Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2023, 09:31

General

  • Target

    978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52.exe

  • Size

    861KB

  • MD5

    0fbcc9f746a739cffa711293281d7cd8

  • SHA1

    bf71952cf63103ae86438c4a86852745fd295ccd

  • SHA256

    978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52

  • SHA512

    88f17a921c738ec73248f2eec6791fd92915833e02a498bb9a0b6de0cfb01249b0fea85eff042a1e035c3383533a52ad7ad77fb3cd04796ff799cc626121a692

  • SSDEEP

    24576:vypjeVctemQHXq08PTC0C77uJpljnkAa:6pCQemoCPe0CnuPlg

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52.exe
    "C:\Users\Admin\AppData\Local\Temp\978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1076
            5⤵
            • Program crash
            PID:4752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1744
          4⤵
          • Program crash
          PID:3132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3492 -ip 3492
    1⤵
      PID:4776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3176 -ip 3176
      1⤵
        PID:1632
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1684

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe

              Filesize

              175KB

              MD5

              478e884952392c14b85cca1a6a4f3e35

              SHA1

              f3475db1427fec3eedf583f1b7b0f839b27f8d74

              SHA256

              bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

              SHA512

              b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe

              Filesize

              175KB

              MD5

              478e884952392c14b85cca1a6a4f3e35

              SHA1

              f3475db1427fec3eedf583f1b7b0f839b27f8d74

              SHA256

              bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

              SHA512

              b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe

              Filesize

              716KB

              MD5

              9508ccfdd19b6909f80ae74ef0fd4409

              SHA1

              1e465a19891232db3d9a56b4ff6ae473e1b0be56

              SHA256

              9a7ed435ca1a90dd01049bd14130a6262b0dee5c21eb7af93e63233432bba85e

              SHA512

              a39dc4948ca79680fc04c6acdcdcebe4b736861db7c451f28a7dad6f38a9528592e8da55a35286f005d3cfa6348e524512d3aa4d57e7a0108116096d0ef8b33d

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe

              Filesize

              716KB

              MD5

              9508ccfdd19b6909f80ae74ef0fd4409

              SHA1

              1e465a19891232db3d9a56b4ff6ae473e1b0be56

              SHA256

              9a7ed435ca1a90dd01049bd14130a6262b0dee5c21eb7af93e63233432bba85e

              SHA512

              a39dc4948ca79680fc04c6acdcdcebe4b736861db7c451f28a7dad6f38a9528592e8da55a35286f005d3cfa6348e524512d3aa4d57e7a0108116096d0ef8b33d

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe

              Filesize

              399KB

              MD5

              0d2e9218c7b52202da97464ca8822c8c

              SHA1

              89b353fa48e836d2f2124ce9a529a1c3b5ac1278

              SHA256

              78d21a02e6853a37a51ad54f2a80c07a1ec01822df77a90b8f37b6390acdf819

              SHA512

              b5b385ef7f852d4c8ad05f68d01f61c5b4d7b5b70d8fdea006aa56c5b39e75d44425d2fda3d8b72c910074bfc7a329ca266190e15b26933793e71bdae7814787

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe

              Filesize

              399KB

              MD5

              0d2e9218c7b52202da97464ca8822c8c

              SHA1

              89b353fa48e836d2f2124ce9a529a1c3b5ac1278

              SHA256

              78d21a02e6853a37a51ad54f2a80c07a1ec01822df77a90b8f37b6390acdf819

              SHA512

              b5b385ef7f852d4c8ad05f68d01f61c5b4d7b5b70d8fdea006aa56c5b39e75d44425d2fda3d8b72c910074bfc7a329ca266190e15b26933793e71bdae7814787

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe

              Filesize

              359KB

              MD5

              550ee7e98a293d36630d69d8373e0774

              SHA1

              f7eda452925024aa9b32761f96a2a5b4c81644fb

              SHA256

              322f9d39d89a44310277d7803c7898723566408321498acfef7235bfe74f5193

              SHA512

              8ec7db7cbb0fb5a4c3e8d64e35840222c81f9b6cbce6b7d4b95232a6fc66a11a6c6111f3364041af05cb990dc1b1d3d82699b1edd3b1e9e081b4fa1a27316278

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe

              Filesize

              359KB

              MD5

              550ee7e98a293d36630d69d8373e0774

              SHA1

              f7eda452925024aa9b32761f96a2a5b4c81644fb

              SHA256

              322f9d39d89a44310277d7803c7898723566408321498acfef7235bfe74f5193

              SHA512

              8ec7db7cbb0fb5a4c3e8d64e35840222c81f9b6cbce6b7d4b95232a6fc66a11a6c6111f3364041af05cb990dc1b1d3d82699b1edd3b1e9e081b4fa1a27316278

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe

              Filesize

              342KB

              MD5

              2c749f917ea323b65ea01706d66c8cca

              SHA1

              4fc5904fc29f352cba246425c113e7691d71ea56

              SHA256

              24bfc55fc197091e395798a54123bb584dbae6caf2ba1f9b9699b58009f55f13

              SHA512

              bfbed2d2951887cce9f7d25b2b71068fd89448a321ac00c21d840566477ea01a81e0ad4be9e52164ac11b94bb5c88c23c0fb58501ce6ba1c3eb297eb056ef5e2

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe

              Filesize

              342KB

              MD5

              2c749f917ea323b65ea01706d66c8cca

              SHA1

              4fc5904fc29f352cba246425c113e7691d71ea56

              SHA256

              24bfc55fc197091e395798a54123bb584dbae6caf2ba1f9b9699b58009f55f13

              SHA512

              bfbed2d2951887cce9f7d25b2b71068fd89448a321ac00c21d840566477ea01a81e0ad4be9e52164ac11b94bb5c88c23c0fb58501ce6ba1c3eb297eb056ef5e2

            • memory/908-1135-0x0000000004F50000-0x0000000004F60000-memory.dmp

              Filesize

              64KB

            • memory/908-1134-0x0000000000320000-0x0000000000352000-memory.dmp

              Filesize

              200KB

            • memory/3176-240-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-1115-0x0000000007350000-0x0000000007362000-memory.dmp

              Filesize

              72KB

            • memory/3176-1128-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-1127-0x0000000009160000-0x000000000968C000-memory.dmp

              Filesize

              5.2MB

            • memory/3176-1126-0x0000000008F80000-0x0000000009142000-memory.dmp

              Filesize

              1.8MB

            • memory/3176-1125-0x0000000008DC0000-0x0000000008E10000-memory.dmp

              Filesize

              320KB

            • memory/3176-1124-0x0000000008D30000-0x0000000008DA6000-memory.dmp

              Filesize

              472KB

            • memory/3176-1123-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-1122-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-1121-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-1120-0x00000000083F0000-0x0000000008456000-memory.dmp

              Filesize

              408KB

            • memory/3176-1119-0x0000000008350000-0x00000000083E2000-memory.dmp

              Filesize

              584KB

            • memory/3176-1117-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-1116-0x0000000008070000-0x00000000080AC000-memory.dmp

              Filesize

              240KB

            • memory/3176-1114-0x0000000007F60000-0x000000000806A000-memory.dmp

              Filesize

              1.0MB

            • memory/3176-1113-0x0000000007940000-0x0000000007F58000-memory.dmp

              Filesize

              6.1MB

            • memory/3176-238-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-236-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-234-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-232-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-230-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-228-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-203-0x0000000002C40000-0x0000000002C8B000-memory.dmp

              Filesize

              300KB

            • memory/3176-206-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-204-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-205-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-207-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-209-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/3176-210-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-212-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-216-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-214-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-218-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-220-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-222-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-224-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3176-226-0x0000000004B70000-0x0000000004BAE000-memory.dmp

              Filesize

              248KB

            • memory/3492-189-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-162-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-198-0x0000000000400000-0x0000000002B05000-memory.dmp

              Filesize

              39.0MB

            • memory/3492-197-0x0000000007420000-0x0000000007430000-memory.dmp

              Filesize

              64KB

            • memory/3492-196-0x0000000007420000-0x0000000007430000-memory.dmp

              Filesize

              64KB

            • memory/3492-195-0x0000000007420000-0x0000000007430000-memory.dmp

              Filesize

              64KB

            • memory/3492-163-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-193-0x0000000000400000-0x0000000002B05000-memory.dmp

              Filesize

              39.0MB

            • memory/3492-192-0x0000000007420000-0x0000000007430000-memory.dmp

              Filesize

              64KB

            • memory/3492-169-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-191-0x0000000007420000-0x0000000007430000-memory.dmp

              Filesize

              64KB

            • memory/3492-190-0x0000000007420000-0x0000000007430000-memory.dmp

              Filesize

              64KB

            • memory/3492-167-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-165-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-177-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-183-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-181-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-179-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-185-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-175-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-173-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-171-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-187-0x0000000004B50000-0x0000000004B62000-memory.dmp

              Filesize

              72KB

            • memory/3492-161-0x0000000007430000-0x00000000079D4000-memory.dmp

              Filesize

              5.6MB

            • memory/3492-160-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

              Filesize

              180KB

            • memory/4896-154-0x0000000000460000-0x000000000046A000-memory.dmp

              Filesize

              40KB