Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2023 04:49

General

  • Target

    3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe

  • Size

    705KB

  • MD5

    ea1feb0abf31d4223e3ac84ab4e55916

  • SHA1

    e12551850ee0bde498cda0e9950f7288a8b2cfed

  • SHA256

    3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b

  • SHA512

    d2780eba841ab324655997f978a50a7d7c4bc79fad5d4bd65a338e85040dd931e7356dd9dc0422762d8d941a452b931cac2ab2dd96aa692db38661c77a9b11ea

  • SSDEEP

    12288:+Mrny90hKmjwm5n52FnHTS6r7SfNWJuqGStQ6c7wS:dymj8inOnHTS6Z5dK77wS

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
    "C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe

    Filesize

    343KB

    MD5

    a5e1f3b0b34d889fbd3f5a4cd856940f

    SHA1

    1019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99

    SHA256

    3eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8

    SHA512

    5259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe

    Filesize

    343KB

    MD5

    a5e1f3b0b34d889fbd3f5a4cd856940f

    SHA1

    1019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99

    SHA256

    3eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8

    SHA512

    5259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe

    Filesize

    343KB

    MD5

    a5e1f3b0b34d889fbd3f5a4cd856940f

    SHA1

    1019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99

    SHA256

    3eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8

    SHA512

    5259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe

    Filesize

    343KB

    MD5

    a5e1f3b0b34d889fbd3f5a4cd856940f

    SHA1

    1019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99

    SHA256

    3eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8

    SHA512

    5259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • memory/432-72-0x00000000008C0000-0x00000000008CA000-memory.dmp

    Filesize

    40KB

  • memory/468-114-0x00000000026F0000-0x0000000002730000-memory.dmp

    Filesize

    256KB

  • memory/468-94-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-96-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-98-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-100-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-102-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-104-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-106-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-108-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-110-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-112-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-113-0x0000000000270000-0x000000000029D000-memory.dmp

    Filesize

    180KB

  • memory/468-92-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-115-0x00000000026F0000-0x0000000002730000-memory.dmp

    Filesize

    256KB

  • memory/468-116-0x0000000000400000-0x0000000000864000-memory.dmp

    Filesize

    4.4MB

  • memory/468-117-0x0000000000400000-0x0000000000864000-memory.dmp

    Filesize

    4.4MB

  • memory/468-90-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-88-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-86-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-85-0x0000000000900000-0x0000000000912000-memory.dmp

    Filesize

    72KB

  • memory/468-84-0x0000000000900000-0x0000000000918000-memory.dmp

    Filesize

    96KB

  • memory/468-83-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/1884-129-0x0000000000BD0000-0x0000000000C14000-memory.dmp

    Filesize

    272KB

  • memory/1884-149-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-130-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-131-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-133-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-135-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-139-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-137-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-143-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-141-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-145-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-128-0x0000000000B90000-0x0000000000BD6000-memory.dmp

    Filesize

    280KB

  • memory/1884-147-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-151-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-157-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-155-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-153-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-163-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-161-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-159-0x0000000000BD0000-0x0000000000C0E000-memory.dmp

    Filesize

    248KB

  • memory/1884-583-0x0000000000240000-0x000000000028B000-memory.dmp

    Filesize

    300KB

  • memory/1884-585-0x0000000000B00000-0x0000000000B40000-memory.dmp

    Filesize

    256KB

  • memory/1884-587-0x0000000000B00000-0x0000000000B40000-memory.dmp

    Filesize

    256KB

  • memory/1884-1039-0x0000000000B00000-0x0000000000B40000-memory.dmp

    Filesize

    256KB