Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-03-2023 19:52

General

  • Target

    3d10de517e2f37417329feafb37864209b1235be8a5871f4864d1a172c054513.exe

  • Size

    794KB

  • MD5

    c59c5047dc802564c2029c9e10ed860d

  • SHA1

    b3e16fb4c58b5de4455ffc27a354b35d3098e50a

  • SHA256

    3d10de517e2f37417329feafb37864209b1235be8a5871f4864d1a172c054513

  • SHA512

    71a467862942fc84ac065e39d90640accfe1fe78169f49f81e54702487f1074d50f02c8248347d06829d8de73f73cd6a9daeaecd1dc8c0ddbae05329e5a185d7

  • SSDEEP

    12288:TMrYy9007OYYv7tdzkjA/E5Y9TwDhLum8qDKlbY0vqFOPfEuCfW14bNQ+:Dyh7OYOtm7Bqm8qDKlbzvqIPfATbNf

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d10de517e2f37417329feafb37864209b1235be8a5871f4864d1a172c054513.exe
    "C:\Users\Admin\AppData\Local\Temp\3d10de517e2f37417329feafb37864209b1235be8a5871f4864d1a172c054513.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4182.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4182.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3189.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3189.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1957Pw.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1957Pw.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c40Fb48.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c40Fb48.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRHrf09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRHrf09.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e00jo37.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e00jo37.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e00jo37.exe

    Filesize

    175KB

    MD5

    478e884952392c14b85cca1a6a4f3e35

    SHA1

    f3475db1427fec3eedf583f1b7b0f839b27f8d74

    SHA256

    bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

    SHA512

    b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e00jo37.exe

    Filesize

    175KB

    MD5

    478e884952392c14b85cca1a6a4f3e35

    SHA1

    f3475db1427fec3eedf583f1b7b0f839b27f8d74

    SHA256

    bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

    SHA512

    b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4182.exe

    Filesize

    648KB

    MD5

    cf980709386e77f9ab032aa5f2f9a8ee

    SHA1

    3a9fd1802cd52c18d5a470ef62fbe5d4bc4dfc89

    SHA256

    7508ea9b2b5d3d30b340049e0cff1a9729a7cb029d15a8a71c8ffd8901001ef8

    SHA512

    f192d2c189e1843e04d7f0134aba27e1948d756f80fc69f9b878484053d0163ab52b9d2c283aa3781654df2c8a904baab69f29d7bcc9a80987434e362ea7e007

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4182.exe

    Filesize

    648KB

    MD5

    cf980709386e77f9ab032aa5f2f9a8ee

    SHA1

    3a9fd1802cd52c18d5a470ef62fbe5d4bc4dfc89

    SHA256

    7508ea9b2b5d3d30b340049e0cff1a9729a7cb029d15a8a71c8ffd8901001ef8

    SHA512

    f192d2c189e1843e04d7f0134aba27e1948d756f80fc69f9b878484053d0163ab52b9d2c283aa3781654df2c8a904baab69f29d7bcc9a80987434e362ea7e007

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRHrf09.exe

    Filesize

    284KB

    MD5

    166d447cd21af28d78ca04c4571d5cce

    SHA1

    b2ff5e9bd20fca0e693cd01b2849e066edcbc4ca

    SHA256

    79897a9f8ae89aa18563908595a2fd3b6a915f73f2df4195c5a4357484e00431

    SHA512

    60dc6e516050d20ec2acdf021a237cef46c1dbb6390ccabe21c12d439df338eb2a9d64d0b376f5852a80e313f0db76e059d25e71f241e43c42b3cd4720a3ea78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRHrf09.exe

    Filesize

    284KB

    MD5

    166d447cd21af28d78ca04c4571d5cce

    SHA1

    b2ff5e9bd20fca0e693cd01b2849e066edcbc4ca

    SHA256

    79897a9f8ae89aa18563908595a2fd3b6a915f73f2df4195c5a4357484e00431

    SHA512

    60dc6e516050d20ec2acdf021a237cef46c1dbb6390ccabe21c12d439df338eb2a9d64d0b376f5852a80e313f0db76e059d25e71f241e43c42b3cd4720a3ea78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3189.exe

    Filesize

    324KB

    MD5

    1c4df42e78a0aee15aff9d19634418a9

    SHA1

    6da51da153e4e7127642e35d47ed8a491183560c

    SHA256

    fbb2e8e4e69a3c5e7066077a28bf7d5eb3b072fff46e9d6ec4f53f9e3fc2acee

    SHA512

    2cbfb99462977e3a64dda46cd09d04436ca00c2c01262ba5dc07c68750e73ad67e9a23002a1d3f04b99f4f2b3e4cb885f7237b1938f44e1ab0f1f21c027902b6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3189.exe

    Filesize

    324KB

    MD5

    1c4df42e78a0aee15aff9d19634418a9

    SHA1

    6da51da153e4e7127642e35d47ed8a491183560c

    SHA256

    fbb2e8e4e69a3c5e7066077a28bf7d5eb3b072fff46e9d6ec4f53f9e3fc2acee

    SHA512

    2cbfb99462977e3a64dda46cd09d04436ca00c2c01262ba5dc07c68750e73ad67e9a23002a1d3f04b99f4f2b3e4cb885f7237b1938f44e1ab0f1f21c027902b6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1957Pw.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1957Pw.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c40Fb48.exe

    Filesize

    226KB

    MD5

    a0ed3f11eb9a35be390724713e3b572c

    SHA1

    c994c5cc881a63b3b265adccd309fce84b578674

    SHA256

    d56d224d2f0d15ac81998c35bc1d398e45908e9bebf7b0f898e7823bb311292d

    SHA512

    2a55d14515ae0b2afcc6fe715600f1801691d0fec0a0c138143789d4540d0b729e9024713672885ccb7a4f645b5984a3deb2830bd8e50650016c062c8fdbb6b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c40Fb48.exe

    Filesize

    226KB

    MD5

    a0ed3f11eb9a35be390724713e3b572c

    SHA1

    c994c5cc881a63b3b265adccd309fce84b578674

    SHA256

    d56d224d2f0d15ac81998c35bc1d398e45908e9bebf7b0f898e7823bb311292d

    SHA512

    2a55d14515ae0b2afcc6fe715600f1801691d0fec0a0c138143789d4540d0b729e9024713672885ccb7a4f645b5984a3deb2830bd8e50650016c062c8fdbb6b0

  • memory/968-1103-0x00000000056E0000-0x00000000057EA000-memory.dmp

    Filesize

    1.0MB

  • memory/968-1105-0x0000000005830000-0x000000000586E000-memory.dmp

    Filesize

    248KB

  • memory/968-1118-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-1117-0x0000000007D90000-0x0000000007DE0000-memory.dmp

    Filesize

    320KB

  • memory/968-1116-0x0000000007D00000-0x0000000007D76000-memory.dmp

    Filesize

    472KB

  • memory/968-1115-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-1114-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-1113-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-1112-0x0000000006430000-0x000000000695C000-memory.dmp

    Filesize

    5.2MB

  • memory/968-1111-0x0000000006260000-0x0000000006422000-memory.dmp

    Filesize

    1.8MB

  • memory/968-1110-0x0000000005B50000-0x0000000005BB6000-memory.dmp

    Filesize

    408KB

  • memory/968-1109-0x0000000005AB0000-0x0000000005B42000-memory.dmp

    Filesize

    584KB

  • memory/968-1107-0x0000000005970000-0x00000000059BB000-memory.dmp

    Filesize

    300KB

  • memory/968-1106-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-1104-0x0000000004B80000-0x0000000004B92000-memory.dmp

    Filesize

    72KB

  • memory/968-1102-0x00000000050D0000-0x00000000056D6000-memory.dmp

    Filesize

    6.0MB

  • memory/968-224-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-230-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-228-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-227-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-225-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/968-223-0x00000000006D0000-0x000000000071B000-memory.dmp

    Filesize

    300KB

  • memory/968-221-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-190-0x00000000025A0000-0x00000000025E6000-memory.dmp

    Filesize

    280KB

  • memory/968-191-0x0000000004A90000-0x0000000004AD4000-memory.dmp

    Filesize

    272KB

  • memory/968-192-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-193-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-195-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-197-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-199-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-201-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-203-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-205-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-207-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-209-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-211-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-213-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-215-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-217-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/968-219-0x0000000004A90000-0x0000000004ACE000-memory.dmp

    Filesize

    248KB

  • memory/1464-142-0x00000000001E0000-0x00000000001EA000-memory.dmp

    Filesize

    40KB

  • memory/4168-166-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-155-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-168-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-182-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-180-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-178-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-176-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-149-0x0000000004AA0000-0x0000000004F9E000-memory.dmp

    Filesize

    5.0MB

  • memory/4168-174-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-152-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4168-172-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-170-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-183-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4168-150-0x00000000049E0000-0x00000000049F8000-memory.dmp

    Filesize

    96KB

  • memory/4168-153-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4168-162-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-160-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-158-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-156-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-185-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4168-154-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4168-164-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4168-148-0x0000000002310000-0x000000000232A000-memory.dmp

    Filesize

    104KB

  • memory/4168-151-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4880-1124-0x00000000003A0000-0x00000000003D2000-memory.dmp

    Filesize

    200KB

  • memory/4880-1125-0x0000000004DE0000-0x0000000004E2B000-memory.dmp

    Filesize

    300KB

  • memory/4880-1126-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB