Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-03-2023 06:16

General

  • Target

    1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe

  • Size

    557KB

  • MD5

    356ca93a57b4e0a44a8348c3b36834e0

  • SHA1

    3ddd6de6cdd071c123bf6c511742f8f62d392802

  • SHA256

    1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654

  • SHA512

    e9056d81aabbb91b59dfdf546ffa891bb7de77b6f9a97a083fa74bdb574972c6b3d8cd7362e339706eac1a44d9b1fd549c00fb315284fb165164b7ef95b612ba

  • SSDEEP

    12288:aMr7y90LCoFM3aHCxtGUiNo+xxwsmzBqfcFtGJG2OUN4GhIJeY:9ysKB7iNpvxmzBgYGJGhUNjQx

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe
    "C:\Users\Admin\AppData\Local\Temp\1f107f5f28ef6900b0cd9f8227cc24aa59f80135634268bea8ca0e6009a42654.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFY9872rl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFY9872rl.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24FL01hL92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24FL01hL92.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49An47GD68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49An47GD68.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhhy56Li42MB.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhhy56Li42MB.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhhy56Li42MB.exe

    Filesize

    175KB

    MD5

    ae0d5bfdbbf52c1c58d105e9114a1a14

    SHA1

    0e44a3f8ff22668b80e60dbd8608249f77527598

    SHA256

    881d41b35a57b053d02187aa5633f2f8f1ccd0b13eaea112dc98d9b0708d6f1c

    SHA512

    9c5707a73f10fadae75ea3bb358b42f3dc7a3d143ba173a0f34a579472272bbc41a5a6d17664053b5c1c9ecfee21c30c41eb498a35c199ddac5081ea167662e9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhhy56Li42MB.exe

    Filesize

    175KB

    MD5

    ae0d5bfdbbf52c1c58d105e9114a1a14

    SHA1

    0e44a3f8ff22668b80e60dbd8608249f77527598

    SHA256

    881d41b35a57b053d02187aa5633f2f8f1ccd0b13eaea112dc98d9b0708d6f1c

    SHA512

    9c5707a73f10fadae75ea3bb358b42f3dc7a3d143ba173a0f34a579472272bbc41a5a6d17664053b5c1c9ecfee21c30c41eb498a35c199ddac5081ea167662e9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFY9872rl.exe

    Filesize

    412KB

    MD5

    8e244ed2cf2c4715fbc8039c76a45926

    SHA1

    9e7457cc721c61c5f840bb97438cb828d0205e8c

    SHA256

    6ebe5c0ef4ca42525197ab1408091d1c68db21c16a1bb7e461844899f218fb58

    SHA512

    45c469fe3e94f2eea5e45cbe6b6657917087545f93782a2ea0b8bec48774a889d73ae3631ba0323f644a1152d256daa19d48e1bafadc17c803586d5f1bd020d7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFY9872rl.exe

    Filesize

    412KB

    MD5

    8e244ed2cf2c4715fbc8039c76a45926

    SHA1

    9e7457cc721c61c5f840bb97438cb828d0205e8c

    SHA256

    6ebe5c0ef4ca42525197ab1408091d1c68db21c16a1bb7e461844899f218fb58

    SHA512

    45c469fe3e94f2eea5e45cbe6b6657917087545f93782a2ea0b8bec48774a889d73ae3631ba0323f644a1152d256daa19d48e1bafadc17c803586d5f1bd020d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24FL01hL92.exe

    Filesize

    11KB

    MD5

    6ed7fab0bb82c42f011565c93210834b

    SHA1

    bcfbd13d94ba5a1036e071b63791a404390bc283

    SHA256

    000a591a433ed55245f10f819b04ea6f956437421211204d9402e484249dd4c9

    SHA512

    4771b02ccb1df4abffbcb86c6fdd3af57d70e3895757fafe63090b37dbb944a1351283dcb7f1cee910bcb5f06b41fa342c3fa31783f17973fc5880915192df51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf24FL01hL92.exe

    Filesize

    11KB

    MD5

    6ed7fab0bb82c42f011565c93210834b

    SHA1

    bcfbd13d94ba5a1036e071b63791a404390bc283

    SHA256

    000a591a433ed55245f10f819b04ea6f956437421211204d9402e484249dd4c9

    SHA512

    4771b02ccb1df4abffbcb86c6fdd3af57d70e3895757fafe63090b37dbb944a1351283dcb7f1cee910bcb5f06b41fa342c3fa31783f17973fc5880915192df51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49An47GD68.exe

    Filesize

    409KB

    MD5

    d918db9077504212d04e97bc5857b710

    SHA1

    cbac3bfca65f8dfe4efd408bcf480f3d603f1d06

    SHA256

    ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3

    SHA512

    f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49An47GD68.exe

    Filesize

    409KB

    MD5

    d918db9077504212d04e97bc5857b710

    SHA1

    cbac3bfca65f8dfe4efd408bcf480f3d603f1d06

    SHA256

    ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3

    SHA512

    f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187

  • memory/2572-135-0x0000000000E50000-0x0000000000E5A000-memory.dmp

    Filesize

    40KB

  • memory/2608-1074-0x0000000000B10000-0x0000000000B42000-memory.dmp

    Filesize

    200KB

  • memory/2608-1075-0x0000000005550000-0x000000000559B000-memory.dmp

    Filesize

    300KB

  • memory/2608-1076-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/2636-175-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-189-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-144-0x0000000002D00000-0x0000000002D4B000-memory.dmp

    Filesize

    300KB

  • memory/2636-145-0x0000000007440000-0x0000000007450000-memory.dmp

    Filesize

    64KB

  • memory/2636-146-0x0000000007440000-0x0000000007450000-memory.dmp

    Filesize

    64KB

  • memory/2636-147-0x0000000007440000-0x0000000007450000-memory.dmp

    Filesize

    64KB

  • memory/2636-148-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-149-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-151-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-153-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-155-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-157-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-159-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-161-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-163-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-165-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-167-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-169-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-171-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-173-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-142-0x0000000007450000-0x000000000794E000-memory.dmp

    Filesize

    5.0MB

  • memory/2636-177-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-179-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-181-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-183-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-185-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-187-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-143-0x00000000049D0000-0x0000000004A14000-memory.dmp

    Filesize

    272KB

  • memory/2636-191-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-193-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-195-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-197-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-199-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-201-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-203-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-205-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-207-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-209-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-211-0x00000000049D0000-0x0000000004A0E000-memory.dmp

    Filesize

    248KB

  • memory/2636-1054-0x0000000007950000-0x0000000007F56000-memory.dmp

    Filesize

    6.0MB

  • memory/2636-1055-0x0000000007310000-0x000000000741A000-memory.dmp

    Filesize

    1.0MB

  • memory/2636-1056-0x0000000004E40000-0x0000000004E52000-memory.dmp

    Filesize

    72KB

  • memory/2636-1057-0x0000000004E60000-0x0000000004E9E000-memory.dmp

    Filesize

    248KB

  • memory/2636-1058-0x0000000008060000-0x00000000080AB000-memory.dmp

    Filesize

    300KB

  • memory/2636-1059-0x0000000007440000-0x0000000007450000-memory.dmp

    Filesize

    64KB

  • memory/2636-1061-0x00000000081C0000-0x0000000008252000-memory.dmp

    Filesize

    584KB

  • memory/2636-1062-0x0000000008260000-0x00000000082C6000-memory.dmp

    Filesize

    408KB

  • memory/2636-1063-0x0000000007440000-0x0000000007450000-memory.dmp

    Filesize

    64KB

  • memory/2636-1064-0x0000000007440000-0x0000000007450000-memory.dmp

    Filesize

    64KB

  • memory/2636-141-0x0000000004940000-0x0000000004986000-memory.dmp

    Filesize

    280KB

  • memory/2636-1065-0x0000000008AA0000-0x0000000008C62000-memory.dmp

    Filesize

    1.8MB

  • memory/2636-1066-0x0000000008C80000-0x00000000091AC000-memory.dmp

    Filesize

    5.2MB

  • memory/2636-1067-0x00000000092E0000-0x0000000009356000-memory.dmp

    Filesize

    472KB

  • memory/2636-1068-0x0000000009360000-0x00000000093B0000-memory.dmp

    Filesize

    320KB