Analysis

  • max time kernel
    53s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/03/2023, 18:29

General

  • Target

    fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe

  • Size

    526KB

  • MD5

    d80e1e1a576533180129bd59e70f2471

  • SHA1

    23251426fd645179243ac669b8cc5f48e262f118

  • SHA256

    fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6

  • SHA512

    ecb1d70fe2cba143c9c459c9bbc80175c08454ecc0d887bdd4c9b57e1ea320ae032a16c810d58350be2d683cdcc04387ff21a3fe9f162a7959949e2eefd97441

  • SSDEEP

    12288:CMrly901bFVqxeS0MwO6pAbAoyuEs1pZedXwD0O:/yuLAP6p8dysmhg

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe
    "C:\Users\Admin\AppData\Local\Temp\fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhii4264xE.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhii4264xE.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf63Bo09rL00.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf63Bo09rL00.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf31ej70cg91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf31ej70cg91.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhPV82Gb13OO.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhPV82Gb13OO.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhPV82Gb13OO.exe

    Filesize

    175KB

    MD5

    5c28c9068387199f0c7e4e53f672d5c2

    SHA1

    074bd784eebe03e91ec563a8f8eb6e75da2f99dd

    SHA256

    83c1eb4770b5200d2c0b5e10fce45c8b406c9aacb16e82b20576ed37244e517a

    SHA512

    149e0080d647d228eef4676b742b9b51a9ed6c865398eecc463e3da94c1aa7423a329aa4c596cdb94885845a54697a2e014b6972f0ae6f6727e2bd43b151c384

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhPV82Gb13OO.exe

    Filesize

    175KB

    MD5

    5c28c9068387199f0c7e4e53f672d5c2

    SHA1

    074bd784eebe03e91ec563a8f8eb6e75da2f99dd

    SHA256

    83c1eb4770b5200d2c0b5e10fce45c8b406c9aacb16e82b20576ed37244e517a

    SHA512

    149e0080d647d228eef4676b742b9b51a9ed6c865398eecc463e3da94c1aa7423a329aa4c596cdb94885845a54697a2e014b6972f0ae6f6727e2bd43b151c384

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhii4264xE.exe

    Filesize

    381KB

    MD5

    ba2f584def47c324f245b5179cc03658

    SHA1

    6fbf3f93a610d2595ab749ced43604d60fdf71ac

    SHA256

    6b61549dfd74036146564474701336f42ff7d0f9d0454a14e498dcf22d63f4f3

    SHA512

    5d4f1faa743a5f5ce737965d7c2dd7f00fef3622951c33dd5cd9721b1afe9999a208605ac7b6703fb95efadeed5f452f252f0538f4b93f990bee09f56096c003

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhii4264xE.exe

    Filesize

    381KB

    MD5

    ba2f584def47c324f245b5179cc03658

    SHA1

    6fbf3f93a610d2595ab749ced43604d60fdf71ac

    SHA256

    6b61549dfd74036146564474701336f42ff7d0f9d0454a14e498dcf22d63f4f3

    SHA512

    5d4f1faa743a5f5ce737965d7c2dd7f00fef3622951c33dd5cd9721b1afe9999a208605ac7b6703fb95efadeed5f452f252f0538f4b93f990bee09f56096c003

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf63Bo09rL00.exe

    Filesize

    11KB

    MD5

    2cd7a553a6257fbbacbe6001c62c7208

    SHA1

    ad82963f785062ffedf1177804c90d1bb81ee9f5

    SHA256

    71e318348a3dbea4ed5e27d24f5810eb24938c320621cad9045196400af3d161

    SHA512

    2589974ac81019f4a6388acc7cc43083f39e8366e87ee59393d0b42d0b85468ed51e5c64b4292b3af898ffc2769328a7949f95437bc315e0da318f795c79228d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf63Bo09rL00.exe

    Filesize

    11KB

    MD5

    2cd7a553a6257fbbacbe6001c62c7208

    SHA1

    ad82963f785062ffedf1177804c90d1bb81ee9f5

    SHA256

    71e318348a3dbea4ed5e27d24f5810eb24938c320621cad9045196400af3d161

    SHA512

    2589974ac81019f4a6388acc7cc43083f39e8366e87ee59393d0b42d0b85468ed51e5c64b4292b3af898ffc2769328a7949f95437bc315e0da318f795c79228d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf31ej70cg91.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf31ej70cg91.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • memory/2148-136-0x0000000000680000-0x00000000006CB000-memory.dmp

    Filesize

    300KB

  • memory/2148-137-0x00000000024A0000-0x00000000024E6000-memory.dmp

    Filesize

    280KB

  • memory/2148-138-0x0000000004B20000-0x000000000501E000-memory.dmp

    Filesize

    5.0MB

  • memory/2148-139-0x0000000005020000-0x0000000005064000-memory.dmp

    Filesize

    272KB

  • memory/2148-140-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-141-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-143-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-145-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-147-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-149-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-151-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-153-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-155-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-157-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-160-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-159-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-163-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-164-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-161-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-166-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-168-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-170-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-172-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-174-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-176-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-178-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-180-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-182-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-184-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-186-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-188-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-190-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-192-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-194-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-196-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-198-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-200-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-202-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-204-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-206-0x0000000005020000-0x000000000505E000-memory.dmp

    Filesize

    248KB

  • memory/2148-1049-0x00000000057F0000-0x0000000005DF6000-memory.dmp

    Filesize

    6.0MB

  • memory/2148-1050-0x0000000005260000-0x000000000536A000-memory.dmp

    Filesize

    1.0MB

  • memory/2148-1051-0x00000000053A0000-0x00000000053B2000-memory.dmp

    Filesize

    72KB

  • memory/2148-1052-0x00000000053C0000-0x00000000053FE000-memory.dmp

    Filesize

    248KB

  • memory/2148-1053-0x0000000005510000-0x000000000555B000-memory.dmp

    Filesize

    300KB

  • memory/2148-1054-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-1056-0x00000000056A0000-0x0000000005732000-memory.dmp

    Filesize

    584KB

  • memory/2148-1057-0x0000000005740000-0x00000000057A6000-memory.dmp

    Filesize

    408KB

  • memory/2148-1058-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-1059-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-1060-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-1061-0x0000000006690000-0x0000000006852000-memory.dmp

    Filesize

    1.8MB

  • memory/2148-1062-0x0000000006880000-0x0000000006DAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2148-1063-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/2148-1064-0x0000000007020000-0x0000000007096000-memory.dmp

    Filesize

    472KB

  • memory/2148-1065-0x00000000070B0000-0x0000000007100000-memory.dmp

    Filesize

    320KB

  • memory/4784-1071-0x00000000004C0000-0x00000000004F2000-memory.dmp

    Filesize

    200KB

  • memory/4784-1072-0x0000000005060000-0x0000000005070000-memory.dmp

    Filesize

    64KB

  • memory/4784-1073-0x0000000004F00000-0x0000000004F4B000-memory.dmp

    Filesize

    300KB

  • memory/4848-130-0x00000000001B0000-0x00000000001BA000-memory.dmp

    Filesize

    40KB