Analysis

  • max time kernel
    38s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2023, 09:16

General

  • Target

    291421df6f7af2898e2ddeed7f67168d.exe

  • Size

    560KB

  • MD5

    291421df6f7af2898e2ddeed7f67168d

  • SHA1

    96d55b36bd7bd9501cf515039dae0d94bc843b73

  • SHA256

    086fd8fce9dbe726874324817d9c43368ff6762451b59c7df59f48438242d226

  • SHA512

    7c7b40be2348defe6abf89bbbb6c39c823f2f4791471f26d313d7e655773475a7d0c34a95beddaf1921af4c011dc18d4324b3a501d1ad84d484a0ec19b6a0d7c

  • SSDEEP

    12288:lMrjy90TSDQKCL6Xo0UTWTwW3EdFTVGKT/+ujT8HN05VE5YKr:uyOIQKCHxTEwW3MFTAuv8XX

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\291421df6f7af2898e2ddeed7f67168d.exe
    "C:\Users\Admin\AppData\Local\Temp\291421df6f7af2898e2ddeed7f67168d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSo1836RG.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSo1836RG.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43iD52aO12.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43iD52aO12.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhHC80LW80SJ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhHC80LW80SJ.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhHC80LW80SJ.exe

          Filesize

          175KB

          MD5

          074f4204e6267a64ef26c723326d5ceb

          SHA1

          116e697dc862d8299264659bb57960513ad4fdc2

          SHA256

          6b765d5dd106f8dc11f38644991f1c22e2d6c3299817a5138bb3009accdd8c01

          SHA512

          f17e9cec446cd3ec2fd1d269f32b915d0ba5a330339214213424aa04c3fb8c3ecb5f70fc3ba60725da55956cc801bca0dfaf0b03a6ea5e6bb4ae2c08121e34e9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhHC80LW80SJ.exe

          Filesize

          175KB

          MD5

          074f4204e6267a64ef26c723326d5ceb

          SHA1

          116e697dc862d8299264659bb57960513ad4fdc2

          SHA256

          6b765d5dd106f8dc11f38644991f1c22e2d6c3299817a5138bb3009accdd8c01

          SHA512

          f17e9cec446cd3ec2fd1d269f32b915d0ba5a330339214213424aa04c3fb8c3ecb5f70fc3ba60725da55956cc801bca0dfaf0b03a6ea5e6bb4ae2c08121e34e9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSo1836RG.exe

          Filesize

          415KB

          MD5

          f55b1789dca5686179ffe9d8137b4e9e

          SHA1

          c210dd8a69a442c9fdc77c629a9a1556c969a0f8

          SHA256

          cd9c2b4e15e513cef5bfe400369433d1d74a5bcf9681ed14b44117779320a87b

          SHA512

          d179392008142a16599d5405d774d7e875f575cf5ab88347442dc83829c35015cf7aa56433121970db7d09f4a06a0d8b9ea0c422eee86cff289d19e6a5a87ddf

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSo1836RG.exe

          Filesize

          415KB

          MD5

          f55b1789dca5686179ffe9d8137b4e9e

          SHA1

          c210dd8a69a442c9fdc77c629a9a1556c969a0f8

          SHA256

          cd9c2b4e15e513cef5bfe400369433d1d74a5bcf9681ed14b44117779320a87b

          SHA512

          d179392008142a16599d5405d774d7e875f575cf5ab88347442dc83829c35015cf7aa56433121970db7d09f4a06a0d8b9ea0c422eee86cff289d19e6a5a87ddf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43iD52aO12.exe

          Filesize

          11KB

          MD5

          7f6b0d19eb465e3d5c9b7d7cc7ecfcdb

          SHA1

          9926bd748b6b11db1ad78962cf284267d5559b73

          SHA256

          36fe72b3737a3096cd932712efcf73ba1051202bb15e63cfd75d93a65524e606

          SHA512

          3b7c2cfd0a1093d70edd8d833720db82f8b0032a94b3a4be8ee0ad7559ca8f1308f8d5b2bfbcd47f92d10d2e12405143a085c2cc8ee44a7f9d1250c9dfe5c084

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43iD52aO12.exe

          Filesize

          11KB

          MD5

          7f6b0d19eb465e3d5c9b7d7cc7ecfcdb

          SHA1

          9926bd748b6b11db1ad78962cf284267d5559b73

          SHA256

          36fe72b3737a3096cd932712efcf73ba1051202bb15e63cfd75d93a65524e606

          SHA512

          3b7c2cfd0a1093d70edd8d833720db82f8b0032a94b3a4be8ee0ad7559ca8f1308f8d5b2bfbcd47f92d10d2e12405143a085c2cc8ee44a7f9d1250c9dfe5c084

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe

          Filesize

          416KB

          MD5

          9ce8c74a533c9909e622ad2c5700ca63

          SHA1

          bcce3e38eaf3c3b741bad36507671231d94ef844

          SHA256

          a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

          SHA512

          98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe

          Filesize

          416KB

          MD5

          9ce8c74a533c9909e622ad2c5700ca63

          SHA1

          bcce3e38eaf3c3b741bad36507671231d94ef844

          SHA256

          a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

          SHA512

          98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe

          Filesize

          416KB

          MD5

          9ce8c74a533c9909e622ad2c5700ca63

          SHA1

          bcce3e38eaf3c3b741bad36507671231d94ef844

          SHA256

          a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

          SHA512

          98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uhHC80LW80SJ.exe

          Filesize

          175KB

          MD5

          074f4204e6267a64ef26c723326d5ceb

          SHA1

          116e697dc862d8299264659bb57960513ad4fdc2

          SHA256

          6b765d5dd106f8dc11f38644991f1c22e2d6c3299817a5138bb3009accdd8c01

          SHA512

          f17e9cec446cd3ec2fd1d269f32b915d0ba5a330339214213424aa04c3fb8c3ecb5f70fc3ba60725da55956cc801bca0dfaf0b03a6ea5e6bb4ae2c08121e34e9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uhHC80LW80SJ.exe

          Filesize

          175KB

          MD5

          074f4204e6267a64ef26c723326d5ceb

          SHA1

          116e697dc862d8299264659bb57960513ad4fdc2

          SHA256

          6b765d5dd106f8dc11f38644991f1c22e2d6c3299817a5138bb3009accdd8c01

          SHA512

          f17e9cec446cd3ec2fd1d269f32b915d0ba5a330339214213424aa04c3fb8c3ecb5f70fc3ba60725da55956cc801bca0dfaf0b03a6ea5e6bb4ae2c08121e34e9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSo1836RG.exe

          Filesize

          415KB

          MD5

          f55b1789dca5686179ffe9d8137b4e9e

          SHA1

          c210dd8a69a442c9fdc77c629a9a1556c969a0f8

          SHA256

          cd9c2b4e15e513cef5bfe400369433d1d74a5bcf9681ed14b44117779320a87b

          SHA512

          d179392008142a16599d5405d774d7e875f575cf5ab88347442dc83829c35015cf7aa56433121970db7d09f4a06a0d8b9ea0c422eee86cff289d19e6a5a87ddf

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSo1836RG.exe

          Filesize

          415KB

          MD5

          f55b1789dca5686179ffe9d8137b4e9e

          SHA1

          c210dd8a69a442c9fdc77c629a9a1556c969a0f8

          SHA256

          cd9c2b4e15e513cef5bfe400369433d1d74a5bcf9681ed14b44117779320a87b

          SHA512

          d179392008142a16599d5405d774d7e875f575cf5ab88347442dc83829c35015cf7aa56433121970db7d09f4a06a0d8b9ea0c422eee86cff289d19e6a5a87ddf

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43iD52aO12.exe

          Filesize

          11KB

          MD5

          7f6b0d19eb465e3d5c9b7d7cc7ecfcdb

          SHA1

          9926bd748b6b11db1ad78962cf284267d5559b73

          SHA256

          36fe72b3737a3096cd932712efcf73ba1051202bb15e63cfd75d93a65524e606

          SHA512

          3b7c2cfd0a1093d70edd8d833720db82f8b0032a94b3a4be8ee0ad7559ca8f1308f8d5b2bfbcd47f92d10d2e12405143a085c2cc8ee44a7f9d1250c9dfe5c084

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe

          Filesize

          416KB

          MD5

          9ce8c74a533c9909e622ad2c5700ca63

          SHA1

          bcce3e38eaf3c3b741bad36507671231d94ef844

          SHA256

          a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

          SHA512

          98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe

          Filesize

          416KB

          MD5

          9ce8c74a533c9909e622ad2c5700ca63

          SHA1

          bcce3e38eaf3c3b741bad36507671231d94ef844

          SHA256

          a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

          SHA512

          98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf63Fr94ad10.exe

          Filesize

          416KB

          MD5

          9ce8c74a533c9909e622ad2c5700ca63

          SHA1

          bcce3e38eaf3c3b741bad36507671231d94ef844

          SHA256

          a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

          SHA512

          98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

        • memory/636-72-0x0000000000340000-0x000000000034A000-memory.dmp

          Filesize

          40KB

        • memory/1116-107-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-129-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-91-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-93-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-95-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-97-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-99-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-101-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-103-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-105-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-86-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-109-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-111-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-113-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-115-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-117-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-119-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-123-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-121-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-125-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-127-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-89-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-131-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-133-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-135-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-137-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-139-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-141-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-143-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-145-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-147-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-149-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-222-0x0000000007010000-0x0000000007050000-memory.dmp

          Filesize

          256KB

        • memory/1116-224-0x0000000007010000-0x0000000007050000-memory.dmp

          Filesize

          256KB

        • memory/1116-994-0x0000000007010000-0x0000000007050000-memory.dmp

          Filesize

          256KB

        • memory/1116-87-0x0000000007190000-0x00000000071CE000-memory.dmp

          Filesize

          248KB

        • memory/1116-85-0x0000000007190000-0x00000000071D4000-memory.dmp

          Filesize

          272KB

        • memory/1116-84-0x0000000007150000-0x0000000007196000-memory.dmp

          Filesize

          280KB

        • memory/1116-83-0x00000000002C0000-0x000000000030B000-memory.dmp

          Filesize

          300KB

        • memory/1268-1003-0x0000000001160000-0x0000000001192000-memory.dmp

          Filesize

          200KB

        • memory/1268-1004-0x0000000004670000-0x00000000046B0000-memory.dmp

          Filesize

          256KB