Analysis

  • max time kernel
    40s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2023, 04:46

General

  • Target

    3141d7440a8639b50a6d412e72142542.exe

  • Size

    526KB

  • MD5

    3141d7440a8639b50a6d412e72142542

  • SHA1

    96c0de2895c0a42fd838a9d167cf26e63716b583

  • SHA256

    0196d177ad5c0fa45978723063d3ad7ad06e4972986b32f7b4ef9b6ec27176a1

  • SHA512

    127e42e0a6870f0d5449ba7361bba71a126c86cf35832bb9b5d7c282908f6775ac4936d987203dc36beecb469d5465c8895da533e1bf07c08f0d00494d72b48e

  • SSDEEP

    6144:KNy+bnr+7p0yN90QEjIvVQbe/MsgDmj/Vtp+aLurj3eEhH+6Slkqh0ZyZOLI5Y:nMrTy90+vVQZKVtU1rbFhe6skOvZQEY

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3141d7440a8639b50a6d412e72142542.exe
    "C:\Users\Admin\AppData\Local\Temp\3141d7440a8639b50a6d412e72142542.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1284

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe

          Filesize

          175KB

          MD5

          91dcaa5b0aeaf9d32758d9c455f35aea

          SHA1

          e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e

          SHA256

          db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c

          SHA512

          dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe

          Filesize

          175KB

          MD5

          91dcaa5b0aeaf9d32758d9c455f35aea

          SHA1

          e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e

          SHA256

          db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c

          SHA512

          dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe

          Filesize

          382KB

          MD5

          c94aa0235fb31f34b6a80ee2abc7e55b

          SHA1

          e78eb67672bae6b07610dce71807e72a32a4abbc

          SHA256

          62f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa

          SHA512

          a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe

          Filesize

          382KB

          MD5

          c94aa0235fb31f34b6a80ee2abc7e55b

          SHA1

          e78eb67672bae6b07610dce71807e72a32a4abbc

          SHA256

          62f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa

          SHA512

          a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exe

          Filesize

          11KB

          MD5

          a7534f66029c6222f23ca72c9c6176b0

          SHA1

          1b9b0e304d5d10aa50aacfd4019f8f0e06bc2dc7

          SHA256

          36f053773aef714bbcb52d55f7c8acf99be0e987c65194e46f795d4557eef661

          SHA512

          442bc1f195cb18a16c3ea14015aeb849ffcbc230d7ca2cb2a84a7e35770b0cf31b39f4233c8d42a1dfe2711d0b84ffe6b250fe15445eb0d7e3618a01ca2e1677

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exe

          Filesize

          11KB

          MD5

          a7534f66029c6222f23ca72c9c6176b0

          SHA1

          1b9b0e304d5d10aa50aacfd4019f8f0e06bc2dc7

          SHA256

          36f053773aef714bbcb52d55f7c8acf99be0e987c65194e46f795d4557eef661

          SHA512

          442bc1f195cb18a16c3ea14015aeb849ffcbc230d7ca2cb2a84a7e35770b0cf31b39f4233c8d42a1dfe2711d0b84ffe6b250fe15445eb0d7e3618a01ca2e1677

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe

          Filesize

          364KB

          MD5

          0fb36e6dfd2286b0bb7e48c476a3f73b

          SHA1

          38801c7ea1faf291cb471397c38630a305518828

          SHA256

          edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e

          SHA512

          95c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe

          Filesize

          364KB

          MD5

          0fb36e6dfd2286b0bb7e48c476a3f73b

          SHA1

          38801c7ea1faf291cb471397c38630a305518828

          SHA256

          edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e

          SHA512

          95c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe

          Filesize

          364KB

          MD5

          0fb36e6dfd2286b0bb7e48c476a3f73b

          SHA1

          38801c7ea1faf291cb471397c38630a305518828

          SHA256

          edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e

          SHA512

          95c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe

          Filesize

          175KB

          MD5

          91dcaa5b0aeaf9d32758d9c455f35aea

          SHA1

          e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e

          SHA256

          db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c

          SHA512

          dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRF01dP53Og.exe

          Filesize

          175KB

          MD5

          91dcaa5b0aeaf9d32758d9c455f35aea

          SHA1

          e1dd4b7dce0ed3725a6d3b00189602a9cbebcf1e

          SHA256

          db07aa2921d48b8f95ea16ac28a10632ef5ca6ec7017aa60f0b87db6f8f8da3c

          SHA512

          dfe4a740261df3cbd8e0e8ab2bc2f2aec2ddd9c4c4b02b56e53a099669cfc8db14484ffd3a8f3eb0f2cc0f9ddcda67c398f7b65b77109a6934bcaaef2b448042

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe

          Filesize

          382KB

          MD5

          c94aa0235fb31f34b6a80ee2abc7e55b

          SHA1

          e78eb67672bae6b07610dce71807e72a32a4abbc

          SHA256

          62f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa

          SHA512

          a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhih9610nV.exe

          Filesize

          382KB

          MD5

          c94aa0235fb31f34b6a80ee2abc7e55b

          SHA1

          e78eb67672bae6b07610dce71807e72a32a4abbc

          SHA256

          62f91bb1b5b4d12e37576de5504cad9701241339183151753e343d6c05365cfa

          SHA512

          a6cc4879862dc94ac111a7cf4dc1b4cb3163e266163561229e6d8fbfdaa380af8318b3e0b704e4f15ad15fb4a42fdf91e881d62b987bffd5bea35857f313729f

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sf51Lh36Dh40.exe

          Filesize

          11KB

          MD5

          a7534f66029c6222f23ca72c9c6176b0

          SHA1

          1b9b0e304d5d10aa50aacfd4019f8f0e06bc2dc7

          SHA256

          36f053773aef714bbcb52d55f7c8acf99be0e987c65194e46f795d4557eef661

          SHA512

          442bc1f195cb18a16c3ea14015aeb849ffcbc230d7ca2cb2a84a7e35770b0cf31b39f4233c8d42a1dfe2711d0b84ffe6b250fe15445eb0d7e3618a01ca2e1677

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe

          Filesize

          364KB

          MD5

          0fb36e6dfd2286b0bb7e48c476a3f73b

          SHA1

          38801c7ea1faf291cb471397c38630a305518828

          SHA256

          edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e

          SHA512

          95c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe

          Filesize

          364KB

          MD5

          0fb36e6dfd2286b0bb7e48c476a3f73b

          SHA1

          38801c7ea1faf291cb471397c38630a305518828

          SHA256

          edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e

          SHA512

          95c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf13GC35Xs46.exe

          Filesize

          364KB

          MD5

          0fb36e6dfd2286b0bb7e48c476a3f73b

          SHA1

          38801c7ea1faf291cb471397c38630a305518828

          SHA256

          edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e

          SHA512

          95c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d

        • memory/1284-1004-0x0000000000020000-0x0000000000052000-memory.dmp

          Filesize

          200KB

        • memory/1284-1005-0x0000000004F10000-0x0000000004F50000-memory.dmp

          Filesize

          256KB

        • memory/1504-112-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-132-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-94-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-96-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-98-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-100-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-102-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-104-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-106-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-108-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-110-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-90-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-114-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-116-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-118-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-120-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-122-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-124-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-126-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-128-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-130-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-92-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-134-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-136-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-138-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-140-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-142-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-144-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-146-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-148-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-150-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-343-0x0000000004D00000-0x0000000004D40000-memory.dmp

          Filesize

          256KB

        • memory/1504-345-0x0000000004D00000-0x0000000004D40000-memory.dmp

          Filesize

          256KB

        • memory/1504-995-0x0000000004D00000-0x0000000004D40000-memory.dmp

          Filesize

          256KB

        • memory/1504-88-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-87-0x00000000023A0000-0x00000000023DE000-memory.dmp

          Filesize

          248KB

        • memory/1504-86-0x00000000023A0000-0x00000000023E4000-memory.dmp

          Filesize

          272KB

        • memory/1504-85-0x0000000004D00000-0x0000000004D40000-memory.dmp

          Filesize

          256KB

        • memory/1504-84-0x0000000000270000-0x00000000002BB000-memory.dmp

          Filesize

          300KB

        • memory/1504-83-0x0000000002050000-0x0000000002096000-memory.dmp

          Filesize

          280KB

        • memory/1904-72-0x0000000000080000-0x000000000008A000-memory.dmp

          Filesize

          40KB