Analysis

  • max time kernel
    90s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/03/2023, 14:08

General

  • Target

    337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe

  • Size

    864KB

  • MD5

    3014af0f96843daaec1db8cd15f4b072

  • SHA1

    689e81e1cfd9fde05373ba4ed28ecb052ef24019

  • SHA256

    337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5

  • SHA512

    1b3c88a3fbd667acdc0caa66691c6ae85fc378d836aeb644711d2a226e5a8f0f6c1c6fe1156c1317d8e51cd3ba4f01a800728663d8d989570bd6ba7651a068c9

  • SSDEEP

    12288:ZMrjy909B5TJjSzrOGL3ijdVV6C6r3HojiVMTNBNgqSO5HDQwNVSIO:Gy2FpS/hLKVVvW3ojFTPNgqN50wrFO

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe
    "C:\Users\Admin\AppData\Local\Temp\337661c09ae73eeb9a763f624a079de2ef3f4183061c8cad8ca169e7423bf3c5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3196.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3196.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2976.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2976.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4292
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9244mM.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9244mM.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c13zy29.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c13zy29.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dntmm96.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dntmm96.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48tW54.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48tW54.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3444

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48tW54.exe

          Filesize

          175KB

          MD5

          795f3fe5687db9b19853eaf6acdc389a

          SHA1

          cd1ba862909c58a01d3a8e44c29cb71bb6b50630

          SHA256

          448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

          SHA512

          d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48tW54.exe

          Filesize

          175KB

          MD5

          795f3fe5687db9b19853eaf6acdc389a

          SHA1

          cd1ba862909c58a01d3a8e44c29cb71bb6b50630

          SHA256

          448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

          SHA512

          d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3196.exe

          Filesize

          719KB

          MD5

          9e0b2c3045997121d7f40b34b2f6871f

          SHA1

          8a32b5a5b560336e092deeedd3e8cff824c74d0a

          SHA256

          7eeb8dc65ddd24c0464fb92501a2bd4534b82b3b9c257caf41ade3e12eb145d1

          SHA512

          6d832bf549316d6655d592999d42504475055a7c42a95bd50ea9dda88b711c4d30dcf5266968f366a9f394baedfe5845245e7226ea7a2056b281fb248a2ac355

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3196.exe

          Filesize

          719KB

          MD5

          9e0b2c3045997121d7f40b34b2f6871f

          SHA1

          8a32b5a5b560336e092deeedd3e8cff824c74d0a

          SHA256

          7eeb8dc65ddd24c0464fb92501a2bd4534b82b3b9c257caf41ade3e12eb145d1

          SHA512

          6d832bf549316d6655d592999d42504475055a7c42a95bd50ea9dda88b711c4d30dcf5266968f366a9f394baedfe5845245e7226ea7a2056b281fb248a2ac355

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dntmm96.exe

          Filesize

          399KB

          MD5

          235c77c94961115333e0c3b408e50c95

          SHA1

          f8bb55c32a08e15da9e037cc34cd56c62b0a9e93

          SHA256

          2957be35a896e9ba185c890eaaf49c233e39432871166eb7833bc33f3626022c

          SHA512

          9936ef4ec349742e3a80b352e4c68423960167053fdf2c104a06ecf142780e064d6e19aff3df36f7345b32401bc3ced95b0b1b4681ec4a36281c31b9e93d0029

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dntmm96.exe

          Filesize

          399KB

          MD5

          235c77c94961115333e0c3b408e50c95

          SHA1

          f8bb55c32a08e15da9e037cc34cd56c62b0a9e93

          SHA256

          2957be35a896e9ba185c890eaaf49c233e39432871166eb7833bc33f3626022c

          SHA512

          9936ef4ec349742e3a80b352e4c68423960167053fdf2c104a06ecf142780e064d6e19aff3df36f7345b32401bc3ced95b0b1b4681ec4a36281c31b9e93d0029

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2976.exe

          Filesize

          360KB

          MD5

          45d27f13d0c9dc38d1f0b18d7f4a2394

          SHA1

          3a2120c455e7d067cc2b7440401e957c9e4f5853

          SHA256

          e4b141651e0d55273580d13ec943a54c34d170b315bffb6248fe12c216b42843

          SHA512

          01fa4a3c34763b22f907c9be9265b33c32d1f831b624802c1cbe5e410d02159aa6a476f3a5a2e0f30da734748327406a2ac4fe4381677af2186b3a14b0cec88f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2976.exe

          Filesize

          360KB

          MD5

          45d27f13d0c9dc38d1f0b18d7f4a2394

          SHA1

          3a2120c455e7d067cc2b7440401e957c9e4f5853

          SHA256

          e4b141651e0d55273580d13ec943a54c34d170b315bffb6248fe12c216b42843

          SHA512

          01fa4a3c34763b22f907c9be9265b33c32d1f831b624802c1cbe5e410d02159aa6a476f3a5a2e0f30da734748327406a2ac4fe4381677af2186b3a14b0cec88f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9244mM.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9244mM.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c13zy29.exe

          Filesize

          342KB

          MD5

          c510dd10f5d16e1bfe187df93c8b7c61

          SHA1

          75f50ab7d32d92ece4a7de6e9a72422159fe9420

          SHA256

          2f0abe65e2d48a1567b38249931d8591f03e4ad5d0147ad662333070632f3cb9

          SHA512

          30ff8d5a3426961c59f564a9b156397c047d9aea60efeecacf8019fec2ceb068aea4b319181147fb6b3f2faefb73582eb646915e494c5a6e9e73f13bfff579f9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c13zy29.exe

          Filesize

          342KB

          MD5

          c510dd10f5d16e1bfe187df93c8b7c61

          SHA1

          75f50ab7d32d92ece4a7de6e9a72422159fe9420

          SHA256

          2f0abe65e2d48a1567b38249931d8591f03e4ad5d0147ad662333070632f3cb9

          SHA512

          30ff8d5a3426961c59f564a9b156397c047d9aea60efeecacf8019fec2ceb068aea4b319181147fb6b3f2faefb73582eb646915e494c5a6e9e73f13bfff579f9

        • memory/2740-142-0x0000000000680000-0x000000000068A000-memory.dmp

          Filesize

          40KB

        • memory/2744-185-0x0000000000400000-0x0000000002B1A000-memory.dmp

          Filesize

          39.1MB

        • memory/2744-172-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-151-0x0000000002BF0000-0x0000000002C1D000-memory.dmp

          Filesize

          180KB

        • memory/2744-152-0x0000000007180000-0x0000000007190000-memory.dmp

          Filesize

          64KB

        • memory/2744-153-0x0000000007180000-0x0000000007190000-memory.dmp

          Filesize

          64KB

        • memory/2744-154-0x0000000007180000-0x0000000007190000-memory.dmp

          Filesize

          64KB

        • memory/2744-156-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-158-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-160-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-155-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-162-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-164-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-166-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-168-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-170-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-150-0x0000000007040000-0x0000000007058000-memory.dmp

          Filesize

          96KB

        • memory/2744-182-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-180-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-178-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-176-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-174-0x0000000007040000-0x0000000007052000-memory.dmp

          Filesize

          72KB

        • memory/2744-183-0x0000000000400000-0x0000000002B1A000-memory.dmp

          Filesize

          39.1MB

        • memory/2744-186-0x0000000007180000-0x0000000007190000-memory.dmp

          Filesize

          64KB

        • memory/2744-188-0x0000000007180000-0x0000000007190000-memory.dmp

          Filesize

          64KB

        • memory/2744-187-0x0000000007180000-0x0000000007190000-memory.dmp

          Filesize

          64KB

        • memory/2744-149-0x0000000007190000-0x000000000768E000-memory.dmp

          Filesize

          5.0MB

        • memory/2744-148-0x0000000004750000-0x000000000476A000-memory.dmp

          Filesize

          104KB

        • memory/3444-1124-0x0000000004C20000-0x0000000004C6B000-memory.dmp

          Filesize

          300KB

        • memory/3444-1123-0x00000000001E0000-0x0000000000212000-memory.dmp

          Filesize

          200KB

        • memory/3444-1125-0x0000000004D60000-0x0000000004D70000-memory.dmp

          Filesize

          64KB

        • memory/4956-206-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-229-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-202-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-198-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-204-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-210-0x0000000004650000-0x0000000004660000-memory.dmp

          Filesize

          64KB

        • memory/4956-209-0x0000000002C00000-0x0000000002C4B000-memory.dmp

          Filesize

          300KB

        • memory/4956-208-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-213-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-215-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-212-0x0000000004650000-0x0000000004660000-memory.dmp

          Filesize

          64KB

        • memory/4956-217-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-219-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-221-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-225-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-223-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-227-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-200-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-231-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-1104-0x0000000007C50000-0x0000000008256000-memory.dmp

          Filesize

          6.0MB

        • memory/4956-1105-0x00000000076C0000-0x00000000077CA000-memory.dmp

          Filesize

          1.0MB

        • memory/4956-1106-0x0000000007800000-0x0000000007812000-memory.dmp

          Filesize

          72KB

        • memory/4956-1107-0x0000000007820000-0x000000000785E000-memory.dmp

          Filesize

          248KB

        • memory/4956-1108-0x0000000007970000-0x00000000079BB000-memory.dmp

          Filesize

          300KB

        • memory/4956-1109-0x0000000004650000-0x0000000004660000-memory.dmp

          Filesize

          64KB

        • memory/4956-1111-0x0000000004650000-0x0000000004660000-memory.dmp

          Filesize

          64KB

        • memory/4956-1112-0x0000000007B00000-0x0000000007B92000-memory.dmp

          Filesize

          584KB

        • memory/4956-1113-0x0000000007BA0000-0x0000000007C06000-memory.dmp

          Filesize

          408KB

        • memory/4956-1114-0x0000000008880000-0x00000000088F6000-memory.dmp

          Filesize

          472KB

        • memory/4956-1115-0x0000000008910000-0x0000000008960000-memory.dmp

          Filesize

          320KB

        • memory/4956-1116-0x0000000008BF0000-0x0000000008DB2000-memory.dmp

          Filesize

          1.8MB

        • memory/4956-196-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-195-0x00000000075C0000-0x00000000075FE000-memory.dmp

          Filesize

          248KB

        • memory/4956-194-0x00000000075C0000-0x0000000007604000-memory.dmp

          Filesize

          272KB

        • memory/4956-193-0x0000000007040000-0x0000000007086000-memory.dmp

          Filesize

          280KB

        • memory/4956-1117-0x0000000008DC0000-0x00000000092EC000-memory.dmp

          Filesize

          5.2MB