Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 03:53

General

  • Target

    0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe

  • Size

    654KB

  • MD5

    a7fc0799d32fba70ad5fd50778666e70

  • SHA1

    6b342562e4b060cdc45fc2445b2ad4077f12d082

  • SHA256

    0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0

  • SHA512

    d78022ac0ffb3accea8f372d96cfd3e3c9912b59dedc7594b3ce269b4874446add9375230d6d763c37758b4e8339639cce200f67079c4cb7bfc7a03edf7e1b46

  • SSDEEP

    12288:8MrLy90vtknEZYQVYQLzv2arMPxCq3yG37mQk3r+aIS2k:3yaBZlVYgvxrMPvj318+lS2k

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe

    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe

    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe

    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe

    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe

    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe

    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe

    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe

    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe

    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe

    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe

    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe

    Filesize

    175KB

    MD5

    a4e95ed385c90a7c64c64969288e953a

    SHA1

    369284ca4c20d42eb975f16d2cce2f41eb0838bc

    SHA256

    5cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532

    SHA512

    3748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe

    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe

    Filesize

    510KB

    MD5

    a5e528d280a33c17fb7c7326e79463b1

    SHA1

    9219b69ba6675f1c25e126e7ca26c96488c3db64

    SHA256

    9b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e

    SHA512

    c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe

    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe

    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe

    Filesize

    306KB

    MD5

    dd96910ebcd391990c3c0e402f9ec86c

    SHA1

    cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd

    SHA256

    4affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541

    SHA512

    f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe

    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe

    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe

    Filesize

    292KB

    MD5

    bde0fb595e9feb2667d8a8a78e326546

    SHA1

    eead81585ede57400b7ec1bb906e9040e3f83833

    SHA256

    72d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d

    SHA512

    1f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359

  • memory/860-102-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-112-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/860-98-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-96-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-94-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-90-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-88-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-86-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-110-0x0000000004CD0000-0x0000000004D10000-memory.dmp

    Filesize

    256KB

  • memory/860-109-0x0000000004CD0000-0x0000000004D10000-memory.dmp

    Filesize

    256KB

  • memory/860-111-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/860-81-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-104-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-106-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-108-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-92-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-84-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-82-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-100-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

    Filesize

    72KB

  • memory/860-80-0x0000000000BC0000-0x0000000000BD8000-memory.dmp

    Filesize

    96KB

  • memory/860-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/860-79-0x00000000003C0000-0x00000000003DA000-memory.dmp

    Filesize

    104KB

  • memory/1164-1043-0x00000000011E0000-0x0000000001212000-memory.dmp

    Filesize

    200KB

  • memory/1164-1044-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/1804-130-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-154-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-136-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-138-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-140-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-142-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-144-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-146-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-148-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-150-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-152-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-134-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-156-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-158-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-412-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1804-410-0x0000000000320000-0x000000000036B000-memory.dmp

    Filesize

    300KB

  • memory/1804-414-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1804-1034-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1804-132-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-128-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-126-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-125-0x0000000000B90000-0x0000000000BCE000-memory.dmp

    Filesize

    248KB

  • memory/1804-124-0x0000000000B90000-0x0000000000BD4000-memory.dmp

    Filesize

    272KB

  • memory/1804-123-0x0000000000B50000-0x0000000000B96000-memory.dmp

    Filesize

    280KB