Analysis

  • max time kernel
    54s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-03-2023 09:31

General

  • Target

    299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe

  • Size

    560KB

  • MD5

    13729256530eb38553d0a8bef168b6d4

  • SHA1

    3f28ac30c1ffe13c7d5e0a2860adfcc96d6e2457

  • SHA256

    299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029

  • SHA512

    838388a152a6c074b09ebe57fac3938a6a4ae2ba7c174e72fcd8286096d6323d2e5d54206dd81cd6d71bfe2886cfed6a923e9e0cdc801af20a196fdab0d62f47

  • SSDEEP

    12288:RMrzy90K+lmcp2e8fuj0F5VGKT/76SUBqv19n6K:WyCmcb2Y0F5d6ho19T

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe
    "C:\Users\Admin\AppData\Local\Temp\299b582522935e8ffc09f9e8106f487f8c97b69739035494460b516992400029.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgR4902PQ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgR4902PQ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77Me36Ha14.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77Me36Ha14.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf22Bc53JW42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf22Bc53JW42.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhON68Sc35XD.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhON68Sc35XD.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhON68Sc35XD.exe

    Filesize

    175KB

    MD5

    8316151a7cea8134a6b4692de0b049d9

    SHA1

    8b5a119dd6003bdfd48be9648213cf1c441f8a2a

    SHA256

    32ddf60dd4f3851ecfd8547b1642a8fe9a160a82ee4b9fc9c014174670627f49

    SHA512

    bc827d4e378851406532a2df0b58779516d0e23de00371d9384b23ef1965d373880e85dd181fd8c033f35d305dc77eb852d3cdfeb8b4542d07f2c75fa0c6b15e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhON68Sc35XD.exe

    Filesize

    175KB

    MD5

    8316151a7cea8134a6b4692de0b049d9

    SHA1

    8b5a119dd6003bdfd48be9648213cf1c441f8a2a

    SHA256

    32ddf60dd4f3851ecfd8547b1642a8fe9a160a82ee4b9fc9c014174670627f49

    SHA512

    bc827d4e378851406532a2df0b58779516d0e23de00371d9384b23ef1965d373880e85dd181fd8c033f35d305dc77eb852d3cdfeb8b4542d07f2c75fa0c6b15e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgR4902PQ.exe

    Filesize

    416KB

    MD5

    0de43d24e1e458c89c680c4e2d66613d

    SHA1

    e879b29089117a39a0beb15fc2b9c274dece8660

    SHA256

    76ecf5f11203460a9686c92ad40e1c00ecc43f12e956c1ad4fb889428e747381

    SHA512

    b9af448958a0accb03e07c9cd195dfe81056df784456a2cef69c8d9d8235546107eb8d271d7433397313ee1b50f5894d45464ce729a9053bbe49aa2e1d97133b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgR4902PQ.exe

    Filesize

    416KB

    MD5

    0de43d24e1e458c89c680c4e2d66613d

    SHA1

    e879b29089117a39a0beb15fc2b9c274dece8660

    SHA256

    76ecf5f11203460a9686c92ad40e1c00ecc43f12e956c1ad4fb889428e747381

    SHA512

    b9af448958a0accb03e07c9cd195dfe81056df784456a2cef69c8d9d8235546107eb8d271d7433397313ee1b50f5894d45464ce729a9053bbe49aa2e1d97133b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77Me36Ha14.exe

    Filesize

    11KB

    MD5

    62b8448602912c5a4caa3818007e4ab8

    SHA1

    0de47962c460ec3dd1e45520ed05f266a8f5f0c9

    SHA256

    8ebabbe67449efc5d326756db691ba352153e008af6817b8b3c40655b4cd3436

    SHA512

    a42af56818b631ee8fb9d6b408ecfcde0990f7132de9749635b42886c930141b664732d73898655f4454d430da2d3f59789bd71fc70165acf05b1b6eb3b8765a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77Me36Ha14.exe

    Filesize

    11KB

    MD5

    62b8448602912c5a4caa3818007e4ab8

    SHA1

    0de47962c460ec3dd1e45520ed05f266a8f5f0c9

    SHA256

    8ebabbe67449efc5d326756db691ba352153e008af6817b8b3c40655b4cd3436

    SHA512

    a42af56818b631ee8fb9d6b408ecfcde0990f7132de9749635b42886c930141b664732d73898655f4454d430da2d3f59789bd71fc70165acf05b1b6eb3b8765a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf22Bc53JW42.exe

    Filesize

    416KB

    MD5

    9ce8c74a533c9909e622ad2c5700ca63

    SHA1

    bcce3e38eaf3c3b741bad36507671231d94ef844

    SHA256

    a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

    SHA512

    98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf22Bc53JW42.exe

    Filesize

    416KB

    MD5

    9ce8c74a533c9909e622ad2c5700ca63

    SHA1

    bcce3e38eaf3c3b741bad36507671231d94ef844

    SHA256

    a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d

    SHA512

    98491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73

  • memory/4188-1071-0x0000000000500000-0x0000000000532000-memory.dmp

    Filesize

    200KB

  • memory/4188-1073-0x00000000050A0000-0x00000000050B0000-memory.dmp

    Filesize

    64KB

  • memory/4188-1074-0x00000000050A0000-0x00000000050B0000-memory.dmp

    Filesize

    64KB

  • memory/4188-1072-0x0000000004F40000-0x0000000004F8B000-memory.dmp

    Filesize

    300KB

  • memory/4596-130-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/5024-174-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-186-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-140-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-138-0x0000000002DD0000-0x0000000002E1B000-memory.dmp

    Filesize

    300KB

  • memory/5024-142-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-143-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-144-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-146-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-148-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-150-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-152-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-154-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-156-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-158-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-160-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-162-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-164-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-166-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-168-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-170-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-172-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-139-0x0000000007180000-0x00000000071C4000-memory.dmp

    Filesize

    272KB

  • memory/5024-176-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-178-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-180-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-182-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-184-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-141-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-188-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-190-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-192-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-194-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-196-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-198-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-200-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-204-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-206-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-202-0x0000000007180000-0x00000000071BE000-memory.dmp

    Filesize

    248KB

  • memory/5024-1049-0x0000000007E40000-0x0000000008446000-memory.dmp

    Filesize

    6.0MB

  • memory/5024-1050-0x00000000078B0000-0x00000000079BA000-memory.dmp

    Filesize

    1.0MB

  • memory/5024-1051-0x00000000079F0000-0x0000000007A02000-memory.dmp

    Filesize

    72KB

  • memory/5024-1052-0x0000000007A10000-0x0000000007A4E000-memory.dmp

    Filesize

    248KB

  • memory/5024-1053-0x0000000007B60000-0x0000000007BAB000-memory.dmp

    Filesize

    300KB

  • memory/5024-1054-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-1056-0x0000000007CF0000-0x0000000007D82000-memory.dmp

    Filesize

    584KB

  • memory/5024-1057-0x0000000007D90000-0x0000000007DF6000-memory.dmp

    Filesize

    408KB

  • memory/5024-1058-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-1059-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-1060-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-1061-0x0000000008B90000-0x0000000008C06000-memory.dmp

    Filesize

    472KB

  • memory/5024-137-0x0000000007320000-0x000000000781E000-memory.dmp

    Filesize

    5.0MB

  • memory/5024-136-0x0000000004780000-0x00000000047C6000-memory.dmp

    Filesize

    280KB

  • memory/5024-1062-0x0000000008C10000-0x0000000008C60000-memory.dmp

    Filesize

    320KB

  • memory/5024-1063-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/5024-1064-0x0000000008DE0000-0x0000000008FA2000-memory.dmp

    Filesize

    1.8MB

  • memory/5024-1065-0x0000000008FB0000-0x00000000094DC000-memory.dmp

    Filesize

    5.2MB