Analysis

  • max time kernel
    47s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2023, 01:06

General

  • Target

    dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe

  • Size

    532KB

  • MD5

    1dec159951f1abc187f8291376f46231

  • SHA1

    8eaf537891990be712cbe885981bac83cd86060b

  • SHA256

    dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc

  • SHA512

    5d0e7792a464718629981dbf260d537b3de895f62a4d94b35ace15ecd05120f5fef3eaf083e55898850634b6afe0ed82a0a2287d968ca8a422a5296c02a95e24

  • SSDEEP

    12288:BMrvy90aIlS5z+Igau7b/d28uXxsA5OJsJg:Gysu+IRunFSXF5Xm

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 38 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
    "C:\Users\Admin\AppData\Local\Temp\dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe

          Filesize

          175KB

          MD5

          60fdddf58cad8c98cee3bf7e5ced2a76

          SHA1

          ffe34c32adcebe7177ff176474f40afeea9866aa

          SHA256

          2222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f

          SHA512

          5e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe

          Filesize

          175KB

          MD5

          60fdddf58cad8c98cee3bf7e5ced2a76

          SHA1

          ffe34c32adcebe7177ff176474f40afeea9866aa

          SHA256

          2222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f

          SHA512

          5e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe

          Filesize

          388KB

          MD5

          10db956c88c355638c6f613b768cfbaa

          SHA1

          45343109e7a344f5d363ffd82d5f8f7864655f2a

          SHA256

          b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad

          SHA512

          62ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe

          Filesize

          388KB

          MD5

          10db956c88c355638c6f613b768cfbaa

          SHA1

          45343109e7a344f5d363ffd82d5f8f7864655f2a

          SHA256

          b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad

          SHA512

          62ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exe

          Filesize

          11KB

          MD5

          d8c5787eccdf1a982b642ddde7667899

          SHA1

          a12d727bf992e0aceda76cd1d782dff89cb85fc1

          SHA256

          c684fe61d26739acec9b186b1387f5e4a7b0a384d2716eefc6881d0387784409

          SHA512

          7860d16712baae543e463c2305c99892c444f5755e03d407086d395adfdd2d11ac6567cf136b1e713f950b2b3ba02b9376d4abb4ccebbc845b2685ddeafe302b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exe

          Filesize

          11KB

          MD5

          d8c5787eccdf1a982b642ddde7667899

          SHA1

          a12d727bf992e0aceda76cd1d782dff89cb85fc1

          SHA256

          c684fe61d26739acec9b186b1387f5e4a7b0a384d2716eefc6881d0387784409

          SHA512

          7860d16712baae543e463c2305c99892c444f5755e03d407086d395adfdd2d11ac6567cf136b1e713f950b2b3ba02b9376d4abb4ccebbc845b2685ddeafe302b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe

          Filesize

          175KB

          MD5

          60fdddf58cad8c98cee3bf7e5ced2a76

          SHA1

          ffe34c32adcebe7177ff176474f40afeea9866aa

          SHA256

          2222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f

          SHA512

          5e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe

          Filesize

          175KB

          MD5

          60fdddf58cad8c98cee3bf7e5ced2a76

          SHA1

          ffe34c32adcebe7177ff176474f40afeea9866aa

          SHA256

          2222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f

          SHA512

          5e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe

          Filesize

          388KB

          MD5

          10db956c88c355638c6f613b768cfbaa

          SHA1

          45343109e7a344f5d363ffd82d5f8f7864655f2a

          SHA256

          b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad

          SHA512

          62ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe

          Filesize

          388KB

          MD5

          10db956c88c355638c6f613b768cfbaa

          SHA1

          45343109e7a344f5d363ffd82d5f8f7864655f2a

          SHA256

          b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad

          SHA512

          62ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exe

          Filesize

          11KB

          MD5

          d8c5787eccdf1a982b642ddde7667899

          SHA1

          a12d727bf992e0aceda76cd1d782dff89cb85fc1

          SHA256

          c684fe61d26739acec9b186b1387f5e4a7b0a384d2716eefc6881d0387784409

          SHA512

          7860d16712baae543e463c2305c99892c444f5755e03d407086d395adfdd2d11ac6567cf136b1e713f950b2b3ba02b9376d4abb4ccebbc845b2685ddeafe302b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • memory/1128-113-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-127-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-89-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-91-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-93-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-95-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-97-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-99-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-101-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-103-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-105-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-107-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-109-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-87-0x0000000004B70000-0x0000000004BB0000-memory.dmp

          Filesize

          256KB

        • memory/1128-115-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-111-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-117-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-119-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-121-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-123-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-125-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-88-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-129-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-131-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-133-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-135-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-139-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-137-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-143-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-141-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-145-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-147-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-149-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-151-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

          Filesize

          248KB

        • memory/1128-994-0x0000000004B70000-0x0000000004BB0000-memory.dmp

          Filesize

          256KB

        • memory/1128-996-0x0000000004B70000-0x0000000004BB0000-memory.dmp

          Filesize

          256KB

        • memory/1128-86-0x0000000004B70000-0x0000000004BB0000-memory.dmp

          Filesize

          256KB

        • memory/1128-85-0x0000000004AF0000-0x0000000004B34000-memory.dmp

          Filesize

          272KB

        • memory/1128-84-0x0000000004AB0000-0x0000000004AF6000-memory.dmp

          Filesize

          280KB

        • memory/1128-83-0x0000000000260000-0x00000000002AB000-memory.dmp

          Filesize

          300KB

        • memory/1916-72-0x0000000000FF0000-0x0000000000FFA000-memory.dmp

          Filesize

          40KB

        • memory/1936-1005-0x00000000013E0000-0x0000000001412000-memory.dmp

          Filesize

          200KB

        • memory/1936-1006-0x0000000004FA0000-0x0000000004FE0000-memory.dmp

          Filesize

          256KB