Analysis

  • max time kernel
    143s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 06:11

General

  • Target

    410b540cfff3ae5d002f561f47605fee624a54bc67a1c70caf45e06d52b5b871.exe

  • Size

    788KB

  • MD5

    773f32f963db17720e715caa50cd1c67

  • SHA1

    1ff50fb13e4b0c3878609821bbb39327694abac8

  • SHA256

    410b540cfff3ae5d002f561f47605fee624a54bc67a1c70caf45e06d52b5b871

  • SHA512

    c11a53665b916b7fb33519d0297bb7ae504f3dc127aced6579ae3319e3052df4a5e11354fe4b2d29ec999d0139e142790601f05c82a88a7f7c88105e084cc9a8

  • SSDEEP

    12288:8Mrpy90+Jlsf4GtdD4nHS4Hz3TBaGKii6F/mpAHYGgozylqVW89JaeRrCxG5XDAr:NyLcf42ZkSgzUGOQ2voGlSLUewmXD6

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\410b540cfff3ae5d002f561f47605fee624a54bc67a1c70caf45e06d52b5b871.exe
    "C:\Users\Admin\AppData\Local\Temp\410b540cfff3ae5d002f561f47605fee624a54bc67a1c70caf45e06d52b5b871.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3669.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3669.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8553.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8553.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4425cl.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4425cl.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3680
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c10Ws77.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c10Ws77.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:620
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 1080
            5⤵
            • Program crash
            PID:1288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dctXP89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dctXP89.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 1320
          4⤵
          • Program crash
          PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e71FI47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e71FI47.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3704
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 620 -ip 620
    1⤵
      PID:4904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2284 -ip 2284
      1⤵
        PID:2172

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e71FI47.exe

        Filesize

        175KB

        MD5

        795f3fe5687db9b19853eaf6acdc389a

        SHA1

        cd1ba862909c58a01d3a8e44c29cb71bb6b50630

        SHA256

        448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

        SHA512

        d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e71FI47.exe

        Filesize

        175KB

        MD5

        795f3fe5687db9b19853eaf6acdc389a

        SHA1

        cd1ba862909c58a01d3a8e44c29cb71bb6b50630

        SHA256

        448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

        SHA512

        d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3669.exe

        Filesize

        643KB

        MD5

        f4d0c4c6edbc5d939c15fb53f5e66397

        SHA1

        c0e7df76722c8e352f1c6ff0613005dbf779b08d

        SHA256

        16762c84d30f69c7f86666797f85519f37afcca6ecbc6e3bbaa575e1e96e9920

        SHA512

        fe47669e08318373d7c12ef67c2d7b3ac969c7f8339cf83765a0bd4dc221763b8c9186c7a82594330f76cdf5c0ac3779dedd14b00ca2259a9ca4605798eddd93

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3669.exe

        Filesize

        643KB

        MD5

        f4d0c4c6edbc5d939c15fb53f5e66397

        SHA1

        c0e7df76722c8e352f1c6ff0613005dbf779b08d

        SHA256

        16762c84d30f69c7f86666797f85519f37afcca6ecbc6e3bbaa575e1e96e9920

        SHA512

        fe47669e08318373d7c12ef67c2d7b3ac969c7f8339cf83765a0bd4dc221763b8c9186c7a82594330f76cdf5c0ac3779dedd14b00ca2259a9ca4605798eddd93

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dctXP89.exe

        Filesize

        295KB

        MD5

        c48508d1c0436874cd20551644764cbf

        SHA1

        036b80a31fe7a25d602e4b4b34b33893ca528886

        SHA256

        74c8069b8f9e8d8d68578d7bd2fb2e9ae92293a095ef47aedbc11f5d05923d07

        SHA512

        ab3393133e10c2f7cf4c641d439bc7570e10b0e5d3be9199f40deebddc5b8cfeb42b78f74c362cc8cc76feaa8e7f6d45dd3bbd165fdfa1a51fb8f6e392f7abd0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dctXP89.exe

        Filesize

        295KB

        MD5

        c48508d1c0436874cd20551644764cbf

        SHA1

        036b80a31fe7a25d602e4b4b34b33893ca528886

        SHA256

        74c8069b8f9e8d8d68578d7bd2fb2e9ae92293a095ef47aedbc11f5d05923d07

        SHA512

        ab3393133e10c2f7cf4c641d439bc7570e10b0e5d3be9199f40deebddc5b8cfeb42b78f74c362cc8cc76feaa8e7f6d45dd3bbd165fdfa1a51fb8f6e392f7abd0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8553.exe

        Filesize

        322KB

        MD5

        f9a2818cb11c18564e66af699e73cb82

        SHA1

        cc02c2174087c161f0d3df1eee698ba5e7aadc43

        SHA256

        2a1e3d06ff97cd85cee926ad3c51251289226d5f8f9bfb9415b6daaf433a9811

        SHA512

        55349b5313dcd18e2f7e3ebe647d01b327a5a414ff48a9588e863da352d0a7ecb7c1498865dc0ff20a581697d83e7615e44475cae2229aea4c31add40f8e7478

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8553.exe

        Filesize

        322KB

        MD5

        f9a2818cb11c18564e66af699e73cb82

        SHA1

        cc02c2174087c161f0d3df1eee698ba5e7aadc43

        SHA256

        2a1e3d06ff97cd85cee926ad3c51251289226d5f8f9bfb9415b6daaf433a9811

        SHA512

        55349b5313dcd18e2f7e3ebe647d01b327a5a414ff48a9588e863da352d0a7ecb7c1498865dc0ff20a581697d83e7615e44475cae2229aea4c31add40f8e7478

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4425cl.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4425cl.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c10Ws77.exe

        Filesize

        237KB

        MD5

        bf1b64fe0a75260b505ba3e5eb1fe332

        SHA1

        ee41cb8386117f4043d2e4b6fd88bc4b0769ae93

        SHA256

        9d0a67a72ec8f0b53ccfa6a987adcbce880c9e5a2c01aeaf8cb8c34a5c163461

        SHA512

        d79b3bc814afdf7af5af4cd5bbe7cfe540d0f4bec1a017ff3b54e9e165d394da989f0bb4884ab5c523ed3b1122909e3b87eaa29d621e0549e926d7d6fbe5c27f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c10Ws77.exe

        Filesize

        237KB

        MD5

        bf1b64fe0a75260b505ba3e5eb1fe332

        SHA1

        ee41cb8386117f4043d2e4b6fd88bc4b0769ae93

        SHA256

        9d0a67a72ec8f0b53ccfa6a987adcbce880c9e5a2c01aeaf8cb8c34a5c163461

        SHA512

        d79b3bc814afdf7af5af4cd5bbe7cfe540d0f4bec1a017ff3b54e9e165d394da989f0bb4884ab5c523ed3b1122909e3b87eaa29d621e0549e926d7d6fbe5c27f

      • memory/620-175-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-189-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-167-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-169-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-171-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-173-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-164-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-177-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-179-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-181-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-183-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-185-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-187-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-165-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-191-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/620-192-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/620-193-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/620-194-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/620-195-0x0000000000400000-0x00000000004BB000-memory.dmp

        Filesize

        748KB

      • memory/620-197-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/620-198-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/620-199-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/620-200-0x0000000000400000-0x00000000004BB000-memory.dmp

        Filesize

        748KB

      • memory/620-163-0x0000000004C70000-0x0000000005214000-memory.dmp

        Filesize

        5.6MB

      • memory/620-162-0x0000000000620000-0x000000000064D000-memory.dmp

        Filesize

        180KB

      • memory/2284-210-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-1117-0x00000000059F0000-0x0000000005A02000-memory.dmp

        Filesize

        72KB

      • memory/2284-213-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-215-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-216-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-217-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-212-0x00000000005A0000-0x00000000005EB000-memory.dmp

        Filesize

        300KB

      • memory/2284-220-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-218-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-222-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-224-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-226-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-228-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-230-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-232-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-234-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-236-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-238-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-240-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-1115-0x0000000005210000-0x0000000005828000-memory.dmp

        Filesize

        6.1MB

      • memory/2284-1116-0x00000000058B0000-0x00000000059BA000-memory.dmp

        Filesize

        1.0MB

      • memory/2284-208-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-1118-0x0000000005A10000-0x0000000005A4C000-memory.dmp

        Filesize

        240KB

      • memory/2284-1119-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-1120-0x0000000005D00000-0x0000000005D66000-memory.dmp

        Filesize

        408KB

      • memory/2284-1122-0x0000000006500000-0x0000000006592000-memory.dmp

        Filesize

        584KB

      • memory/2284-1123-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-1124-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-1125-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-1126-0x0000000006840000-0x0000000006A02000-memory.dmp

        Filesize

        1.8MB

      • memory/2284-1127-0x0000000006A20000-0x0000000006F4C000-memory.dmp

        Filesize

        5.2MB

      • memory/2284-1128-0x00000000009A0000-0x00000000009B0000-memory.dmp

        Filesize

        64KB

      • memory/2284-1129-0x0000000007090000-0x0000000007106000-memory.dmp

        Filesize

        472KB

      • memory/2284-1130-0x0000000007110000-0x0000000007160000-memory.dmp

        Filesize

        320KB

      • memory/2284-206-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/2284-205-0x0000000002530000-0x000000000256E000-memory.dmp

        Filesize

        248KB

      • memory/3680-154-0x0000000000560000-0x000000000056A000-memory.dmp

        Filesize

        40KB

      • memory/3680-155-0x000000001C620000-0x000000001C76E000-memory.dmp

        Filesize

        1.3MB

      • memory/3680-157-0x000000001C620000-0x000000001C76E000-memory.dmp

        Filesize

        1.3MB

      • memory/3704-1136-0x0000000000780000-0x00000000007B2000-memory.dmp

        Filesize

        200KB

      • memory/3704-1137-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB