Analysis

  • max time kernel
    93s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 11:19

General

  • Target

    ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe

  • Size

    874KB

  • MD5

    b94127c0c7490cd5db6c1e460bebc039

  • SHA1

    beb9599a00aaa968148b6c226704de37df804387

  • SHA256

    ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0

  • SHA512

    a4d4424cd97ab801001871210f2886d7d6556891247ad586cd0cac17e355e105f3df420580240a4c3d7fa655cd6d8d5214d33b183715b16aedf67c0430f77161

  • SSDEEP

    12288:eMrgy90bI+Pt0VGxbrv0oj/wIohFpGNOpNjeLqOZ0aSBhrS+mtp40JES7ZQUMgdH:WySIYuVG5LMF0EvEPSnrcrETUMkWY

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe
    "C:\Users\Admin\AppData\Local\Temp\ed282cf3a5f6d0ae7764dff2ae1efb050c837f4d388f3b06c667cabe3527e0d0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9930.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9930.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6859.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6859.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1392so.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1392so.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56xd69.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56xd69.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1096
            5⤵
            • Program crash
            PID:1340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diTyr63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diTyr63.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1348
          4⤵
          • Program crash
          PID:3260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e69if03.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e69if03.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1860 -ip 1860
    1⤵
      PID:2424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1172 -ip 1172
      1⤵
        PID:992

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e69if03.exe

              Filesize

              175KB

              MD5

              795f3fe5687db9b19853eaf6acdc389a

              SHA1

              cd1ba862909c58a01d3a8e44c29cb71bb6b50630

              SHA256

              448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

              SHA512

              d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e69if03.exe

              Filesize

              175KB

              MD5

              795f3fe5687db9b19853eaf6acdc389a

              SHA1

              cd1ba862909c58a01d3a8e44c29cb71bb6b50630

              SHA256

              448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

              SHA512

              d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9930.exe

              Filesize

              729KB

              MD5

              4d6170c128bef3d25d6526417894314e

              SHA1

              7d866c2ab91a3ffc11616e0ee4c7ae895291c582

              SHA256

              3910f09e6a53425e4b793905c6bbec83f982620bed0e158c64e319291dd6e637

              SHA512

              f71d4e7fd2bc1dd889b9a4852719acc5fa9fc089407a01a3d66a6ae1fcaaf11d4c493f729b1623e7850bfaa07f7c30cd3036214530477e1fbfe3f784c2fb8be0

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9930.exe

              Filesize

              729KB

              MD5

              4d6170c128bef3d25d6526417894314e

              SHA1

              7d866c2ab91a3ffc11616e0ee4c7ae895291c582

              SHA256

              3910f09e6a53425e4b793905c6bbec83f982620bed0e158c64e319291dd6e637

              SHA512

              f71d4e7fd2bc1dd889b9a4852719acc5fa9fc089407a01a3d66a6ae1fcaaf11d4c493f729b1623e7850bfaa07f7c30cd3036214530477e1fbfe3f784c2fb8be0

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diTyr63.exe

              Filesize

              408KB

              MD5

              14b7ce905f66a4ffa96811b4d35d83c3

              SHA1

              ef7ecc810bed1819d4c7a4a885d1ba16beb476eb

              SHA256

              ec80b2d311892f4ade3679a9c8d4c80d9c5cbdc41da4632d6447d9a98e12a0b2

              SHA512

              450b55a8e6ab9e51659f78a8045aee384a518c1d0ad9fea1080a5bc931194ed06f6d0f86908fb42484c4c601f15e1d95dba5ac5f0d21ae20557bcdd485707546

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\diTyr63.exe

              Filesize

              408KB

              MD5

              14b7ce905f66a4ffa96811b4d35d83c3

              SHA1

              ef7ecc810bed1819d4c7a4a885d1ba16beb476eb

              SHA256

              ec80b2d311892f4ade3679a9c8d4c80d9c5cbdc41da4632d6447d9a98e12a0b2

              SHA512

              450b55a8e6ab9e51659f78a8045aee384a518c1d0ad9fea1080a5bc931194ed06f6d0f86908fb42484c4c601f15e1d95dba5ac5f0d21ae20557bcdd485707546

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6859.exe

              Filesize

              365KB

              MD5

              829693d279756b69ee21666eaefadd93

              SHA1

              573e524bb635f9f478917b1761da897b5cfb017b

              SHA256

              eb9aed307be2b9d2124420a77b4561bf326adfb65e249ff96a8144175735b28d

              SHA512

              2c05e5fb844cf1d820762259677f345b64b2097deeb10b7a698e185299aba2989dd709c3a7ba82ad7154e58c0a8ce22d86f0c0e6950fb7c22790165e225cac83

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6859.exe

              Filesize

              365KB

              MD5

              829693d279756b69ee21666eaefadd93

              SHA1

              573e524bb635f9f478917b1761da897b5cfb017b

              SHA256

              eb9aed307be2b9d2124420a77b4561bf326adfb65e249ff96a8144175735b28d

              SHA512

              2c05e5fb844cf1d820762259677f345b64b2097deeb10b7a698e185299aba2989dd709c3a7ba82ad7154e58c0a8ce22d86f0c0e6950fb7c22790165e225cac83

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1392so.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1392so.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56xd69.exe

              Filesize

              351KB

              MD5

              2ba1db05edad86dfb9151abe5f2b02be

              SHA1

              e59314bd2fad2b4c76ba7d0b8949e77455e71265

              SHA256

              ffb7aaf45b56423a5d311190231c8339fe2736a32965e132a36c357a41173ca1

              SHA512

              8415e2094b8dc8a22c3b63890f7e008b2a11f020046a733d91bf54e48bcbc6a7076e77315db827203b1f9d9e475d5f3e3edc2068b7865f29d8ae48988256b116

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c56xd69.exe

              Filesize

              351KB

              MD5

              2ba1db05edad86dfb9151abe5f2b02be

              SHA1

              e59314bd2fad2b4c76ba7d0b8949e77455e71265

              SHA256

              ffb7aaf45b56423a5d311190231c8339fe2736a32965e132a36c357a41173ca1

              SHA512

              8415e2094b8dc8a22c3b63890f7e008b2a11f020046a733d91bf54e48bcbc6a7076e77315db827203b1f9d9e475d5f3e3edc2068b7865f29d8ae48988256b116

            • memory/1172-240-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-1114-0x0000000007F10000-0x000000000801A000-memory.dmp

              Filesize

              1.0MB

            • memory/1172-1127-0x0000000008EE0000-0x000000000940C000-memory.dmp

              Filesize

              5.2MB

            • memory/1172-1126-0x0000000008D00000-0x0000000008EC2000-memory.dmp

              Filesize

              1.8MB

            • memory/1172-1125-0x0000000008B90000-0x0000000008BE0000-memory.dmp

              Filesize

              320KB

            • memory/1172-1124-0x0000000008B00000-0x0000000008B76000-memory.dmp

              Filesize

              472KB

            • memory/1172-1123-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-1122-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-1121-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-1120-0x0000000008400000-0x0000000008466000-memory.dmp

              Filesize

              408KB

            • memory/1172-1119-0x0000000008360000-0x00000000083F2000-memory.dmp

              Filesize

              584KB

            • memory/1172-1117-0x0000000008070000-0x00000000080AC000-memory.dmp

              Filesize

              240KB

            • memory/1172-1116-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-1115-0x0000000008050000-0x0000000008062000-memory.dmp

              Filesize

              72KB

            • memory/1172-1113-0x00000000078F0000-0x0000000007F08000-memory.dmp

              Filesize

              6.1MB

            • memory/1172-236-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-238-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-234-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-232-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-230-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-228-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-226-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-224-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-222-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-203-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-204-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-206-0x0000000002C80000-0x0000000002CCB000-memory.dmp

              Filesize

              300KB

            • memory/1172-208-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-210-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-211-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-214-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-213-0x00000000048A0000-0x00000000048B0000-memory.dmp

              Filesize

              64KB

            • memory/1172-207-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-216-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-218-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1172-220-0x0000000004B60000-0x0000000004B9E000-memory.dmp

              Filesize

              248KB

            • memory/1860-182-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-169-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1860-198-0x0000000000400000-0x0000000002B1C000-memory.dmp

              Filesize

              39.1MB

            • memory/1860-197-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1860-162-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-195-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1860-193-0x0000000000400000-0x0000000002B1C000-memory.dmp

              Filesize

              39.1MB

            • memory/1860-192-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-190-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-161-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-188-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-166-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1860-165-0x0000000002CC0000-0x0000000002CED000-memory.dmp

              Filesize

              180KB

            • memory/1860-186-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-196-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1860-180-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-178-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-176-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-174-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-172-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-164-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-168-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-171-0x0000000007310000-0x0000000007320000-memory.dmp

              Filesize

              64KB

            • memory/1860-184-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1860-160-0x0000000007320000-0x00000000078C4000-memory.dmp

              Filesize

              5.6MB

            • memory/2808-1133-0x0000000000100000-0x0000000000132000-memory.dmp

              Filesize

              200KB

            • memory/2808-1134-0x00000000049C0000-0x00000000049D0000-memory.dmp

              Filesize

              64KB

            • memory/4776-154-0x0000000000870000-0x000000000087A000-memory.dmp

              Filesize

              40KB