Analysis

  • max time kernel
    87s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 19:42

General

  • Target

    2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe

  • Size

    864KB

  • MD5

    260fc5fc90b05fee37068cb7d869d437

  • SHA1

    19fe9a7e57264facfc874fe29229179473138f39

  • SHA256

    2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25

  • SHA512

    60e0f3704194152b1181fed72a4d2cf7113b29d8bdff6d723d9d816232fc2049cb148f6caa3114cdb354d0b466ad1667f36602288b576365db38e950ee62ec78

  • SSDEEP

    24576:TyEAfUjM4tp+PkcrsIzDZ9Y2dA0wWMYmo:m74tpvQrPZ9Y2+ZW

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe
    "C:\Users\Admin\AppData\Local\Temp\2ae8ac25c777e129d2b4d512a93b2d1f4fb00af5bf59757b162fe26abdb7be25.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2536.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2536.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3333.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8567qR.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8567qR.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c98SZ28.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c98SZ28.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 1080
            5⤵
            • Program crash
            PID:3696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvQtk77.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvQtk77.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 1192
          4⤵
          • Program crash
          PID:4788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e89Ay93.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e89Ay93.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3912
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1976 -ip 1976
    1⤵
      PID:4472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2028 -ip 2028
      1⤵
        PID:3192

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e89Ay93.exe

        Filesize

        175KB

        MD5

        795f3fe5687db9b19853eaf6acdc389a

        SHA1

        cd1ba862909c58a01d3a8e44c29cb71bb6b50630

        SHA256

        448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

        SHA512

        d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e89Ay93.exe

        Filesize

        175KB

        MD5

        795f3fe5687db9b19853eaf6acdc389a

        SHA1

        cd1ba862909c58a01d3a8e44c29cb71bb6b50630

        SHA256

        448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

        SHA512

        d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2536.exe

        Filesize

        719KB

        MD5

        c63a745a767cfc43b710f68803832395

        SHA1

        abb24b037b7876b2a0182ba9bb8e0610023eb385

        SHA256

        8a5575810c4bf6865bd3853a92349a3c6b261e351418fe24ef8d03f1defd27cf

        SHA512

        1ceabfd6177d03d6751f1c1fbce8e263637e88d6f45504aa7a8bd99161d752f6413e2bcce8145dfcd8a5c1334def504cf09ca8fc19d728c761bfbf97c80aba5f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2536.exe

        Filesize

        719KB

        MD5

        c63a745a767cfc43b710f68803832395

        SHA1

        abb24b037b7876b2a0182ba9bb8e0610023eb385

        SHA256

        8a5575810c4bf6865bd3853a92349a3c6b261e351418fe24ef8d03f1defd27cf

        SHA512

        1ceabfd6177d03d6751f1c1fbce8e263637e88d6f45504aa7a8bd99161d752f6413e2bcce8145dfcd8a5c1334def504cf09ca8fc19d728c761bfbf97c80aba5f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvQtk77.exe

        Filesize

        399KB

        MD5

        8394b813be89a7225621761f31152227

        SHA1

        4f3f7ac90aa0ccea2b1d2ae9226b4cdd48ea20b3

        SHA256

        f9052010fbead3601323287739f36e103c47dcea6a1dbc732ff3664aa009a4d2

        SHA512

        3a018c30234f8d9534124fed3524c7b4b531e159e43a20a9f4d816e79600a5653d1d88a837299790408fddc92a8d22616f21792ccabf508dd6732c06afc83a5d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvQtk77.exe

        Filesize

        399KB

        MD5

        8394b813be89a7225621761f31152227

        SHA1

        4f3f7ac90aa0ccea2b1d2ae9226b4cdd48ea20b3

        SHA256

        f9052010fbead3601323287739f36e103c47dcea6a1dbc732ff3664aa009a4d2

        SHA512

        3a018c30234f8d9534124fed3524c7b4b531e159e43a20a9f4d816e79600a5653d1d88a837299790408fddc92a8d22616f21792ccabf508dd6732c06afc83a5d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3333.exe

        Filesize

        360KB

        MD5

        9d64d1256520224ba125baec1089cc74

        SHA1

        c6110564ad826b502ad063aa67237c452980d3d6

        SHA256

        e9939162f1d70a35c9cbde6cf000d830b5722b1d064d5ef4efa999fd971b8567

        SHA512

        d7c85cdb5ae6ddf2f734121894dd2cdad641da5e2b68fd0180b9a710d06838e2515c5626b245e5cfc890c4605b354e259fb8a52fbb718c0f5dbee8dd0a0e5ce3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3333.exe

        Filesize

        360KB

        MD5

        9d64d1256520224ba125baec1089cc74

        SHA1

        c6110564ad826b502ad063aa67237c452980d3d6

        SHA256

        e9939162f1d70a35c9cbde6cf000d830b5722b1d064d5ef4efa999fd971b8567

        SHA512

        d7c85cdb5ae6ddf2f734121894dd2cdad641da5e2b68fd0180b9a710d06838e2515c5626b245e5cfc890c4605b354e259fb8a52fbb718c0f5dbee8dd0a0e5ce3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8567qR.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8567qR.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c98SZ28.exe

        Filesize

        342KB

        MD5

        026d84beaf4966c0b1b4e66bcaf3467c

        SHA1

        87cff0c0a72c40436730babd36b36ddcca4b170b

        SHA256

        ab6a20d7f3b2ed677b823643f6e5f473be6415ffeb9d107b8e2ae2aa5d400637

        SHA512

        ddf35d85544f2c773af11af99e47d110d55a58e97049992dd6becbb71ac956e89108a472ddff4cda590a583951d5ef637fb346f47d78cd0aa90c0f1eb7dfbdde

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c98SZ28.exe

        Filesize

        342KB

        MD5

        026d84beaf4966c0b1b4e66bcaf3467c

        SHA1

        87cff0c0a72c40436730babd36b36ddcca4b170b

        SHA256

        ab6a20d7f3b2ed677b823643f6e5f473be6415ffeb9d107b8e2ae2aa5d400637

        SHA512

        ddf35d85544f2c773af11af99e47d110d55a58e97049992dd6becbb71ac956e89108a472ddff4cda590a583951d5ef637fb346f47d78cd0aa90c0f1eb7dfbdde

      • memory/708-154-0x0000000000930000-0x000000000093A000-memory.dmp

        Filesize

        40KB

      • memory/1976-160-0x00000000072F0000-0x0000000007894000-memory.dmp

        Filesize

        5.6MB

      • memory/1976-162-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/1976-161-0x0000000002BF0000-0x0000000002C1D000-memory.dmp

        Filesize

        180KB

      • memory/1976-163-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/1976-164-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-165-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-167-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-169-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-171-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-173-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-175-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-177-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-179-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-181-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-183-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-185-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-187-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-189-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-191-0x00000000071E0000-0x00000000071F2000-memory.dmp

        Filesize

        72KB

      • memory/1976-192-0x0000000000400000-0x0000000002B1A000-memory.dmp

        Filesize

        39.1MB

      • memory/1976-193-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/1976-194-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/1976-196-0x0000000000400000-0x0000000002B1A000-memory.dmp

        Filesize

        39.1MB

      • memory/2028-201-0x0000000002C00000-0x0000000002C4B000-memory.dmp

        Filesize

        300KB

      • memory/2028-202-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-203-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-205-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-206-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-210-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-212-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-214-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-208-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-204-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-216-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-218-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-220-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-222-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-224-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-228-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-226-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-230-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-232-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-234-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-236-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-238-0x0000000007690000-0x00000000076CE000-memory.dmp

        Filesize

        248KB

      • memory/2028-1111-0x0000000007870000-0x0000000007E88000-memory.dmp

        Filesize

        6.1MB

      • memory/2028-1112-0x0000000007F10000-0x000000000801A000-memory.dmp

        Filesize

        1.0MB

      • memory/2028-1113-0x0000000008050000-0x0000000008062000-memory.dmp

        Filesize

        72KB

      • memory/2028-1114-0x0000000008070000-0x00000000080AC000-memory.dmp

        Filesize

        240KB

      • memory/2028-1115-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-1117-0x0000000008360000-0x00000000083F2000-memory.dmp

        Filesize

        584KB

      • memory/2028-1118-0x0000000008400000-0x0000000008466000-memory.dmp

        Filesize

        408KB

      • memory/2028-1119-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-1120-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-1121-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/2028-1122-0x0000000008D70000-0x0000000008DE6000-memory.dmp

        Filesize

        472KB

      • memory/2028-1123-0x0000000008DF0000-0x0000000008E40000-memory.dmp

        Filesize

        320KB

      • memory/2028-1124-0x0000000008E60000-0x0000000009022000-memory.dmp

        Filesize

        1.8MB

      • memory/2028-1125-0x0000000009030000-0x000000000955C000-memory.dmp

        Filesize

        5.2MB

      • memory/2028-1126-0x0000000006F90000-0x0000000006FA0000-memory.dmp

        Filesize

        64KB

      • memory/3912-1132-0x0000000000830000-0x0000000000862000-memory.dmp

        Filesize

        200KB

      • memory/3912-1133-0x00000000054A0000-0x00000000054B0000-memory.dmp

        Filesize

        64KB