Analysis

  • max time kernel
    142s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-03-2023 13:08

General

  • Target

    5d3338b75593837444a708f30c0ac1471899024ab2dd4165c0fb28393684596a.exe

  • Size

    874KB

  • MD5

    03d1868c13b0f82edf05cca9e523a75e

  • SHA1

    64ccfbf1e642f03679d77ea2f1c4bcb272ee7385

  • SHA256

    5d3338b75593837444a708f30c0ac1471899024ab2dd4165c0fb28393684596a

  • SHA512

    e09ad335aebfda145e3a70688b8adc8e4108c45d200b36f521025930b069899773a203b911468d3a75b80e891f77a432127b1eb609f1ca1663e189917b58a97f

  • SSDEEP

    12288:bMrTy90NISOS0aq05RE7EcjFhDufw87ahs+m8ISMvkSNtoSw0mpBtoOZ7:MygLSmREoY0qg8IBvkLZpboOt

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d3338b75593837444a708f30c0ac1471899024ab2dd4165c0fb28393684596a.exe
    "C:\Users\Admin\AppData\Local\Temp\5d3338b75593837444a708f30c0ac1471899024ab2dd4165c0fb28393684596a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2342.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2342.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6442.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1263El.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1263El.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c33bI13.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c33bI13.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2288
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1084
            5⤵
            • Program crash
            PID:1344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAjix61.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAjix61.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 1328
          4⤵
          • Program crash
          PID:3512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e64Gj15.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e64Gj15.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2288 -ip 2288
    1⤵
      PID:464
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2540 -ip 2540
      1⤵
        PID:1144

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e64Gj15.exe

        Filesize

        175KB

        MD5

        795f3fe5687db9b19853eaf6acdc389a

        SHA1

        cd1ba862909c58a01d3a8e44c29cb71bb6b50630

        SHA256

        448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

        SHA512

        d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e64Gj15.exe

        Filesize

        175KB

        MD5

        795f3fe5687db9b19853eaf6acdc389a

        SHA1

        cd1ba862909c58a01d3a8e44c29cb71bb6b50630

        SHA256

        448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

        SHA512

        d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2342.exe

        Filesize

        729KB

        MD5

        d8cb5900d75a6267235b8fa959f8f140

        SHA1

        5de0b57b6c3faab0073aded4bd3f524a7372e67e

        SHA256

        01c43d2fde7d2bcccb0a150cd9cc49e1f066d5ada058a07ab636f0977cb2e9f0

        SHA512

        e8521dabf75b38e7fecb0433fa2b5b07aafe8da8ef4ccb8c8b536f71d389b670085b565d1d426e9984231f4313f01aa56bfbdab953ba11597d16aac9f3324c99

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2342.exe

        Filesize

        729KB

        MD5

        d8cb5900d75a6267235b8fa959f8f140

        SHA1

        5de0b57b6c3faab0073aded4bd3f524a7372e67e

        SHA256

        01c43d2fde7d2bcccb0a150cd9cc49e1f066d5ada058a07ab636f0977cb2e9f0

        SHA512

        e8521dabf75b38e7fecb0433fa2b5b07aafe8da8ef4ccb8c8b536f71d389b670085b565d1d426e9984231f4313f01aa56bfbdab953ba11597d16aac9f3324c99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAjix61.exe

        Filesize

        408KB

        MD5

        3aea24b1e1107270b173cc60caef0158

        SHA1

        a03aae670a0046904eda6c5605496991600c3db8

        SHA256

        9423d6fdd4e41384f0110ac6b1dd7358d5f532b2099f2a461a26fcfbbb88155c

        SHA512

        a8f28cae25a848ddb763b8e5f9ef7d360ba3dce94c851324634499718b2a70be267c475328d3ba40af10b3f072b53aadd05f27ed19d5153944e309fcb3c590de

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAjix61.exe

        Filesize

        408KB

        MD5

        3aea24b1e1107270b173cc60caef0158

        SHA1

        a03aae670a0046904eda6c5605496991600c3db8

        SHA256

        9423d6fdd4e41384f0110ac6b1dd7358d5f532b2099f2a461a26fcfbbb88155c

        SHA512

        a8f28cae25a848ddb763b8e5f9ef7d360ba3dce94c851324634499718b2a70be267c475328d3ba40af10b3f072b53aadd05f27ed19d5153944e309fcb3c590de

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6442.exe

        Filesize

        365KB

        MD5

        98f7802d824e1b41077cd5c5b7ef8d3e

        SHA1

        6ae359c1064cb41ef1634dcd689020295c9fba40

        SHA256

        e2df3873e0621cdca5bd51d4e5c5a8b054f8d5297acae0c3f06dc47f53df50a2

        SHA512

        f3bddc15ad271b5c1fb28a406e133e41d90ef5bfaed5667ced8e1d8961e92f2a9ed638c84fb87bc29482608282a63f341f6f62b17ae4095eddddf84967bb752c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6442.exe

        Filesize

        365KB

        MD5

        98f7802d824e1b41077cd5c5b7ef8d3e

        SHA1

        6ae359c1064cb41ef1634dcd689020295c9fba40

        SHA256

        e2df3873e0621cdca5bd51d4e5c5a8b054f8d5297acae0c3f06dc47f53df50a2

        SHA512

        f3bddc15ad271b5c1fb28a406e133e41d90ef5bfaed5667ced8e1d8961e92f2a9ed638c84fb87bc29482608282a63f341f6f62b17ae4095eddddf84967bb752c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1263El.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1263El.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c33bI13.exe

        Filesize

        351KB

        MD5

        6d7bfdf0b76d56fd9ab81746fb3b1594

        SHA1

        e1b9bd502cce8b780b8c40850c2bb72aa48e7bcc

        SHA256

        98ba556cc112b2f8174f7f9825c1d80b2196b16d0810224c1f2785ab64f35eb3

        SHA512

        9c277487b44fef40a7b31521afcb1e384889014c59bca7ed22cfba01035ddb19e3de40d341b50edfa3ee2b10f04b38c74be5b460746c8b8df77944d0c53bb6e8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c33bI13.exe

        Filesize

        351KB

        MD5

        6d7bfdf0b76d56fd9ab81746fb3b1594

        SHA1

        e1b9bd502cce8b780b8c40850c2bb72aa48e7bcc

        SHA256

        98ba556cc112b2f8174f7f9825c1d80b2196b16d0810224c1f2785ab64f35eb3

        SHA512

        9c277487b44fef40a7b31521afcb1e384889014c59bca7ed22cfba01035ddb19e3de40d341b50edfa3ee2b10f04b38c74be5b460746c8b8df77944d0c53bb6e8

      • memory/2288-165-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-179-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-163-0x0000000004B00000-0x0000000004B10000-memory.dmp

        Filesize

        64KB

      • memory/2288-164-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-161-0x0000000002C70000-0x0000000002C9D000-memory.dmp

        Filesize

        180KB

      • memory/2288-167-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-169-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-171-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-173-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-175-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-177-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-162-0x0000000004B00000-0x0000000004B10000-memory.dmp

        Filesize

        64KB

      • memory/2288-181-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-183-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-185-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-189-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-187-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-191-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2288-192-0x0000000000400000-0x0000000002B1C000-memory.dmp

        Filesize

        39.1MB

      • memory/2288-193-0x0000000004B00000-0x0000000004B10000-memory.dmp

        Filesize

        64KB

      • memory/2288-195-0x0000000000400000-0x0000000002B1C000-memory.dmp

        Filesize

        39.1MB

      • memory/2288-160-0x00000000071B0000-0x0000000007754000-memory.dmp

        Filesize

        5.6MB

      • memory/2540-205-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-235-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-203-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-207-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-209-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-212-0x0000000002CC0000-0x0000000002D0B000-memory.dmp

        Filesize

        300KB

      • memory/2540-211-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-214-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-217-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-216-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-215-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-219-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-221-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-223-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-225-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-227-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-229-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-231-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-233-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-201-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-237-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-1110-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/2540-1111-0x0000000007EF0000-0x0000000007FFA000-memory.dmp

        Filesize

        1.0MB

      • memory/2540-1113-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

        Filesize

        72KB

      • memory/2540-1112-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-1114-0x0000000004F20000-0x0000000004F5C000-memory.dmp

        Filesize

        240KB

      • memory/2540-1116-0x0000000008220000-0x00000000082B2000-memory.dmp

        Filesize

        584KB

      • memory/2540-1117-0x00000000082C0000-0x0000000008326000-memory.dmp

        Filesize

        408KB

      • memory/2540-1118-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-1119-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-1120-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2540-1121-0x00000000089C0000-0x0000000008A36000-memory.dmp

        Filesize

        472KB

      • memory/2540-1122-0x0000000008A50000-0x0000000008AA0000-memory.dmp

        Filesize

        320KB

      • memory/2540-1123-0x0000000008AD0000-0x0000000008C92000-memory.dmp

        Filesize

        1.8MB

      • memory/2540-1124-0x0000000008CA0000-0x00000000091CC000-memory.dmp

        Filesize

        5.2MB

      • memory/2540-200-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

        Filesize

        248KB

      • memory/2540-1126-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/3996-154-0x0000000000F40000-0x0000000000F4A000-memory.dmp

        Filesize

        40KB

      • memory/4928-1131-0x0000000000160000-0x0000000000192000-memory.dmp

        Filesize

        200KB

      • memory/4928-1132-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB