Analysis

  • max time kernel
    42s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-03-2023 04:47

General

  • Target

    0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe

  • Size

    654KB

  • MD5

    a7fc0799d32fba70ad5fd50778666e70

  • SHA1

    6b342562e4b060cdc45fc2445b2ad4077f12d082

  • SHA256

    0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0

  • SHA512

    d78022ac0ffb3accea8f372d96cfd3e3c9912b59dedc7594b3ce269b4874446add9375230d6d763c37758b4e8339639cce200f67079c4cb7bfc7a03edf7e1b46

  • SSDEEP

    12288:8MrLy90vtknEZYQVYQLzv2arMPxCq3yG37mQk3r+aIS2k:3yaBZlVYgvxrMPvj318+lS2k

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • memory/1184-1044-0x0000000000300000-0x0000000000332000-memory.dmp
    Filesize

    200KB

  • memory/1184-1045-0x0000000000B50000-0x0000000000B90000-memory.dmp
    Filesize

    256KB

  • memory/1612-146-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-156-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-1035-0x0000000004C60000-0x0000000004CA0000-memory.dmp
    Filesize

    256KB

  • memory/1612-496-0x0000000004C60000-0x0000000004CA0000-memory.dmp
    Filesize

    256KB

  • memory/1612-494-0x0000000004C60000-0x0000000004CA0000-memory.dmp
    Filesize

    256KB

  • memory/1612-492-0x0000000004C60000-0x0000000004CA0000-memory.dmp
    Filesize

    256KB

  • memory/1612-490-0x0000000000250000-0x000000000029B000-memory.dmp
    Filesize

    300KB

  • memory/1612-158-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-154-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-152-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-150-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-148-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-144-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-142-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-140-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-138-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-123-0x0000000000870000-0x00000000008B6000-memory.dmp
    Filesize

    280KB

  • memory/1612-124-0x0000000000C10000-0x0000000000C54000-memory.dmp
    Filesize

    272KB

  • memory/1612-125-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-126-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-128-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-130-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-132-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-134-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1612-136-0x0000000000C10000-0x0000000000C4E000-memory.dmp
    Filesize

    248KB

  • memory/1880-108-0x0000000000270000-0x000000000029D000-memory.dmp
    Filesize

    180KB

  • memory/1880-93-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-110-0x0000000004BD0000-0x0000000004C10000-memory.dmp
    Filesize

    256KB

  • memory/1880-95-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-87-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-97-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-99-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-112-0x0000000000400000-0x0000000000590000-memory.dmp
    Filesize

    1.6MB

  • memory/1880-109-0x0000000004BD0000-0x0000000004C10000-memory.dmp
    Filesize

    256KB

  • memory/1880-101-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-78-0x0000000000690000-0x00000000006AA000-memory.dmp
    Filesize

    104KB

  • memory/1880-91-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-111-0x0000000000400000-0x0000000000590000-memory.dmp
    Filesize

    1.6MB

  • memory/1880-107-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-105-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-103-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-85-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-83-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-81-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-80-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB

  • memory/1880-79-0x0000000000970000-0x0000000000988000-memory.dmp
    Filesize

    96KB

  • memory/1880-89-0x0000000000970000-0x0000000000982000-memory.dmp
    Filesize

    72KB