Analysis

  • max time kernel
    52s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/03/2023, 04:03

General

  • Target

    329ac0f9165976d48326e86945eb8a305032e3b2be35ad56a89aa8f7cfea62ca.exe

  • Size

    550KB

  • MD5

    972b856d1d7c0d1995a0eb3b2fbacbf0

  • SHA1

    a5aebc5f4d9746082e4dae338b0d17d719c70d53

  • SHA256

    329ac0f9165976d48326e86945eb8a305032e3b2be35ad56a89aa8f7cfea62ca

  • SHA512

    6d6a99e3e726a1964ff03c2d7853a1b27bf9465fdb669708edf8678d1f84807818296de0c34f98f5165056206c2b588761c37e7ee72bf2aa6a0a6c6090dc2104

  • SSDEEP

    12288:1Mr6y90yahimz7AuxqVlVWvo6dfmG85DXHhzjGa:byPsVAuxYj+6DlB

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\329ac0f9165976d48326e86945eb8a305032e3b2be35ad56a89aa8f7cfea62ca.exe
    "C:\Users\Admin\AppData\Local\Temp\329ac0f9165976d48326e86945eb8a305032e3b2be35ad56a89aa8f7cfea62ca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r2779fw.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r2779fw.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w41Dm65.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w41Dm65.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5008

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r2779fw.exe

          Filesize

          322KB

          MD5

          8141937b23cd1895e561d8e90fdeeff3

          SHA1

          6f810e9e480564f5837461f8ccdd07c951a1bece

          SHA256

          ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

          SHA512

          40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r2779fw.exe

          Filesize

          322KB

          MD5

          8141937b23cd1895e561d8e90fdeeff3

          SHA1

          6f810e9e480564f5837461f8ccdd07c951a1bece

          SHA256

          ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

          SHA512

          40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w41Dm65.exe

          Filesize

          380KB

          MD5

          7703b533b6e72a90817e85a9fd1f7126

          SHA1

          f4cc506f60b36ddf6474504989a9b171b1418570

          SHA256

          f6660c406e330206727065c74443d77ab4689c53984e6c2158f130c03cd2e86d

          SHA512

          3ee516734c6246d7b492af2a6ba3cae18d59d83cc281d75544b29918073a472b37d52ad6cf5c78bb36e81cc67e27d5cb2b0a1e6af098eaa4b5f5a3441f8ce031

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w41Dm65.exe

          Filesize

          380KB

          MD5

          7703b533b6e72a90817e85a9fd1f7126

          SHA1

          f4cc506f60b36ddf6474504989a9b171b1418570

          SHA256

          f6660c406e330206727065c74443d77ab4689c53984e6c2158f130c03cd2e86d

          SHA512

          3ee516734c6246d7b492af2a6ba3cae18d59d83cc281d75544b29918073a472b37d52ad6cf5c78bb36e81cc67e27d5cb2b0a1e6af098eaa4b5f5a3441f8ce031

        • memory/3712-128-0x00000000005C0000-0x00000000005ED000-memory.dmp

          Filesize

          180KB

        • memory/3712-129-0x0000000004970000-0x000000000498A000-memory.dmp

          Filesize

          104KB

        • memory/3712-130-0x00000000049C0000-0x0000000004EBE000-memory.dmp

          Filesize

          5.0MB

        • memory/3712-131-0x0000000004F10000-0x0000000004F28000-memory.dmp

          Filesize

          96KB

        • memory/3712-132-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/3712-134-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/3712-133-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/3712-135-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-136-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-138-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-140-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-142-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-144-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-146-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-148-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-150-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-152-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-154-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-156-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-158-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-160-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-162-0x0000000004F10000-0x0000000004F22000-memory.dmp

          Filesize

          72KB

        • memory/3712-163-0x0000000000400000-0x00000000004D4000-memory.dmp

          Filesize

          848KB

        • memory/3712-164-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/3712-165-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/3712-166-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/3712-168-0x0000000000400000-0x00000000004D4000-memory.dmp

          Filesize

          848KB

        • memory/5008-173-0x00000000021B0000-0x00000000021F6000-memory.dmp

          Filesize

          280KB

        • memory/5008-174-0x0000000002660000-0x00000000026A4000-memory.dmp

          Filesize

          272KB

        • memory/5008-175-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-176-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-178-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-180-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-182-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-184-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-186-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-188-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-190-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-192-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-194-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-196-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-198-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-200-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-202-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-204-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-206-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-208-0x0000000002660000-0x000000000269E000-memory.dmp

          Filesize

          248KB

        • memory/5008-212-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-214-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-211-0x00000000005C0000-0x000000000060B000-memory.dmp

          Filesize

          300KB

        • memory/5008-217-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-1085-0x0000000005730000-0x0000000005D36000-memory.dmp

          Filesize

          6.0MB

        • memory/5008-1086-0x0000000005120000-0x000000000522A000-memory.dmp

          Filesize

          1.0MB

        • memory/5008-1087-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

          Filesize

          72KB

        • memory/5008-1088-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-1089-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

          Filesize

          248KB

        • memory/5008-1090-0x0000000005330000-0x000000000537B000-memory.dmp

          Filesize

          300KB

        • memory/5008-1091-0x00000000054C0000-0x0000000005526000-memory.dmp

          Filesize

          408KB

        • memory/5008-1092-0x00000000061C0000-0x0000000006252000-memory.dmp

          Filesize

          584KB

        • memory/5008-1094-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-1095-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-1096-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-1097-0x0000000004C10000-0x0000000004C20000-memory.dmp

          Filesize

          64KB

        • memory/5008-1098-0x00000000064B0000-0x0000000006672000-memory.dmp

          Filesize

          1.8MB

        • memory/5008-1099-0x00000000066A0000-0x0000000006BCC000-memory.dmp

          Filesize

          5.2MB

        • memory/5008-1100-0x0000000007E90000-0x0000000007F06000-memory.dmp

          Filesize

          472KB

        • memory/5008-1101-0x0000000007F10000-0x0000000007F60000-memory.dmp

          Filesize

          320KB