Analysis

  • max time kernel
    81s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 08:46

General

  • Target

    aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe

  • Size

    875KB

  • MD5

    9ed199a3c0336ecb3dec86b9977ede36

  • SHA1

    83991734d9f28abc1b8d996d3dc825bee32f1bae

  • SHA256

    aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e

  • SHA512

    5cd7afc06d9c2a10f3159072020a9bef1ac4fde7443ce96c1c7d2fc5f4de34e7c4562cd6e2bdf13e5d799f5f0b60ae058cc1c265dde8fb4947bc8f7eecbc09d7

  • SSDEEP

    24576:3y0ztfqNjpQJIsCxjgDaw7owhNc2CrnWMsZ2:CU5+1rxjgT7n+zSD

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

rita

C2

193.233.20.28:4125

Attributes
  • auth_value

    5cf1bcf41b0a2f3710619223451dfd3a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe
    "C:\Users\Admin\AppData\Local\Temp\aefe503bd84d6029f85336e94696b8e34ec83dd1f80e9162a038e96ad322685e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7857.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7857.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2926.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2926.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0749qF.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0749qF.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:892
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23xD56.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23xD56.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 1080
            5⤵
            • Program crash
            PID:5100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dVLbY05.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dVLbY05.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 1340
          4⤵
          • Program crash
          PID:3192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e93KT66.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e93KT66.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3856 -ip 3856
    1⤵
      PID:1280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4388 -ip 4388
      1⤵
        PID:1480

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e93KT66.exe

              Filesize

              175KB

              MD5

              8b0ea3120d3d291045b26bcea5ccef54

              SHA1

              07ed9587057ae936ca0610051142a4add4f7b6aa

              SHA256

              6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

              SHA512

              6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e93KT66.exe

              Filesize

              175KB

              MD5

              8b0ea3120d3d291045b26bcea5ccef54

              SHA1

              07ed9587057ae936ca0610051142a4add4f7b6aa

              SHA256

              6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

              SHA512

              6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7857.exe

              Filesize

              730KB

              MD5

              7afd0db9e5c81734b7ab3070bb84a250

              SHA1

              d092928b32d2b27b1705b341e54af83da35e17fb

              SHA256

              4bbca8d7289ced21fbda01114fd51d33369df264fe24dd9db1ac22cb8610f1f9

              SHA512

              d6394d0f0272dab08af28038070e726f8d8ae6f15765be27172ca256b1f4bf23fcc647338a3804dd033f31040a6275fbfe61feec4f76755affe73c12ab83878f

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7857.exe

              Filesize

              730KB

              MD5

              7afd0db9e5c81734b7ab3070bb84a250

              SHA1

              d092928b32d2b27b1705b341e54af83da35e17fb

              SHA256

              4bbca8d7289ced21fbda01114fd51d33369df264fe24dd9db1ac22cb8610f1f9

              SHA512

              d6394d0f0272dab08af28038070e726f8d8ae6f15765be27172ca256b1f4bf23fcc647338a3804dd033f31040a6275fbfe61feec4f76755affe73c12ab83878f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dVLbY05.exe

              Filesize

              408KB

              MD5

              3e0d3fd8290daf3488dd3657882ef7b6

              SHA1

              845cc0275cc5aa92adfe1095793660d3af407c1f

              SHA256

              0f56f2bd086c93e1118204b2fe561033a6aee4d3e32489cfd2e7008a05b5d2b6

              SHA512

              344f18dae3dbf9062e5240cd1149bebb879b271426e98e61524f8fd66899ebe9636bcc366ed06e47432872cf0551c00a3192c427af8ab3d72e12c2081f13b892

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dVLbY05.exe

              Filesize

              408KB

              MD5

              3e0d3fd8290daf3488dd3657882ef7b6

              SHA1

              845cc0275cc5aa92adfe1095793660d3af407c1f

              SHA256

              0f56f2bd086c93e1118204b2fe561033a6aee4d3e32489cfd2e7008a05b5d2b6

              SHA512

              344f18dae3dbf9062e5240cd1149bebb879b271426e98e61524f8fd66899ebe9636bcc366ed06e47432872cf0551c00a3192c427af8ab3d72e12c2081f13b892

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2926.exe

              Filesize

              365KB

              MD5

              4a9b25ad4c76e89796fa1a1c9b4bfecf

              SHA1

              6d6acc6f9a67fb30d579b8c2b1c73f2d5624bf46

              SHA256

              d3c4539237b01972c1c2c5d43c7793c6bbefcc6b66e547af66674373d310521c

              SHA512

              1c8e449bca32a9279a78a5429c7ee85cf2cea79d0ed16404945f723fbd149b9f43281723ca128959b095cbc8612c8fcde8f88a0b88681024872733554b0a2240

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2926.exe

              Filesize

              365KB

              MD5

              4a9b25ad4c76e89796fa1a1c9b4bfecf

              SHA1

              6d6acc6f9a67fb30d579b8c2b1c73f2d5624bf46

              SHA256

              d3c4539237b01972c1c2c5d43c7793c6bbefcc6b66e547af66674373d310521c

              SHA512

              1c8e449bca32a9279a78a5429c7ee85cf2cea79d0ed16404945f723fbd149b9f43281723ca128959b095cbc8612c8fcde8f88a0b88681024872733554b0a2240

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0749qF.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0749qF.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23xD56.exe

              Filesize

              350KB

              MD5

              2fb114a60b673047139bf6e34aa705dc

              SHA1

              9f7a56042897eae8538c9968db8a02e1f7a47a96

              SHA256

              f038fe763ad396c488b7aabd8f9e4152d16ab700f2d32a49090c5b3ae4b7557b

              SHA512

              18e850bbcc77ff4696ba128fdf2d61d87d6dbab1f5d236b5deeedb7757f909765f5552148687de7bdc988c916755962c206d49dbbdc6c5b8c8f6decda3a24da4

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23xD56.exe

              Filesize

              350KB

              MD5

              2fb114a60b673047139bf6e34aa705dc

              SHA1

              9f7a56042897eae8538c9968db8a02e1f7a47a96

              SHA256

              f038fe763ad396c488b7aabd8f9e4152d16ab700f2d32a49090c5b3ae4b7557b

              SHA512

              18e850bbcc77ff4696ba128fdf2d61d87d6dbab1f5d236b5deeedb7757f909765f5552148687de7bdc988c916755962c206d49dbbdc6c5b8c8f6decda3a24da4

            • memory/892-154-0x0000000000DF0000-0x0000000000DFA000-memory.dmp

              Filesize

              40KB

            • memory/3856-197-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/3856-161-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/3856-162-0x00000000070E0000-0x0000000007684000-memory.dmp

              Filesize

              5.6MB

            • memory/3856-163-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-164-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-166-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-168-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-170-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-172-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-174-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-176-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-178-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-180-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-182-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-184-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-186-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-188-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-190-0x0000000004C40000-0x0000000004C52000-memory.dmp

              Filesize

              72KB

            • memory/3856-191-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/3856-192-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/3856-193-0x0000000000400000-0x0000000002B1B000-memory.dmp

              Filesize

              39.1MB

            • memory/3856-194-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/3856-196-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/3856-160-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

              Filesize

              180KB

            • memory/3856-198-0x0000000000400000-0x0000000002B1B000-memory.dmp

              Filesize

              39.1MB

            • memory/4388-214-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-236-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-206-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-208-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-210-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-212-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-203-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-216-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-218-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-222-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-221-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/4388-223-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/4388-219-0x0000000002CC0000-0x0000000002D0B000-memory.dmp

              Filesize

              300KB

            • memory/4388-225-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/4388-226-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-228-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-230-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-232-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-234-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-204-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-238-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-240-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/4388-1113-0x00000000077B0000-0x0000000007DC8000-memory.dmp

              Filesize

              6.1MB

            • memory/4388-1114-0x0000000007DD0000-0x0000000007EDA000-memory.dmp

              Filesize

              1.0MB

            • memory/4388-1115-0x0000000007F10000-0x0000000007F22000-memory.dmp

              Filesize

              72KB

            • memory/4388-1116-0x0000000007F30000-0x0000000007F6C000-memory.dmp

              Filesize

              240KB

            • memory/4388-1117-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/4388-1119-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/4388-1120-0x0000000008220000-0x0000000008286000-memory.dmp

              Filesize

              408KB

            • memory/4388-1121-0x00000000088E0000-0x0000000008972000-memory.dmp

              Filesize

              584KB

            • memory/4388-1122-0x0000000008D70000-0x0000000008F32000-memory.dmp

              Filesize

              1.8MB

            • memory/4388-1123-0x0000000008F40000-0x000000000946C000-memory.dmp

              Filesize

              5.2MB

            • memory/4388-1124-0x000000000A740000-0x000000000A7B6000-memory.dmp

              Filesize

              472KB

            • memory/4388-1125-0x000000000A7C0000-0x000000000A810000-memory.dmp

              Filesize

              320KB

            • memory/4388-1126-0x00000000049D0000-0x00000000049E0000-memory.dmp

              Filesize

              64KB

            • memory/4532-1132-0x00000000004E0000-0x0000000000512000-memory.dmp

              Filesize

              200KB

            • memory/4532-1133-0x0000000004E00000-0x0000000004E10000-memory.dmp

              Filesize

              64KB