Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 07:20

General

  • Target

    bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe

  • Size

    875KB

  • MD5

    34df3b34ca269169ab45969d37d2bb41

  • SHA1

    c38af40a551aa77493785711fc8b259ba1461991

  • SHA256

    bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741

  • SHA512

    1131b8c96dd2f03046680ff34a11ca7f89dc274f65340c7c88f8f71edf68f5e1a1ad4fcb967bde59a53e1118343b299db8172e6c2a1605edb6c41d85928f6e59

  • SSDEEP

    12288:PMrxy90J+U5Ly76h3lP573nscdjdCfwBc6tgzzprU4jXSPaShGSAxbX+qVjVO/DT:Cy05Ly761l5g8jdCKCG4ePaXS94hObT

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe
    "C:\Users\Admin\AppData\Local\Temp\bbb990023ae2222eca1c0dde10b916ab1079e89634681546a3351821c0353741.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2692.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2692.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6843.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6843.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9287Uy.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9287Uy.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Il43.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Il43.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1652
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 1084
            5⤵
            • Program crash
            PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dncrk09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dncrk09.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1652 -ip 1652
    1⤵
      PID:1216

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2692.exe

      Filesize

      730KB

      MD5

      5d0d6e670da22114593f774986bdde65

      SHA1

      b4abb1977720a2216eff1dce50e814c79460c5aa

      SHA256

      a4216f3f36f8e30489f552a4e6050e8dc50c198782ca476223a9182415f49f03

      SHA512

      702ce5b4fe148a8556e1f28803ec9d2551ed542ca1a4805f9c24ca53927373d75564162ce7a855ccac7f4db67f6f37523d1c00168746e471465b0b44fdacc9a5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2692.exe

      Filesize

      730KB

      MD5

      5d0d6e670da22114593f774986bdde65

      SHA1

      b4abb1977720a2216eff1dce50e814c79460c5aa

      SHA256

      a4216f3f36f8e30489f552a4e6050e8dc50c198782ca476223a9182415f49f03

      SHA512

      702ce5b4fe148a8556e1f28803ec9d2551ed542ca1a4805f9c24ca53927373d75564162ce7a855ccac7f4db67f6f37523d1c00168746e471465b0b44fdacc9a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dncrk09.exe

      Filesize

      409KB

      MD5

      682d5d23c6a8d907c2a031cb308754f5

      SHA1

      c190258b39c14b3da8aa60e583fa620fb4714695

      SHA256

      101397632a447029cbda14e56df92c0dae86053fdfc84879431c2e7c40cc2385

      SHA512

      bb1064445b2c60a571d9189fad73694257c79950de67b497a6a776726179c2fb8d5d867e12f099054cd63db119005b604719ec72873e40b661b1d4d51cbe9374

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dncrk09.exe

      Filesize

      409KB

      MD5

      682d5d23c6a8d907c2a031cb308754f5

      SHA1

      c190258b39c14b3da8aa60e583fa620fb4714695

      SHA256

      101397632a447029cbda14e56df92c0dae86053fdfc84879431c2e7c40cc2385

      SHA512

      bb1064445b2c60a571d9189fad73694257c79950de67b497a6a776726179c2fb8d5d867e12f099054cd63db119005b604719ec72873e40b661b1d4d51cbe9374

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6843.exe

      Filesize

      365KB

      MD5

      70c50312a24b23ec655b5c26b4fe6ae0

      SHA1

      714835fd5485349ca5db1fd3dd69063f3a4d86ab

      SHA256

      d2968ccad261b137207c8aa0888b3e3e1e3fe21a1de51578054d9e8336551b0c

      SHA512

      73bd22c835622514f573d301658cf4aa9235d214babdf8c57ec4b8722be43e015681b746d5730331aa41c00cd669766cd8a3ebb4eb541c8ac7df37ff69cfbcc8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6843.exe

      Filesize

      365KB

      MD5

      70c50312a24b23ec655b5c26b4fe6ae0

      SHA1

      714835fd5485349ca5db1fd3dd69063f3a4d86ab

      SHA256

      d2968ccad261b137207c8aa0888b3e3e1e3fe21a1de51578054d9e8336551b0c

      SHA512

      73bd22c835622514f573d301658cf4aa9235d214babdf8c57ec4b8722be43e015681b746d5730331aa41c00cd669766cd8a3ebb4eb541c8ac7df37ff69cfbcc8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9287Uy.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9287Uy.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Il43.exe

      Filesize

      351KB

      MD5

      7ee75eabf13665c136fda3d3828beb0d

      SHA1

      549821cdb87611d59ed9b24b83a0f25c383dc5ad

      SHA256

      672d2877e18029e2bdcb0b32b01bca0bec170f3f805757815eae84d3e662fc29

      SHA512

      152430e66587f84b2b296621fa79fc54399c5eae86ad9e581748661469927751187b92e4ea9944838d4bf4a1c246785d75e5833266bf1f8b7c3cb30c72e7aeee

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c88Il43.exe

      Filesize

      351KB

      MD5

      7ee75eabf13665c136fda3d3828beb0d

      SHA1

      549821cdb87611d59ed9b24b83a0f25c383dc5ad

      SHA256

      672d2877e18029e2bdcb0b32b01bca0bec170f3f805757815eae84d3e662fc29

      SHA512

      152430e66587f84b2b296621fa79fc54399c5eae86ad9e581748661469927751187b92e4ea9944838d4bf4a1c246785d75e5833266bf1f8b7c3cb30c72e7aeee

    • memory/1652-161-0x0000000002BF0000-0x0000000002C1D000-memory.dmp

      Filesize

      180KB

    • memory/1652-162-0x0000000007360000-0x0000000007904000-memory.dmp

      Filesize

      5.6MB

    • memory/1652-163-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-164-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-166-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-168-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-170-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-172-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-174-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-176-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-178-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-180-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-182-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-184-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-186-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-188-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-190-0x0000000004B20000-0x0000000004B32000-memory.dmp

      Filesize

      72KB

    • memory/1652-191-0x0000000007350000-0x0000000007360000-memory.dmp

      Filesize

      64KB

    • memory/1652-192-0x0000000007350000-0x0000000007360000-memory.dmp

      Filesize

      64KB

    • memory/1652-193-0x0000000000400000-0x0000000002B1C000-memory.dmp

      Filesize

      39.1MB

    • memory/1652-194-0x0000000007350000-0x0000000007360000-memory.dmp

      Filesize

      64KB

    • memory/1652-195-0x0000000007350000-0x0000000007360000-memory.dmp

      Filesize

      64KB

    • memory/1652-196-0x0000000007350000-0x0000000007360000-memory.dmp

      Filesize

      64KB

    • memory/1652-198-0x0000000000400000-0x0000000002B1C000-memory.dmp

      Filesize

      39.1MB

    • memory/2996-154-0x0000000000E40000-0x0000000000E4A000-memory.dmp

      Filesize

      40KB

    • memory/2996-156-0x000000001B970000-0x000000001BABE000-memory.dmp

      Filesize

      1.3MB

    • memory/4256-203-0x0000000004780000-0x00000000047CB000-memory.dmp

      Filesize

      300KB

    • memory/4256-204-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB

    • memory/4256-206-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-207-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-205-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB

    • memory/4256-209-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-211-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-213-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-215-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-217-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-219-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-221-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-223-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-225-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-227-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-229-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-231-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-233-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-235-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-237-0x00000000076C0000-0x00000000076FE000-memory.dmp

      Filesize

      248KB

    • memory/4256-1112-0x0000000007730000-0x0000000007D48000-memory.dmp

      Filesize

      6.1MB

    • memory/4256-1113-0x0000000007DD0000-0x0000000007EDA000-memory.dmp

      Filesize

      1.0MB

    • memory/4256-1114-0x0000000007F10000-0x0000000007F22000-memory.dmp

      Filesize

      72KB

    • memory/4256-1115-0x0000000007F30000-0x0000000007F6C000-memory.dmp

      Filesize

      240KB

    • memory/4256-1116-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB

    • memory/4256-1118-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB

    • memory/4256-1119-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB

    • memory/4256-1120-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB

    • memory/4256-1121-0x00000000070C0000-0x00000000070D0000-memory.dmp

      Filesize

      64KB