Analysis

  • max time kernel
    55s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-03-2023 16:45

General

  • Target

    90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe

  • Size

    864KB

  • MD5

    e1cb202c79e69d973b576d0be31ae479

  • SHA1

    d375601ef6702e09da2d53c6435d97c48694e80c

  • SHA256

    90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d

  • SHA512

    d453ae964f41811bb0f8ff1dab2a7ae1814e7933470ce0528ef7d1b0e3d80648cfc56cda95333871de77059d98af021d3d64018878eafc7886d1ead356aecb4d

  • SSDEEP

    24576:IyR0mCTO16suY1UXh8a4HzVn7vv+RbsUXnoY:PR0mz1COa+JTGxd

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe
    "C:\Users\Admin\AppData\Local\Temp\90ba09ba3bbea2451dec1f17ec2c7f9075a35c40f672176d16d04868af44491d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9878.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9878.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4575.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9384ye.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9384ye.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:420
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c26wW14.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c26wW14.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddBWa18.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddBWa18.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e15Zv58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e15Zv58.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e15Zv58.exe

    Filesize

    175KB

    MD5

    795f3fe5687db9b19853eaf6acdc389a

    SHA1

    cd1ba862909c58a01d3a8e44c29cb71bb6b50630

    SHA256

    448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

    SHA512

    d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e15Zv58.exe

    Filesize

    175KB

    MD5

    795f3fe5687db9b19853eaf6acdc389a

    SHA1

    cd1ba862909c58a01d3a8e44c29cb71bb6b50630

    SHA256

    448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

    SHA512

    d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9878.exe

    Filesize

    719KB

    MD5

    12ad500336240e49b8c8a83ecac7d694

    SHA1

    b105dcd294dd67c45cf6aaffc8fc0f4585a2c15b

    SHA256

    c86854af3a0c9f21121711c897c73f0ee1f197894f7f60425cfe761d10c67e61

    SHA512

    9bd0ad7c06bde6a95c5e0b590e29dc3a0e78fa9e0c52bfe5b07640e49f277789aed8a6526ade4115da915a47b2e077704e72fa447c42c64e81ddf834b1e7d21c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9878.exe

    Filesize

    719KB

    MD5

    12ad500336240e49b8c8a83ecac7d694

    SHA1

    b105dcd294dd67c45cf6aaffc8fc0f4585a2c15b

    SHA256

    c86854af3a0c9f21121711c897c73f0ee1f197894f7f60425cfe761d10c67e61

    SHA512

    9bd0ad7c06bde6a95c5e0b590e29dc3a0e78fa9e0c52bfe5b07640e49f277789aed8a6526ade4115da915a47b2e077704e72fa447c42c64e81ddf834b1e7d21c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddBWa18.exe

    Filesize

    400KB

    MD5

    bdb488e408687bf9d68cb4b465f56b91

    SHA1

    392ef554e7e3d757f653077997826b5a289dff95

    SHA256

    6af793f98b18cd5bbc093d2a3aa3625e5ebbd761377e0feda64d49ad820e5b67

    SHA512

    2a9a55d7c0d6062906f68208a9c5f266f22c113b930f628c0cf803cfd4c80f7bfeda7c9181d1308dbb5483c4bfec2d7f447d2c0a5548fe45c4477bd6801bf8e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddBWa18.exe

    Filesize

    400KB

    MD5

    bdb488e408687bf9d68cb4b465f56b91

    SHA1

    392ef554e7e3d757f653077997826b5a289dff95

    SHA256

    6af793f98b18cd5bbc093d2a3aa3625e5ebbd761377e0feda64d49ad820e5b67

    SHA512

    2a9a55d7c0d6062906f68208a9c5f266f22c113b930f628c0cf803cfd4c80f7bfeda7c9181d1308dbb5483c4bfec2d7f447d2c0a5548fe45c4477bd6801bf8e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4575.exe

    Filesize

    359KB

    MD5

    5251f684db5be50c0202c5463622f9ae

    SHA1

    9b4dce7a6b9025cd166ef2de1583d2d336296ea4

    SHA256

    206fefabfc5009cdd66b8e07a716dc97927042eb1468b327141c0c399c17b306

    SHA512

    e47c34b56062aadc142045563af22e57041f981cb5c8547fcba7adcf91b6bb11c395a6425b0c09f34b3cc0284318c84d8e2a7a7c1454e11a393a277594fe9668

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4575.exe

    Filesize

    359KB

    MD5

    5251f684db5be50c0202c5463622f9ae

    SHA1

    9b4dce7a6b9025cd166ef2de1583d2d336296ea4

    SHA256

    206fefabfc5009cdd66b8e07a716dc97927042eb1468b327141c0c399c17b306

    SHA512

    e47c34b56062aadc142045563af22e57041f981cb5c8547fcba7adcf91b6bb11c395a6425b0c09f34b3cc0284318c84d8e2a7a7c1454e11a393a277594fe9668

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9384ye.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9384ye.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c26wW14.exe

    Filesize

    342KB

    MD5

    7f664394518e83c179802d9d839fc951

    SHA1

    3a0dcb0d631784d43f20ce150f30ed8869ebcca0

    SHA256

    f1e990120ed7d559aaf0ed150b16a65ade6809fd970701fb3ef2039c1cbd5e90

    SHA512

    0c3cbd5ec37e7a076fed763d6efbcbdf077aba40a303ccc69988538c033403bb1106ab2900a6c264ce1c93c11c1360d2b40ccfdd12118d18e1d7216e8aeed924

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c26wW14.exe

    Filesize

    342KB

    MD5

    7f664394518e83c179802d9d839fc951

    SHA1

    3a0dcb0d631784d43f20ce150f30ed8869ebcca0

    SHA256

    f1e990120ed7d559aaf0ed150b16a65ade6809fd970701fb3ef2039c1cbd5e90

    SHA512

    0c3cbd5ec37e7a076fed763d6efbcbdf077aba40a303ccc69988538c033403bb1106ab2900a6c264ce1c93c11c1360d2b40ccfdd12118d18e1d7216e8aeed924

  • memory/420-138-0x00000000007B0000-0x00000000007BA000-memory.dmp

    Filesize

    40KB

  • memory/1700-151-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-166-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-146-0x0000000002BF0000-0x0000000002C1D000-memory.dmp

    Filesize

    180KB

  • memory/1700-147-0x0000000007030000-0x0000000007040000-memory.dmp

    Filesize

    64KB

  • memory/1700-148-0x0000000007000000-0x0000000007018000-memory.dmp

    Filesize

    96KB

  • memory/1700-149-0x0000000007030000-0x0000000007040000-memory.dmp

    Filesize

    64KB

  • memory/1700-150-0x0000000007030000-0x0000000007040000-memory.dmp

    Filesize

    64KB

  • memory/1700-144-0x0000000006FE0000-0x0000000006FFA000-memory.dmp

    Filesize

    104KB

  • memory/1700-152-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-154-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-156-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-158-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-160-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-162-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-164-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-145-0x0000000007040000-0x000000000753E000-memory.dmp

    Filesize

    5.0MB

  • memory/1700-168-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-170-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-172-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-174-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-178-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-176-0x0000000007000000-0x0000000007012000-memory.dmp

    Filesize

    72KB

  • memory/1700-179-0x0000000000400000-0x0000000002B19000-memory.dmp

    Filesize

    39.1MB

  • memory/1700-180-0x0000000007030000-0x0000000007040000-memory.dmp

    Filesize

    64KB

  • memory/1700-181-0x0000000007030000-0x0000000007040000-memory.dmp

    Filesize

    64KB

  • memory/1700-182-0x0000000007030000-0x0000000007040000-memory.dmp

    Filesize

    64KB

  • memory/1700-184-0x0000000000400000-0x0000000002B19000-memory.dmp

    Filesize

    39.1MB

  • memory/1848-1123-0x00000000002B0000-0x00000000002E2000-memory.dmp

    Filesize

    200KB

  • memory/1848-1125-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/1848-1124-0x0000000004CF0000-0x0000000004D3B000-memory.dmp

    Filesize

    300KB

  • memory/4020-189-0x0000000004660000-0x00000000046A6000-memory.dmp

    Filesize

    280KB

  • memory/4020-194-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-196-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-198-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-200-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-202-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-204-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-206-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-208-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-210-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-212-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-214-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-216-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-218-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-220-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-222-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-224-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-228-0x0000000002C00000-0x0000000002C4B000-memory.dmp

    Filesize

    300KB

  • memory/4020-230-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-232-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-234-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-1101-0x0000000007DB0000-0x00000000083B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4020-1102-0x0000000007800000-0x000000000790A000-memory.dmp

    Filesize

    1.0MB

  • memory/4020-1103-0x0000000007940000-0x0000000007952000-memory.dmp

    Filesize

    72KB

  • memory/4020-1104-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-1105-0x0000000007960000-0x000000000799E000-memory.dmp

    Filesize

    248KB

  • memory/4020-1106-0x0000000007AB0000-0x0000000007AFB000-memory.dmp

    Filesize

    300KB

  • memory/4020-1108-0x0000000007C40000-0x0000000007CD2000-memory.dmp

    Filesize

    584KB

  • memory/4020-1109-0x0000000007CE0000-0x0000000007D46000-memory.dmp

    Filesize

    408KB

  • memory/4020-1110-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-1111-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-1112-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-1113-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4020-1114-0x0000000008D70000-0x0000000008F32000-memory.dmp

    Filesize

    1.8MB

  • memory/4020-1115-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB

  • memory/4020-191-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-192-0x0000000007090000-0x00000000070CE000-memory.dmp

    Filesize

    248KB

  • memory/4020-190-0x0000000007090000-0x00000000070D4000-memory.dmp

    Filesize

    272KB

  • memory/4020-1116-0x00000000095C0000-0x0000000009636000-memory.dmp

    Filesize

    472KB

  • memory/4020-1117-0x0000000009650000-0x00000000096A0000-memory.dmp

    Filesize

    320KB