Analysis

  • max time kernel
    143s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2023, 00:58

General

  • Target

    4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe

  • Size

    792KB

  • MD5

    db6c32be549378b8e0c931b6b1de3f1a

  • SHA1

    1dd9ba11211e51660a3011acb1ffe5e1719fa0ba

  • SHA256

    4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059

  • SHA512

    d0ed91c750f1dc39858b37ce4ec533df447783cfbac943827cbeb7722342332a4fec64695874393fb8072dbf4550f94a2813b259b66a6f963592a0b5915accea

  • SSDEEP

    12288:CMrYy90pcQXoaV6xND44z5sbUcppWzaQ0QyItUvZdoInI7b2eGXhPqDXh3wKYPv1:iy8V6b2UIpS0jIozoII7b2eMMaTkUr

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe
    "C:\Users\Admin\AppData\Local\Temp\4d2a7bfca90243474e6faa22bb05f55bde5aed73da70bdcbe40cf4bbd4b70059.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1051.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4157.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4157.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4438Hk.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4438Hk.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c57Ip50.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c57Ip50.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4320
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 1080
            5⤵
            • Program crash
            PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMKer74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMKer74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 1348
          4⤵
          • Program crash
          PID:3280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e59RG64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e59RG64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4320 -ip 4320
    1⤵
      PID:848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4928 -ip 4928
      1⤵
        PID:2360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e59RG64.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e59RG64.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1051.exe

        Filesize

        647KB

        MD5

        08453d87463d3a7b636875b5ce575520

        SHA1

        fb3e3eb865e78b7403de238a3e9e80a2d54aac53

        SHA256

        2e89aee93de3eaa132044b95dcdc30d2bd19e30cbbe492e222293e4b00872082

        SHA512

        2506a5b257ca579a52da00b91a4b593191b0e08161d58f75c0d1dcc8cbc1bf5a2bf52f0a6afb0d854c4af005286d01374ff306b5c680ed7a0ce03da802bcbdd0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1051.exe

        Filesize

        647KB

        MD5

        08453d87463d3a7b636875b5ce575520

        SHA1

        fb3e3eb865e78b7403de238a3e9e80a2d54aac53

        SHA256

        2e89aee93de3eaa132044b95dcdc30d2bd19e30cbbe492e222293e4b00872082

        SHA512

        2506a5b257ca579a52da00b91a4b593191b0e08161d58f75c0d1dcc8cbc1bf5a2bf52f0a6afb0d854c4af005286d01374ff306b5c680ed7a0ce03da802bcbdd0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMKer74.exe

        Filesize

        283KB

        MD5

        40096b79ad1e14c98984951f525a553f

        SHA1

        389899a50afead50353c685112031a59571634e9

        SHA256

        6c60f2349984f569705fad7cdb7905f2c6edb2d927ef75b50d9e7e6783086811

        SHA512

        35f7b2d3e18bff8e9492c8928f084145aa2eac331b57fbfb3c3026e2c2284b82af99de35d65b3721215648bf0ffce955b64e5cf7245c1ada2923bf07f277f05e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMKer74.exe

        Filesize

        283KB

        MD5

        40096b79ad1e14c98984951f525a553f

        SHA1

        389899a50afead50353c685112031a59571634e9

        SHA256

        6c60f2349984f569705fad7cdb7905f2c6edb2d927ef75b50d9e7e6783086811

        SHA512

        35f7b2d3e18bff8e9492c8928f084145aa2eac331b57fbfb3c3026e2c2284b82af99de35d65b3721215648bf0ffce955b64e5cf7245c1ada2923bf07f277f05e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4157.exe

        Filesize

        324KB

        MD5

        e0d9a619b307310f02608ec99aa52c16

        SHA1

        edddff60b3030fd792f6e2714a862446107e1045

        SHA256

        c170acf7216d5e2226f412ad95c160ef79925c139f963ddd03769ad67b1ca66a

        SHA512

        a89eb2b731f81b8ab4fb730da091bcba2115a6e6946860f9f34af045f6e783fec9e2711f62610bba0005962af35241b5530de8dfcfc4c9a65c171472a7346e7b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4157.exe

        Filesize

        324KB

        MD5

        e0d9a619b307310f02608ec99aa52c16

        SHA1

        edddff60b3030fd792f6e2714a862446107e1045

        SHA256

        c170acf7216d5e2226f412ad95c160ef79925c139f963ddd03769ad67b1ca66a

        SHA512

        a89eb2b731f81b8ab4fb730da091bcba2115a6e6946860f9f34af045f6e783fec9e2711f62610bba0005962af35241b5530de8dfcfc4c9a65c171472a7346e7b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4438Hk.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4438Hk.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c57Ip50.exe

        Filesize

        226KB

        MD5

        1a8915343282d3b407dc11e70d62d4be

        SHA1

        669bfe62b4318910d7cbc8a3a7fdbd1576e6b847

        SHA256

        3ca19fe19ca56c5cd2f236b489b478db15a8379c4df4250b19958c1cac8aa5cd

        SHA512

        9d68ab8f4534090bc2cf3f4cd7d12f8b5766cdab3b1dbaea979d986738372c7549476ddfebeab4e349bbe782f966fecc1998626be2c9e77279bad4fd70001433

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c57Ip50.exe

        Filesize

        226KB

        MD5

        1a8915343282d3b407dc11e70d62d4be

        SHA1

        669bfe62b4318910d7cbc8a3a7fdbd1576e6b847

        SHA256

        3ca19fe19ca56c5cd2f236b489b478db15a8379c4df4250b19958c1cac8aa5cd

        SHA512

        9d68ab8f4534090bc2cf3f4cd7d12f8b5766cdab3b1dbaea979d986738372c7549476ddfebeab4e349bbe782f966fecc1998626be2c9e77279bad4fd70001433

      • memory/224-1132-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/224-1133-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/224-1131-0x0000000000290000-0x00000000002C2000-memory.dmp

        Filesize

        200KB

      • memory/4320-167-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-183-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-165-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-163-0x0000000000800000-0x0000000000810000-memory.dmp

        Filesize

        64KB

      • memory/4320-169-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-171-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-173-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-175-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-177-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-179-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-181-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-164-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-185-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-187-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-189-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-191-0x0000000002540000-0x0000000002552000-memory.dmp

        Filesize

        72KB

      • memory/4320-192-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/4320-193-0x0000000000800000-0x0000000000810000-memory.dmp

        Filesize

        64KB

      • memory/4320-194-0x0000000000800000-0x0000000000810000-memory.dmp

        Filesize

        64KB

      • memory/4320-195-0x0000000000800000-0x0000000000810000-memory.dmp

        Filesize

        64KB

      • memory/4320-197-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/4320-162-0x0000000000800000-0x0000000000810000-memory.dmp

        Filesize

        64KB

      • memory/4320-161-0x0000000000610000-0x000000000063D000-memory.dmp

        Filesize

        180KB

      • memory/4320-160-0x0000000004AD0000-0x0000000005074000-memory.dmp

        Filesize

        5.6MB

      • memory/4748-154-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

        Filesize

        40KB

      • memory/4928-207-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-211-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-209-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-213-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-215-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-217-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-219-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-221-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-223-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-229-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-227-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-225-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-231-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-233-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-235-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-446-0x0000000000650000-0x000000000069B000-memory.dmp

        Filesize

        300KB

      • memory/4928-448-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/4928-450-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/4928-1111-0x0000000005210000-0x0000000005828000-memory.dmp

        Filesize

        6.1MB

      • memory/4928-1112-0x00000000058B0000-0x00000000059BA000-memory.dmp

        Filesize

        1.0MB

      • memory/4928-1113-0x00000000059F0000-0x0000000005A02000-memory.dmp

        Filesize

        72KB

      • memory/4928-1114-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/4928-1115-0x0000000005A10000-0x0000000005A4C000-memory.dmp

        Filesize

        240KB

      • memory/4928-1116-0x0000000005D00000-0x0000000005D92000-memory.dmp

        Filesize

        584KB

      • memory/4928-1117-0x0000000005DA0000-0x0000000005E06000-memory.dmp

        Filesize

        408KB

      • memory/4928-1119-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/4928-1120-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/4928-1121-0x0000000008C90000-0x0000000008E52000-memory.dmp

        Filesize

        1.8MB

      • memory/4928-1122-0x0000000008E70000-0x000000000939C000-memory.dmp

        Filesize

        5.2MB

      • memory/4928-1123-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/4928-205-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-203-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-202-0x0000000004A70000-0x0000000004AAE000-memory.dmp

        Filesize

        248KB

      • memory/4928-1124-0x0000000002240000-0x00000000022B6000-memory.dmp

        Filesize

        472KB

      • memory/4928-1125-0x00000000078B0000-0x0000000007900000-memory.dmp

        Filesize

        320KB