Analysis

  • max time kernel
    53s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-03-2023 16:48

General

  • Target

    1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe

  • Size

    530KB

  • MD5

    28151b8b7b7243818bb62d6e0eaeab1b

  • SHA1

    c6fedac52bef3555dedd0fe54a412fd4257e1c13

  • SHA256

    1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9

  • SHA512

    95f17bf5056d58ceaadeb67e2a50cf7d9107fa0bdc7973e8252b05d15598545e997d71bd96f561ed2f2d0a863ac3d5d9dabd285910dff7a46d4764396ebbe3f7

  • SSDEEP

    12288:IMr5y90cVwfLtnKSnrWTffitxWYoDomXFxleDegykRb8NfxQ54NskB:ByYfLt3WTXGxNsom1Rk0Q2akB

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe
    "C:\Users\Admin\AppData\Local\Temp\1cd12cd722cf5b15ed8632578d3ca54da915c26a48a581f59cbe79b3882985e9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAj3877Gb.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAj3877Gb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf99RM05Dx04.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf99RM05Dx04.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf42TY21fz61.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf42TY21fz61.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsi12OH85uf.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsi12OH85uf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsi12OH85uf.exe

    Filesize

    175KB

    MD5

    42e978c33b8a19b0f32a3c2c0aec776a

    SHA1

    3bd693727fc27db4fb66d904c0a7e396c0e56dd8

    SHA256

    f3e432622ba83199143b54790b81b4c4176ea93eda1b35ccc560a52bad4b15a0

    SHA512

    0001ae7783e867b6dbe277a5f551ef7fcc882529325891cea62e3b9d669162c08860b40acad54535624534496c68ce493de9d86389bdd4528fc45b07c3270e3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsi12OH85uf.exe

    Filesize

    175KB

    MD5

    42e978c33b8a19b0f32a3c2c0aec776a

    SHA1

    3bd693727fc27db4fb66d904c0a7e396c0e56dd8

    SHA256

    f3e432622ba83199143b54790b81b4c4176ea93eda1b35ccc560a52bad4b15a0

    SHA512

    0001ae7783e867b6dbe277a5f551ef7fcc882529325891cea62e3b9d669162c08860b40acad54535624534496c68ce493de9d86389bdd4528fc45b07c3270e3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAj3877Gb.exe

    Filesize

    385KB

    MD5

    5426266794bb726526b84f617b629a74

    SHA1

    4f7f22389e8c5137943b171bf2501d67ef314dd7

    SHA256

    e638b32d10a090adca49a9c8e46a6c2b7bced16e3dcd1f92c2313ca9d431e019

    SHA512

    4fb566be34032fe4e72629194aac05b2512e98be3cb1a3107870604e05511c2f0c1e7e17ff64ea00109b5c22655bd5f78ee5dab473dc6069be39d6ba3505557a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAj3877Gb.exe

    Filesize

    385KB

    MD5

    5426266794bb726526b84f617b629a74

    SHA1

    4f7f22389e8c5137943b171bf2501d67ef314dd7

    SHA256

    e638b32d10a090adca49a9c8e46a6c2b7bced16e3dcd1f92c2313ca9d431e019

    SHA512

    4fb566be34032fe4e72629194aac05b2512e98be3cb1a3107870604e05511c2f0c1e7e17ff64ea00109b5c22655bd5f78ee5dab473dc6069be39d6ba3505557a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf99RM05Dx04.exe

    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf99RM05Dx04.exe

    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf42TY21fz61.exe

    Filesize

    294KB

    MD5

    cdcef278fd567074f7fd62913f828c7f

    SHA1

    f8f15924c0670526951bd988acd59ba3b0f95889

    SHA256

    fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243

    SHA512

    06d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf42TY21fz61.exe

    Filesize

    294KB

    MD5

    cdcef278fd567074f7fd62913f828c7f

    SHA1

    f8f15924c0670526951bd988acd59ba3b0f95889

    SHA256

    fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243

    SHA512

    06d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d

  • memory/2692-135-0x00000000002A0000-0x00000000002AA000-memory.dmp

    Filesize

    40KB

  • memory/3972-141-0x0000000000660000-0x00000000006AB000-memory.dmp

    Filesize

    300KB

  • memory/3972-142-0x0000000004A90000-0x0000000004AD6000-memory.dmp

    Filesize

    280KB

  • memory/3972-143-0x0000000004C20000-0x000000000511E000-memory.dmp

    Filesize

    5.0MB

  • memory/3972-144-0x0000000004B10000-0x0000000004B54000-memory.dmp

    Filesize

    272KB

  • memory/3972-145-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-148-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-146-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-154-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-152-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-156-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-150-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-166-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-174-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-178-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-182-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-184-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-187-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-185-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-191-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-199-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-201-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-205-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-211-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-209-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-207-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-203-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-197-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-195-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-193-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-189-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-183-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-180-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-176-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-172-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-170-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-168-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-164-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-162-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-160-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-158-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/3972-1054-0x0000000005730000-0x0000000005D36000-memory.dmp

    Filesize

    6.0MB

  • memory/3972-1055-0x0000000005120000-0x000000000522A000-memory.dmp

    Filesize

    1.0MB

  • memory/3972-1056-0x0000000005260000-0x0000000005272000-memory.dmp

    Filesize

    72KB

  • memory/3972-1057-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-1058-0x0000000005280000-0x00000000052BE000-memory.dmp

    Filesize

    248KB

  • memory/3972-1059-0x00000000053D0000-0x000000000541B000-memory.dmp

    Filesize

    300KB

  • memory/3972-1061-0x0000000005560000-0x00000000055F2000-memory.dmp

    Filesize

    584KB

  • memory/3972-1062-0x0000000005600000-0x0000000005666000-memory.dmp

    Filesize

    408KB

  • memory/3972-1063-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-1064-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-1065-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-1066-0x00000000089B0000-0x0000000008A26000-memory.dmp

    Filesize

    472KB

  • memory/3972-1067-0x0000000008A40000-0x0000000008A90000-memory.dmp

    Filesize

    320KB

  • memory/3972-1068-0x0000000008BB0000-0x0000000008D72000-memory.dmp

    Filesize

    1.8MB

  • memory/3972-1069-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/3972-1070-0x0000000008D80000-0x00000000092AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4836-1076-0x0000000000860000-0x0000000000892000-memory.dmp

    Filesize

    200KB

  • memory/4836-1077-0x00000000052A0000-0x00000000052EB000-memory.dmp

    Filesize

    300KB

  • memory/4836-1078-0x0000000005400000-0x0000000005410000-memory.dmp

    Filesize

    64KB