Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 03:12

General

  • Target

    c5ece24ca9946396c9b1d0c697c6d5ef3eb79aad009d153000812ef9e22b4d27.exe

  • Size

    792KB

  • MD5

    fcdbde307f7adaee055808a75231737e

  • SHA1

    4d0770f3eebfffc8403b7c3a225c85261ec4a720

  • SHA256

    c5ece24ca9946396c9b1d0c697c6d5ef3eb79aad009d153000812ef9e22b4d27

  • SHA512

    750894181a1282b7057c056fde3f861f8f3567e478004436d129c2f1726ba6091fdc60abb517af2dac953e9e96850427df1266a38ea0dc5f6194f112256d7a4d

  • SSDEEP

    12288:0MrYy90sqMAeJVivN825CnfC+vjZZ1W9LxVaYnoLhEs17Bzo/cJ47:MyKyVi225CaojZZ1mFVpnUR17yD

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5ece24ca9946396c9b1d0c697c6d5ef3eb79aad009d153000812ef9e22b4d27.exe
    "C:\Users\Admin\AppData\Local\Temp\c5ece24ca9946396c9b1d0c697c6d5ef3eb79aad009d153000812ef9e22b4d27.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7928.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7928.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8082.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8082.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4201ut.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4201ut.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5008
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c04Kj18.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c04Kj18.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2364
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 1088
            5⤵
            • Program crash
            PID:1836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKHKT82.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKHKT82.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 1668
          4⤵
          • Program crash
          PID:3372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04bw95.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04bw95.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2364 -ip 2364
    1⤵
      PID:3852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1808 -ip 1808
      1⤵
        PID:5076

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04bw95.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04bw95.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7928.exe

        Filesize

        647KB

        MD5

        9c9830a684cc644ee598356189a387ec

        SHA1

        6d508be24c67b23868bce05baea28642fc3ee776

        SHA256

        97d291e20b4eb29936c13db2bf9f01a11081f06ba36ae0a4649a9728a3d50401

        SHA512

        f909862a1856206e61bb5394690bdcd6cbcfce6face6c3bda5c65d509a7ed4196c3ead697e1061a33562788ae1065cf02f514d4c68844c0b386c504ef7a73d34

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice7928.exe

        Filesize

        647KB

        MD5

        9c9830a684cc644ee598356189a387ec

        SHA1

        6d508be24c67b23868bce05baea28642fc3ee776

        SHA256

        97d291e20b4eb29936c13db2bf9f01a11081f06ba36ae0a4649a9728a3d50401

        SHA512

        f909862a1856206e61bb5394690bdcd6cbcfce6face6c3bda5c65d509a7ed4196c3ead697e1061a33562788ae1065cf02f514d4c68844c0b386c504ef7a73d34

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKHKT82.exe

        Filesize

        283KB

        MD5

        f5e2e2ec5dc3a913492a0d92103a8d8a

        SHA1

        f9c750beaa1586b4b53cc607473ba0a667328336

        SHA256

        bee7bb09ed36c248d4c38ab233641b7ee76f09ba2599359bf4b4bc708b1b4642

        SHA512

        b459b1182b02c1ab9da8ff52bdd0d8b6d39af94d61aae1a7bb8992aa3c7cc49f7459a52a106cbed7728764d3a61022ec77c67814e0990f65feea5eb6da7f8c01

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dKHKT82.exe

        Filesize

        283KB

        MD5

        f5e2e2ec5dc3a913492a0d92103a8d8a

        SHA1

        f9c750beaa1586b4b53cc607473ba0a667328336

        SHA256

        bee7bb09ed36c248d4c38ab233641b7ee76f09ba2599359bf4b4bc708b1b4642

        SHA512

        b459b1182b02c1ab9da8ff52bdd0d8b6d39af94d61aae1a7bb8992aa3c7cc49f7459a52a106cbed7728764d3a61022ec77c67814e0990f65feea5eb6da7f8c01

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8082.exe

        Filesize

        324KB

        MD5

        c39c27e3cf50bb931b2d56631aa7d480

        SHA1

        be6be440bf46fd7e16dec6e77fd61dc6902def7c

        SHA256

        f16221f773a8ea4cc4b692de5295b430f5fe6ac4e556c065c5df863f2328df0e

        SHA512

        58c9a5c36c488961fecf174e18bcb0b75edbfd1526aa825d6d140c7bcf81908d879afe09ff334f4135fe5e3a8adb115adfc3a294d3d8a73cc5e455318468c018

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8082.exe

        Filesize

        324KB

        MD5

        c39c27e3cf50bb931b2d56631aa7d480

        SHA1

        be6be440bf46fd7e16dec6e77fd61dc6902def7c

        SHA256

        f16221f773a8ea4cc4b692de5295b430f5fe6ac4e556c065c5df863f2328df0e

        SHA512

        58c9a5c36c488961fecf174e18bcb0b75edbfd1526aa825d6d140c7bcf81908d879afe09ff334f4135fe5e3a8adb115adfc3a294d3d8a73cc5e455318468c018

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4201ut.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4201ut.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c04Kj18.exe

        Filesize

        226KB

        MD5

        1292623f01713fad2bccf6f0759e4f4b

        SHA1

        49d631a7a26c3ec1728f162fa00a8ed97434554b

        SHA256

        3f1dc127373e86cd244c7f7d19fb993f4142ecea6bd3ac9c6bd9df3b20643e4d

        SHA512

        65435884bdc44daa0dc02bd7f13aff215c2fb04deeb5f578e1691160c75f7af2b986ea646dfa240dea7e46e44506ed8d59d4a4e17d287365cd08304195efb23e

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c04Kj18.exe

        Filesize

        226KB

        MD5

        1292623f01713fad2bccf6f0759e4f4b

        SHA1

        49d631a7a26c3ec1728f162fa00a8ed97434554b

        SHA256

        3f1dc127373e86cd244c7f7d19fb993f4142ecea6bd3ac9c6bd9df3b20643e4d

        SHA512

        65435884bdc44daa0dc02bd7f13aff215c2fb04deeb5f578e1691160c75f7af2b986ea646dfa240dea7e46e44506ed8d59d4a4e17d287365cd08304195efb23e

      • memory/1808-1112-0x0000000005260000-0x0000000005878000-memory.dmp

        Filesize

        6.1MB

      • memory/1808-1114-0x00000000059F0000-0x0000000005A02000-memory.dmp

        Filesize

        72KB

      • memory/1808-1127-0x0000000007CB0000-0x00000000081DC000-memory.dmp

        Filesize

        5.2MB

      • memory/1808-1126-0x0000000007A90000-0x0000000007C52000-memory.dmp

        Filesize

        1.8MB

      • memory/1808-1125-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-1124-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-1123-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-1122-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-1121-0x0000000006530000-0x0000000006580000-memory.dmp

        Filesize

        320KB

      • memory/1808-1120-0x00000000064A0000-0x0000000006516000-memory.dmp

        Filesize

        472KB

      • memory/1808-1119-0x00000000063C0000-0x0000000006452000-memory.dmp

        Filesize

        584KB

      • memory/1808-1117-0x0000000005D00000-0x0000000005D66000-memory.dmp

        Filesize

        408KB

      • memory/1808-1116-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-1115-0x0000000005A10000-0x0000000005A4C000-memory.dmp

        Filesize

        240KB

      • memory/1808-1113-0x00000000058B0000-0x00000000059BA000-memory.dmp

        Filesize

        1.0MB

      • memory/1808-239-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-237-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-235-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-233-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-231-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-229-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-227-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-225-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-203-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-202-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-206-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-205-0x0000000000740000-0x000000000078B000-memory.dmp

        Filesize

        300KB

      • memory/1808-208-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-209-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-211-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-212-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-213-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/1808-215-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-217-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-219-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-221-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/1808-223-0x0000000002730000-0x000000000276E000-memory.dmp

        Filesize

        248KB

      • memory/2364-185-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-171-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-162-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/2364-195-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/2364-194-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/2364-193-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/2364-192-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/2364-191-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-161-0x0000000000630000-0x000000000065D000-memory.dmp

        Filesize

        180KB

      • memory/2364-189-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-164-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-187-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-197-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/2364-183-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-167-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-179-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-177-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-175-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-173-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-163-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/2364-169-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-181-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-165-0x00000000024C0000-0x00000000024D2000-memory.dmp

        Filesize

        72KB

      • memory/2364-160-0x0000000004BA0000-0x0000000005144000-memory.dmp

        Filesize

        5.6MB

      • memory/2812-1133-0x0000000000700000-0x0000000000732000-memory.dmp

        Filesize

        200KB

      • memory/2812-1134-0x0000000005350000-0x0000000005360000-memory.dmp

        Filesize

        64KB

      • memory/5008-154-0x0000000000250000-0x000000000025A000-memory.dmp

        Filesize

        40KB