Analysis

  • max time kernel
    53s
  • max time network
    179s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-03-2023 04:47

General

  • Target

    0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe

  • Size

    654KB

  • MD5

    a7fc0799d32fba70ad5fd50778666e70

  • SHA1

    6b342562e4b060cdc45fc2445b2ad4077f12d082

  • SHA256

    0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0

  • SHA512

    d78022ac0ffb3accea8f372d96cfd3e3c9912b59dedc7594b3ce269b4874446add9375230d6d763c37758b4e8339639cce200f67079c4cb7bfc7a03edf7e1b46

  • SSDEEP

    12288:8MrLy90vtknEZYQVYQLzv2arMPxCq3yG37mQk3r+aIS2k:3yaBZlVYgvxrMPvj318+lS2k

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • memory/3004-136-0x0000000000850000-0x000000000086A000-memory.dmp
    Filesize

    104KB

  • memory/3004-137-0x0000000004BE0000-0x00000000050DE000-memory.dmp
    Filesize

    5.0MB

  • memory/3004-138-0x00000000022A0000-0x00000000022B8000-memory.dmp
    Filesize

    96KB

  • memory/3004-139-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3004-140-0x0000000000820000-0x0000000000830000-memory.dmp
    Filesize

    64KB

  • memory/3004-142-0x0000000000820000-0x0000000000830000-memory.dmp
    Filesize

    64KB

  • memory/3004-141-0x0000000000820000-0x0000000000830000-memory.dmp
    Filesize

    64KB

  • memory/3004-143-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-144-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-146-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-148-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-150-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-152-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-154-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-156-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-158-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-160-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-162-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-164-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-166-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-168-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-170-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/3004-171-0x0000000000400000-0x0000000000590000-memory.dmp
    Filesize

    1.6MB

  • memory/3004-172-0x0000000000820000-0x0000000000830000-memory.dmp
    Filesize

    64KB

  • memory/3004-173-0x0000000000820000-0x0000000000830000-memory.dmp
    Filesize

    64KB

  • memory/3004-174-0x0000000000820000-0x0000000000830000-memory.dmp
    Filesize

    64KB

  • memory/3004-176-0x0000000000400000-0x0000000000590000-memory.dmp
    Filesize

    1.6MB

  • memory/3628-1115-0x0000000000800000-0x0000000000832000-memory.dmp
    Filesize

    200KB

  • memory/3628-1117-0x0000000005380000-0x0000000005390000-memory.dmp
    Filesize

    64KB

  • memory/3628-1116-0x0000000005240000-0x000000000528B000-memory.dmp
    Filesize

    300KB

  • memory/4776-183-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-216-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-184-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-188-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-190-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-192-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-195-0x0000000000470000-0x00000000004BB000-memory.dmp
    Filesize

    300KB

  • memory/4776-194-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-197-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-198-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-202-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-199-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-201-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-206-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-204-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-208-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-210-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-212-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-214-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-186-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-218-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-220-0x0000000004A90000-0x0000000004ACE000-memory.dmp
    Filesize

    248KB

  • memory/4776-1093-0x0000000005100000-0x0000000005706000-memory.dmp
    Filesize

    6.0MB

  • memory/4776-1094-0x0000000005710000-0x000000000581A000-memory.dmp
    Filesize

    1.0MB

  • memory/4776-1095-0x0000000004B20000-0x0000000004B32000-memory.dmp
    Filesize

    72KB

  • memory/4776-1096-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-1097-0x0000000004B40000-0x0000000004B7E000-memory.dmp
    Filesize

    248KB

  • memory/4776-1098-0x0000000004B90000-0x0000000004BDB000-memory.dmp
    Filesize

    300KB

  • memory/4776-1100-0x0000000005A50000-0x0000000005AB6000-memory.dmp
    Filesize

    408KB

  • memory/4776-1101-0x0000000006110000-0x00000000061A2000-memory.dmp
    Filesize

    584KB

  • memory/4776-1103-0x00000000061F0000-0x00000000063B2000-memory.dmp
    Filesize

    1.8MB

  • memory/4776-1104-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-1102-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/4776-1106-0x00000000063E0000-0x000000000690C000-memory.dmp
    Filesize

    5.2MB

  • memory/4776-182-0x0000000004A90000-0x0000000004AD4000-memory.dmp
    Filesize

    272KB

  • memory/4776-181-0x0000000002090000-0x00000000020D6000-memory.dmp
    Filesize

    280KB

  • memory/4776-1107-0x0000000007D00000-0x0000000007D76000-memory.dmp
    Filesize

    472KB

  • memory/4776-1108-0x0000000007D80000-0x0000000007DD0000-memory.dmp
    Filesize

    320KB

  • memory/4776-1109-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB