Analysis

  • max time kernel
    107s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/02/2023, 09:48

General

  • Target

    ac1f6f0b6526bd66d491cd06430b9b0bc2ecf0282defa87c156dfed17022f3ea.exe

  • Size

    838KB

  • MD5

    607e28d06d1bd7734c22acb61e437fe9

  • SHA1

    9739d26d00727a1fd0fab46ec98a691791d50d15

  • SHA256

    ac1f6f0b6526bd66d491cd06430b9b0bc2ecf0282defa87c156dfed17022f3ea

  • SHA512

    852d534e103e7914aa2fc8c42bee673be6db0b9f478fceaf06ca927c81ad8746c90ce1790948c3f987738a8718e24541f81e481d2a69ff7862469388edd3f1ae

  • SSDEEP

    24576:iyu17NXkDCjDEV6kjOyng4Hgt1STVW+/Di:JeKUyODD+

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac1f6f0b6526bd66d491cd06430b9b0bc2ecf0282defa87c156dfed17022f3ea.exe
    "C:\Users\Admin\AppData\Local\Temp\ac1f6f0b6526bd66d491cd06430b9b0bc2ecf0282defa87c156dfed17022f3ea.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCa05.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCa05.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vZf46.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vZf46.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnI71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnI71.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lbE50.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lbE50.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4996
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ndO52.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ndO52.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sGy19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sGy19.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sGy19.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sGy19.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCa05.exe

    Filesize

    734KB

    MD5

    5295466c1aae15bd89205c4ffddb2deb

    SHA1

    24d140bb64707759e1c017935efe98fdc47828d2

    SHA256

    63c5265b83477c5ba8d8c3158747cbd3ac75ffc90f158574985c9236f3cfbbf4

    SHA512

    0240c91be837e393f868c2ad2c2c8ee4cd4bed9ff3477642e6e7e68f12a6db80415cc994c5d917d1bbac666af24f6bc42d65a2b81dd784a3a0a9db3f2b987851

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCa05.exe

    Filesize

    734KB

    MD5

    5295466c1aae15bd89205c4ffddb2deb

    SHA1

    24d140bb64707759e1c017935efe98fdc47828d2

    SHA256

    63c5265b83477c5ba8d8c3158747cbd3ac75ffc90f158574985c9236f3cfbbf4

    SHA512

    0240c91be837e393f868c2ad2c2c8ee4cd4bed9ff3477642e6e7e68f12a6db80415cc994c5d917d1bbac666af24f6bc42d65a2b81dd784a3a0a9db3f2b987851

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ndO52.exe

    Filesize

    175KB

    MD5

    69f79e05d0c83aee310d9adfe5aa7f2b

    SHA1

    485c490180380051a14316564fbda07723be11b1

    SHA256

    c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

    SHA512

    f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ndO52.exe

    Filesize

    175KB

    MD5

    69f79e05d0c83aee310d9adfe5aa7f2b

    SHA1

    485c490180380051a14316564fbda07723be11b1

    SHA256

    c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

    SHA512

    f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vZf46.exe

    Filesize

    588KB

    MD5

    7701eb31b9c48a5b5fc86ec43c422ea7

    SHA1

    d4f6b66a0ad4b3e70a4cbccacc6884e28c60c537

    SHA256

    d76d7fca8dab473bb729bcbbbb2a1da065e67065b4b23ff28d0590465ec130f1

    SHA512

    1cb6a942a1a553180bb37828c1cacca5b662226e726beeb706c088ed8db1e0763852a085c7d21426bf369835324ff19daeb186625db0c7cd52d2413a9faa6864

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vZf46.exe

    Filesize

    588KB

    MD5

    7701eb31b9c48a5b5fc86ec43c422ea7

    SHA1

    d4f6b66a0ad4b3e70a4cbccacc6884e28c60c537

    SHA256

    d76d7fca8dab473bb729bcbbbb2a1da065e67065b4b23ff28d0590465ec130f1

    SHA512

    1cb6a942a1a553180bb37828c1cacca5b662226e726beeb706c088ed8db1e0763852a085c7d21426bf369835324ff19daeb186625db0c7cd52d2413a9faa6864

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnI71.exe

    Filesize

    473KB

    MD5

    4935a1c3f7b324d4181b56458d1d2e07

    SHA1

    f7773acb609d2865fd852f29d05f7ee698c1a4c3

    SHA256

    da5ee96b2a068b7258c34264c5f8f545f982b34dcafc4ae7c209eceb53f80607

    SHA512

    2a7845cc02ff8cc0f6659a6a13c0051c15bb6153b4189004ed5c996b5b1efd3a6bf00f62d729a8af8be1b4925b9f835c01027d1ea5937876752e451cd91c268c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnI71.exe

    Filesize

    473KB

    MD5

    4935a1c3f7b324d4181b56458d1d2e07

    SHA1

    f7773acb609d2865fd852f29d05f7ee698c1a4c3

    SHA256

    da5ee96b2a068b7258c34264c5f8f545f982b34dcafc4ae7c209eceb53f80607

    SHA512

    2a7845cc02ff8cc0f6659a6a13c0051c15bb6153b4189004ed5c996b5b1efd3a6bf00f62d729a8af8be1b4925b9f835c01027d1ea5937876752e451cd91c268c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lbE50.exe

    Filesize

    277KB

    MD5

    3bc6ecb7d1f35f3171383f88879659b7

    SHA1

    e82887b3d6ab38ae3b8880d6c904244495dcf0cc

    SHA256

    c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

    SHA512

    709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lbE50.exe

    Filesize

    277KB

    MD5

    3bc6ecb7d1f35f3171383f88879659b7

    SHA1

    e82887b3d6ab38ae3b8880d6c904244495dcf0cc

    SHA256

    c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

    SHA512

    709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

  • memory/888-474-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/888-507-0x0000000009970000-0x00000000099BB000-memory.dmp

    Filesize

    300KB

  • memory/960-943-0x0000000000820000-0x000000000082A000-memory.dmp

    Filesize

    40KB

  • memory/1912-186-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-180-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-182-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-183-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-185-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-184-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-181-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-178-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-168-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-169-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-170-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-171-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-179-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-175-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-177-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-176-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-173-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/1912-172-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-146-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-132-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-158-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-159-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-160-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-161-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-162-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-164-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-163-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-165-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-156-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-155-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-154-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-153-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-152-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-151-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-150-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-149-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-148-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-147-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-120-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-145-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-144-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-143-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-142-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-141-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-140-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-138-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-139-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-137-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-136-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-135-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-121-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-134-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-122-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-133-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-157-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-123-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-124-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-125-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-126-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-127-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-128-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-129-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-130-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2340-131-0x0000000077540000-0x00000000776CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3168-548-0x0000000000DA0000-0x0000000000DD2000-memory.dmp

    Filesize

    200KB

  • memory/4632-343-0x00000000055B0000-0x0000000005BB6000-memory.dmp

    Filesize

    6.0MB

  • memory/4632-315-0x0000000000810000-0x000000000085B000-memory.dmp

    Filesize

    300KB

  • memory/4632-364-0x0000000006320000-0x00000000064E2000-memory.dmp

    Filesize

    1.8MB

  • memory/4632-365-0x00000000064F0000-0x0000000006A1C000-memory.dmp

    Filesize

    5.2MB

  • memory/4632-368-0x0000000000710000-0x0000000000786000-memory.dmp

    Filesize

    472KB

  • memory/4632-369-0x0000000000790000-0x00000000007E0000-memory.dmp

    Filesize

    320KB

  • memory/4632-374-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4632-348-0x0000000005180000-0x00000000051BE000-memory.dmp

    Filesize

    248KB

  • memory/4632-344-0x0000000005020000-0x000000000512A000-memory.dmp

    Filesize

    1.0MB

  • memory/4632-346-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4632-332-0x0000000000510000-0x00000000005BE000-memory.dmp

    Filesize

    696KB

  • memory/4632-331-0x0000000004F30000-0x0000000004F74000-memory.dmp

    Filesize

    272KB

  • memory/4632-355-0x0000000005CF0000-0x0000000005D56000-memory.dmp

    Filesize

    408KB

  • memory/4632-329-0x00000000049F0000-0x0000000004EEE000-memory.dmp

    Filesize

    5.0MB

  • memory/4632-325-0x0000000002250000-0x0000000002296000-memory.dmp

    Filesize

    280KB

  • memory/4632-363-0x0000000006130000-0x00000000061C2000-memory.dmp

    Filesize

    584KB

  • memory/4632-350-0x00000000052D0000-0x000000000531B000-memory.dmp

    Filesize

    300KB

  • memory/4632-316-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/4632-314-0x0000000000510000-0x00000000005BE000-memory.dmp

    Filesize

    696KB

  • memory/4996-431-0x0000000000173000-0x0000000000175000-memory.dmp

    Filesize

    8KB