-213-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-215-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-217-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-219-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-221-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-223-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-225-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-227-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-229-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-231-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-233-0x0000000004AA0000-0x0000000004ADE000-memory.dmp

              Filesize

              248KB

            • memory/4672-1106-0x0000000005210000-0x0000000005828000-memory.dmp

              Filesize

              6.1MB

            • memory/4672-1107-0x00000000058B0000-0x00000000059BA000-memory.dmp

              Filesize

              1.0MB

            • memory/4672-1108-0x00000000059F0000-0x0000000005A02000-memory.dmp

              Filesize

              72KB

            • memory/4672-1109-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-1110-0x0000000005A10000-0x0000000005A4C000-memory.dmp

              Filesize

              240KB

            • memory/4672-1112-0x0000000005D00000-0x0000000005D92000-memory.dmp

              Filesize

              584KB

            • memory/4672-1113-0x0000000005DA0000-0x0000000005E06000-memory.dmp

              Filesize

              408KB

            • memory/4672-1114-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-1115-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-1116-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-1117-0x0000000006700000-0x00000000068C2000-memory.dmp

              Filesize

              1.8MB

            • memory/4672-1118-0x00000000068E0000-0x0000000006E0C000-memory.dmp

              Filesize

              5.2MB

            • memory/4672-1119-0x0000000004C40000-0x0000000004C50000-memory.dmp

              Filesize

              64KB

            • memory/4672-1120-0x00000000081C0000-0x0000000008236000-memory.dmp

              Filesize

              472KB

            • memory/4672-1121-0x0000000008240000-0x0000000008290000-memory.dmp

              Filesize

              320KB