Analysis

  • max time kernel
    52s
  • max time network
    181s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-03-2023 04:49

General

  • Target

    3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe

  • Size

    705KB

  • MD5

    ea1feb0abf31d4223e3ac84ab4e55916

  • SHA1

    e12551850ee0bde498cda0e9950f7288a8b2cfed

  • SHA256

    3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b

  • SHA512

    d2780eba841ab324655997f978a50a7d7c4bc79fad5d4bd65a338e85040dd931e7356dd9dc0422762d8d941a452b931cac2ab2dd96aa692db38661c77a9b11ea

  • SSDEEP

    12288:+Mrny90hKmjwm5n52FnHTS6r7SfNWJuqGStQ6c7wS:dymj8inOnHTS6Z5dK77wS

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe
    "C:\Users\Admin\AppData\Local\Temp\3a222688048df51a4cdec849423f35bd8c2bdb7d552a08bc0b01b26088f3665b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dyceq67.exe

    Filesize

    427KB

    MD5

    8f2ca724913cd4307f17f28b7881287e

    SHA1

    a773d2eaa2adee6ae3a4ddb2a68a7fb2bde8acbb

    SHA256

    ef3d17669069ba696040542442de22ee095d027f0cc26ea261f89be4fc5a6e45

    SHA512

    88cf5a0c7a1308495c42006044883abd0219741238b2bb4fe7d03f60fbee01beb95c20e7c07aa47385dec8c567e7cb46f3f0fc65066857b9c27221f912183d66

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe

    Filesize

    343KB

    MD5

    a5e1f3b0b34d889fbd3f5a4cd856940f

    SHA1

    1019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99

    SHA256

    3eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8

    SHA512

    5259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice9102.exe

    Filesize

    343KB

    MD5

    a5e1f3b0b34d889fbd3f5a4cd856940f

    SHA1

    1019e4e087aaf4f0ecd2d0a01bfdb33ec4a73a99

    SHA256

    3eff0ccd31c921f5588300627a41ee47802f2a1cb7c1438f4581426a97fa99d8

    SHA512

    5259d0673320023d7176fdf33c5d91229435bc31e0abb5ed3522424871a7715c649f4d0fad186631c260a791d2e370f5ac05da679bf15db4ed2baed6a80d33d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3805Ve.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c51gp51.exe

    Filesize

    376KB

    MD5

    bff09b0b2e95855edf0d19a2016fdd90

    SHA1

    41934a2817ef8c187b6747c6e3d8bdc4589f782e

    SHA256

    a3aed0b5f1e9c80a2e31adb7720ea91134325d8428ffe3782c4be1cd2939f0dc

    SHA512

    2629e909479e16eefbb0e68d8bab835a2754520cbeff797779eb2ab043c2cf91f11555f108b6c11c91076fbbcb909b45bdfccbbf52d51b398b4300010714c44e

  • memory/1388-290-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-1099-0x00000000056C0000-0x0000000005CC6000-memory.dmp

    Filesize

    6.0MB

  • memory/1388-1115-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-1114-0x0000000006780000-0x0000000006CAC000-memory.dmp

    Filesize

    5.2MB

  • memory/1388-1113-0x00000000065A0000-0x0000000006762000-memory.dmp

    Filesize

    1.8MB

  • memory/1388-202-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-200-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-1111-0x0000000006490000-0x0000000006506000-memory.dmp

    Filesize

    472KB

  • memory/1388-1110-0x00000000060B0000-0x0000000006142000-memory.dmp

    Filesize

    584KB

  • memory/1388-198-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-1109-0x00000000054C0000-0x0000000005526000-memory.dmp

    Filesize

    408KB

  • memory/1388-1108-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-1107-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-1106-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-1104-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-1103-0x0000000005330000-0x000000000537B000-memory.dmp

    Filesize

    300KB

  • memory/1388-1102-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/1388-1101-0x00000000051C0000-0x00000000051D2000-memory.dmp

    Filesize

    72KB

  • memory/1388-1100-0x00000000050B0000-0x00000000051BA000-memory.dmp

    Filesize

    1.0MB

  • memory/1388-212-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-294-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-288-0x0000000000600000-0x000000000064B000-memory.dmp

    Filesize

    300KB

  • memory/1388-292-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1388-206-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-208-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-210-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-220-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-222-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-214-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-187-0x0000000002180000-0x00000000021C6000-memory.dmp

    Filesize

    280KB

  • memory/1388-188-0x0000000004A60000-0x0000000004AA4000-memory.dmp

    Filesize

    272KB

  • memory/1388-190-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-189-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-196-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-1112-0x0000000006520000-0x0000000006570000-memory.dmp

    Filesize

    320KB

  • memory/1388-218-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-216-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-194-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-192-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/1388-204-0x0000000004A60000-0x0000000004A9E000-memory.dmp

    Filesize

    248KB

  • memory/2940-171-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-169-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-147-0x0000000002670000-0x0000000002688000-memory.dmp

    Filesize

    96KB

  • memory/2940-141-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2940-142-0x0000000000C10000-0x0000000000C2A000-memory.dmp

    Filesize

    104KB

  • memory/2940-182-0x0000000000400000-0x0000000000864000-memory.dmp

    Filesize

    4.4MB

  • memory/2940-180-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/2940-179-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/2940-178-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/2940-144-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/2940-177-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2940-176-0x0000000000400000-0x0000000000864000-memory.dmp

    Filesize

    4.4MB

  • memory/2940-175-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-173-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-143-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/2940-153-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-167-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-165-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-163-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-161-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-159-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-157-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-155-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-151-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-149-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-148-0x0000000002670000-0x0000000002682000-memory.dmp

    Filesize

    72KB

  • memory/2940-146-0x0000000005040000-0x000000000553E000-memory.dmp

    Filesize

    5.0MB

  • memory/2940-145-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/3832-135-0x00000000004D0000-0x00000000004DA000-memory.dmp

    Filesize

    40KB