Analysis

  • max time kernel
    50s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/03/2023, 05:44

General

  • Target

    fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe

  • Size

    875KB

  • MD5

    1c554b64550fd91edf02aa244c3c92bb

  • SHA1

    208150956f636668db1c8f92be5f16b48f035466

  • SHA256

    fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e

  • SHA512

    e9b7e702c7ea87b31786d232ff561deba624386a61f91366ae24f7bb3cac84b744bbe26b628286fbe72ef7d1243a8f83cf9b7aa60dbef9c80610fb6fdb52ab69

  • SSDEEP

    24576:PyVPjvuwLdrNUdT2hL1utQS1HSDJTeizDoP:aVbvuIxUshL1AHSdT

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

rita

C2

193.233.20.28:4125

Attributes
  • auth_value

    5cf1bcf41b0a2f3710619223451dfd3a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe
    "C:\Users\Admin\AppData\Local\Temp\fc3de59498636a4cd9b697f2fa078037e4d69e4470c7d97049d30c2c5bf3e85e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4564
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e33TG38.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e33TG38.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e33TG38.exe

          Filesize

          175KB

          MD5

          8b0ea3120d3d291045b26bcea5ccef54

          SHA1

          07ed9587057ae936ca0610051142a4add4f7b6aa

          SHA256

          6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

          SHA512

          6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e33TG38.exe

          Filesize

          175KB

          MD5

          8b0ea3120d3d291045b26bcea5ccef54

          SHA1

          07ed9587057ae936ca0610051142a4add4f7b6aa

          SHA256

          6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

          SHA512

          6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe

          Filesize

          731KB

          MD5

          cac18e6ffcb0aff970d1721f2e763619

          SHA1

          5488e590ea27f95f0381e6bead24196bedf4f6c1

          SHA256

          bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128

          SHA512

          a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9085.exe

          Filesize

          731KB

          MD5

          cac18e6ffcb0aff970d1721f2e763619

          SHA1

          5488e590ea27f95f0381e6bead24196bedf4f6c1

          SHA256

          bd738e4eadce9615cea81ae4aa2a2fd2821cfbd8f0da72f37fc9e59df4934128

          SHA512

          a823156e30a803922c73d299845548a74e65c341cbe9f04c20e583b524340c7cae13da03b9dee4e2fffe234e34677f1f1d2bc7bea571c31e115e4a63a550682f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe

          Filesize

          409KB

          MD5

          6c818ec8d3828554770537a6a2d0fe7d

          SHA1

          90cab6f36316d51363a3d80fc33d1699a404433f

          SHA256

          9cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588

          SHA512

          c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOCmp49.exe

          Filesize

          409KB

          MD5

          6c818ec8d3828554770537a6a2d0fe7d

          SHA1

          90cab6f36316d51363a3d80fc33d1699a404433f

          SHA256

          9cce3bf35f9a52533003b1c0519559e0806ec540ada13aea6c414c65a33bb588

          SHA512

          c0eb2a0ed73075eff446c6e05dcca814b63fc3dfd1769d646a40cfd1daf48e2c1ebc61f08c6f4bc07b8c2aa369cda4424b26adcf709f9a6263a4d622641649b5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe

          Filesize

          366KB

          MD5

          752536930b8c7e3092815baa5d889a5b

          SHA1

          9156a270f543c9c9e30ca83258b511d9b6239758

          SHA256

          ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e

          SHA512

          0b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3354.exe

          Filesize

          366KB

          MD5

          752536930b8c7e3092815baa5d889a5b

          SHA1

          9156a270f543c9c9e30ca83258b511d9b6239758

          SHA256

          ae243556ab9d490c0f9978d48df703740ab0a5ffc3f99d923acda206faa2566e

          SHA512

          0b3f32996686956ba327b134d17f25dbe2ae71dfcb6c0144cd974e4ce054aaa622cb7a093f3fe06bca633578d9b7be41996c9646f9873c79cb17c8bb4f984814

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3009iF.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe

          Filesize

          351KB

          MD5

          40603ee9a465eb9d5eb53ae76f163963

          SHA1

          0ca5026a09120f0648a4619f7af3729c05e36a33

          SHA256

          c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098

          SHA512

          386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c30Po16.exe

          Filesize

          351KB

          MD5

          40603ee9a465eb9d5eb53ae76f163963

          SHA1

          0ca5026a09120f0648a4619f7af3729c05e36a33

          SHA256

          c0edf7ca5a8482805d6f2fcd4e9cb4e165c1ea390e1fbf3c46aca419a221d098

          SHA512

          386d8a94cc263cc76dc24c3ffd5a04f05b346a8f8d1ecc14a2dad54025e017612c06624c22d1667f16a66831d5d24d233c010746cdbc9dcdcc21931b39249d30

        • memory/4564-141-0x00000000001A0000-0x00000000001AA000-memory.dmp

          Filesize

          40KB

        • memory/4756-147-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4756-148-0x0000000004770000-0x000000000478A000-memory.dmp

          Filesize

          104KB

        • memory/4756-149-0x0000000007220000-0x000000000771E000-memory.dmp

          Filesize

          5.0MB

        • memory/4756-150-0x0000000004940000-0x0000000004958000-memory.dmp

          Filesize

          96KB

        • memory/4756-151-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-152-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-154-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-156-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-158-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-160-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-162-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-164-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-166-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-168-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-170-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-172-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-174-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-176-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-178-0x0000000004940000-0x0000000004952000-memory.dmp

          Filesize

          72KB

        • memory/4756-179-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/4756-180-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/4756-181-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/4756-182-0x0000000000400000-0x0000000002B1C000-memory.dmp

          Filesize

          39.1MB

        • memory/4756-185-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/4756-186-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/4756-187-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/4756-184-0x0000000000400000-0x0000000002B1C000-memory.dmp

          Filesize

          39.1MB

        • memory/4936-192-0x0000000004680000-0x00000000046C6000-memory.dmp

          Filesize

          280KB

        • memory/4936-193-0x0000000007090000-0x00000000070D4000-memory.dmp

          Filesize

          272KB

        • memory/4936-194-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-195-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-197-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-199-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-201-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-203-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-205-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-207-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-210-0x0000000002C50000-0x0000000002C9B000-memory.dmp

          Filesize

          300KB

        • memory/4936-212-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-209-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-213-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-216-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-217-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-215-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-219-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-221-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-223-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-225-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-227-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-229-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-231-0x0000000007090000-0x00000000070CE000-memory.dmp

          Filesize

          248KB

        • memory/4936-1104-0x0000000007D90000-0x0000000008396000-memory.dmp

          Filesize

          6.0MB

        • memory/4936-1105-0x0000000007800000-0x000000000790A000-memory.dmp

          Filesize

          1.0MB

        • memory/4936-1106-0x0000000007940000-0x0000000007952000-memory.dmp

          Filesize

          72KB

        • memory/4936-1107-0x0000000007960000-0x000000000799E000-memory.dmp

          Filesize

          248KB

        • memory/4936-1108-0x0000000007AB0000-0x0000000007AFB000-memory.dmp

          Filesize

          300KB

        • memory/4936-1109-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-1111-0x0000000007C40000-0x0000000007CD2000-memory.dmp

          Filesize

          584KB

        • memory/4936-1112-0x0000000007CE0000-0x0000000007D46000-memory.dmp

          Filesize

          408KB

        • memory/4936-1113-0x0000000008A00000-0x0000000008BC2000-memory.dmp

          Filesize

          1.8MB

        • memory/4936-1114-0x0000000008BD0000-0x00000000090FC000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-1115-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-1116-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-1117-0x0000000007120000-0x0000000007130000-memory.dmp

          Filesize

          64KB

        • memory/4936-1118-0x0000000009370000-0x00000000093E6000-memory.dmp

          Filesize

          472KB

        • memory/4936-1119-0x00000000093F0000-0x0000000009440000-memory.dmp

          Filesize

          320KB

        • memory/5020-1125-0x0000000000270000-0x00000000002A2000-memory.dmp

          Filesize

          200KB

        • memory/5020-1126-0x0000000004CE0000-0x0000000004D2B000-memory.dmp

          Filesize

          300KB

        • memory/5020-1127-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB