Analysis

  • max time kernel
    55s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-03-2023 20:22

General

  • Target

    7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe

  • Size

    864KB

  • MD5

    65ddff5746426bad6de2bc2435083395

  • SHA1

    43935608396a20c3b1006988c5f7393703709cba

  • SHA256

    7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20

  • SHA512

    8dd5430c0f37e40b6ba0114d1100e97e22887766c9fd4a2edc089752dba1e33a879f7b80497b1a3fcfeab484af29784e792b3e0eb366ccd78a1627bd3607e022

  • SSDEEP

    24576:QyMD0NZj1Os4p260HI9NGKSHysrQKFYJm:XYF2fHIWKSHvrQKFY

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe
    "C:\Users\Admin\AppData\Local\Temp\7855762e2978fb79ccae71aaa221d66a71269ff699c082078e23a23ca2f25f20.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1520.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1520.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2921.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2921.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6090SM.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6090SM.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4300
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23YZ37.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23YZ37.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXsza50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXsza50.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e22TR53.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e22TR53.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e22TR53.exe

    Filesize

    175KB

    MD5

    795f3fe5687db9b19853eaf6acdc389a

    SHA1

    cd1ba862909c58a01d3a8e44c29cb71bb6b50630

    SHA256

    448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

    SHA512

    d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e22TR53.exe

    Filesize

    175KB

    MD5

    795f3fe5687db9b19853eaf6acdc389a

    SHA1

    cd1ba862909c58a01d3a8e44c29cb71bb6b50630

    SHA256

    448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

    SHA512

    d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1520.exe

    Filesize

    719KB

    MD5

    4dd7979710f06eb097063383f56c4269

    SHA1

    9fb38b8c653e5db44255347470461e6395827ee0

    SHA256

    6f8e1756821fd1a2d439049d802342d85622d1a2ccd88da62d976826feaf2a3f

    SHA512

    cd9be22527405e7af9d48b763d9154256620e7ced39a231f0f698a1d09b7415023e3020e91beb1cf1548dbbc2ed5ab161fd2bc2ca538fcb47a9c1577d89ac2e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1520.exe

    Filesize

    719KB

    MD5

    4dd7979710f06eb097063383f56c4269

    SHA1

    9fb38b8c653e5db44255347470461e6395827ee0

    SHA256

    6f8e1756821fd1a2d439049d802342d85622d1a2ccd88da62d976826feaf2a3f

    SHA512

    cd9be22527405e7af9d48b763d9154256620e7ced39a231f0f698a1d09b7415023e3020e91beb1cf1548dbbc2ed5ab161fd2bc2ca538fcb47a9c1577d89ac2e7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXsza50.exe

    Filesize

    401KB

    MD5

    0b60199c3670257289d46942d7289afe

    SHA1

    275e546b3156ad342a2e4993ec6da0fa5d698abb

    SHA256

    230cc23ef4929db51896808839bb11899f6f07c2bcc0dbad97d9233db3087d69

    SHA512

    be63498aff7447fd33b40ee4665b0c4bcec3db64ee335201a28a469b5a6f1f41f2077b1322cd5250db70d576f3e91a0e056b1c1692355b8deb288548b6e57bca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dXsza50.exe

    Filesize

    401KB

    MD5

    0b60199c3670257289d46942d7289afe

    SHA1

    275e546b3156ad342a2e4993ec6da0fa5d698abb

    SHA256

    230cc23ef4929db51896808839bb11899f6f07c2bcc0dbad97d9233db3087d69

    SHA512

    be63498aff7447fd33b40ee4665b0c4bcec3db64ee335201a28a469b5a6f1f41f2077b1322cd5250db70d576f3e91a0e056b1c1692355b8deb288548b6e57bca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2921.exe

    Filesize

    360KB

    MD5

    4e3eefe2f87deee7c78ce03606d46ee7

    SHA1

    628f496b5374d998b21486d5ee6ff1afeaec7caa

    SHA256

    de4ff7c7268e267da369470ea79714976c67dd5b4de5eeb45cb562fdfb3cc49e

    SHA512

    b114fa39d5666d1b3e528729e72656ef6c866e37da0755951d845de5247ba9c5c98e1fb2e2ac5c51cfb537ecaaf0091b3ae3ac7f8328dffe461614fa3217a3ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2921.exe

    Filesize

    360KB

    MD5

    4e3eefe2f87deee7c78ce03606d46ee7

    SHA1

    628f496b5374d998b21486d5ee6ff1afeaec7caa

    SHA256

    de4ff7c7268e267da369470ea79714976c67dd5b4de5eeb45cb562fdfb3cc49e

    SHA512

    b114fa39d5666d1b3e528729e72656ef6c866e37da0755951d845de5247ba9c5c98e1fb2e2ac5c51cfb537ecaaf0091b3ae3ac7f8328dffe461614fa3217a3ef

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6090SM.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6090SM.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23YZ37.exe

    Filesize

    343KB

    MD5

    b4e520fb843a4ab8c74ef06261b12ad8

    SHA1

    5f56035167c0f524bc3c849e0a98399fd4b935dd

    SHA256

    c795609c8d2da3337acb82e7923a8bf11634dc624eb685455a76921ac850e0b4

    SHA512

    62ef0ba405220ad63e55903c1f73bb3b8e1dab45d6af5407d852af08548119d02598b9371e6df785aa48445cbc0bf64535b53aefa7fe84018179b0b25e2e7a52

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23YZ37.exe

    Filesize

    343KB

    MD5

    b4e520fb843a4ab8c74ef06261b12ad8

    SHA1

    5f56035167c0f524bc3c849e0a98399fd4b935dd

    SHA256

    c795609c8d2da3337acb82e7923a8bf11634dc624eb685455a76921ac850e0b4

    SHA512

    62ef0ba405220ad63e55903c1f73bb3b8e1dab45d6af5407d852af08548119d02598b9371e6df785aa48445cbc0bf64535b53aefa7fe84018179b0b25e2e7a52

  • memory/2944-148-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2944-149-0x0000000004910000-0x000000000492A000-memory.dmp

    Filesize

    104KB

  • memory/2944-150-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2944-151-0x0000000007230000-0x000000000772E000-memory.dmp

    Filesize

    5.0MB

  • memory/2944-152-0x0000000004BF0000-0x0000000004C08000-memory.dmp

    Filesize

    96KB

  • memory/2944-153-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-154-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-156-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-158-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-160-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-162-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-164-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-166-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-168-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-170-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-172-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-174-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-176-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-178-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-180-0x0000000004BF0000-0x0000000004C02000-memory.dmp

    Filesize

    72KB

  • memory/2944-181-0x0000000000400000-0x0000000002B1A000-memory.dmp

    Filesize

    39.1MB

  • memory/2944-182-0x0000000007220000-0x0000000007230000-memory.dmp

    Filesize

    64KB

  • memory/2944-184-0x0000000000400000-0x0000000002B1A000-memory.dmp

    Filesize

    39.1MB

  • memory/4300-142-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

    Filesize

    40KB

  • memory/4684-191-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-227-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-189-0x00000000049B0000-0x00000000049F6000-memory.dmp

    Filesize

    280KB

  • memory/4684-192-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-196-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-194-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-198-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-200-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-202-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-206-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-204-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-208-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-211-0x0000000002C30000-0x0000000002C7B000-memory.dmp

    Filesize

    300KB

  • memory/4684-210-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-214-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/4684-215-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-212-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/4684-219-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-217-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-223-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-225-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-190-0x0000000004C70000-0x0000000004CB4000-memory.dmp

    Filesize

    272KB

  • memory/4684-221-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4684-1100-0x0000000007D00000-0x0000000008306000-memory.dmp

    Filesize

    6.0MB

  • memory/4684-1101-0x00000000076F0000-0x00000000077FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4684-1102-0x0000000007800000-0x0000000007812000-memory.dmp

    Filesize

    72KB

  • memory/4684-1103-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/4684-1104-0x0000000007820000-0x000000000785E000-memory.dmp

    Filesize

    248KB

  • memory/4684-1105-0x0000000007970000-0x00000000079BB000-memory.dmp

    Filesize

    300KB

  • memory/4684-1107-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/4684-1108-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/4684-1109-0x0000000007B00000-0x0000000007B66000-memory.dmp

    Filesize

    408KB

  • memory/4684-1110-0x0000000008800000-0x0000000008892000-memory.dmp

    Filesize

    584KB

  • memory/4684-1111-0x0000000008C40000-0x0000000008E02000-memory.dmp

    Filesize

    1.8MB

  • memory/4684-1112-0x0000000008E20000-0x000000000934C000-memory.dmp

    Filesize

    5.2MB

  • memory/4684-1113-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/4684-1114-0x0000000009480000-0x00000000094F6000-memory.dmp

    Filesize

    472KB

  • memory/4684-1115-0x0000000009500000-0x0000000009550000-memory.dmp

    Filesize

    320KB

  • memory/4832-1121-0x0000000000540000-0x0000000000572000-memory.dmp

    Filesize

    200KB

  • memory/4832-1122-0x0000000004F80000-0x0000000004FCB000-memory.dmp

    Filesize

    300KB

  • memory/4832-1123-0x0000000005150000-0x0000000005160000-memory.dmp

    Filesize

    64KB