Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/03/2023, 23:52

General

  • Target

    88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe

  • Size

    818KB

  • MD5

    58e1076a59d2f30035cb265e8f771ef9

  • SHA1

    3fb43e37250b6f09d6c918da8e70e8c0bfb0fdd2

  • SHA256

    88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068

  • SHA512

    579020f083b8e0df26a396cbb53b40b874d0eff6c36ce00d45378f214d36bab5101874bf07886807765bba43df91788441ba9354243de20be3bdec06fbba6193

  • SSDEEP

    24576:QyrdRVIBrH33aO24SApjWmQdFmOkKFL8UkIkzSaW+a:XrbuBHUU6TEKZYSa

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

ruka

C2

193.233.20.28:4125

Attributes
  • auth_value

    5d1d0e51ebe1e3f16cca573ff651c43c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe
    "C:\Users\Admin\AppData\Local\Temp\88398e9ff81c0985313a55a41ecb48c37ab79151ebf7aa8f4a113696bf21b068.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2425.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2425.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4794.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4794.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2888Uy.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2888Uy.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4668
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h20wT75.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h20wT75.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iGulO40.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iGulO40.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63ny74.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63ny74.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4660

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63ny74.exe

          Filesize

          175KB

          MD5

          6c4c2a56d5dd785adbe4fe60fa3cc1f2

          SHA1

          f8bd4379310258f8e54c47b56f5eec7394adb9a2

          SHA256

          b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

          SHA512

          f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l63ny74.exe

          Filesize

          175KB

          MD5

          6c4c2a56d5dd785adbe4fe60fa3cc1f2

          SHA1

          f8bd4379310258f8e54c47b56f5eec7394adb9a2

          SHA256

          b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

          SHA512

          f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2425.exe

          Filesize

          676KB

          MD5

          d95a2548d49a7600a9a865ea2e8f3e2a

          SHA1

          b6a087a1572bb9e5e50a670c1b91443bb5e2c825

          SHA256

          7c0b81145a70ad8989ad92e19f176068c5d0d0925b2eb8ae8f799a777fe5da4d

          SHA512

          2b7a2d98cf5c3e4af2aa505ca62b76d43954486ddc2892b0725c58fe7233d55ecd7c5a3c27ce750066f12400e1a1d8449fa04ca849672132cda6b023483d2d5d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2425.exe

          Filesize

          676KB

          MD5

          d95a2548d49a7600a9a865ea2e8f3e2a

          SHA1

          b6a087a1572bb9e5e50a670c1b91443bb5e2c825

          SHA256

          7c0b81145a70ad8989ad92e19f176068c5d0d0925b2eb8ae8f799a777fe5da4d

          SHA512

          2b7a2d98cf5c3e4af2aa505ca62b76d43954486ddc2892b0725c58fe7233d55ecd7c5a3c27ce750066f12400e1a1d8449fa04ca849672132cda6b023483d2d5d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iGulO40.exe

          Filesize

          349KB

          MD5

          aa64dc13e80527fcc251736bf4d10a2c

          SHA1

          847f86d295d2dbcd8293358449ae2a7341309cf6

          SHA256

          48a6533292f6e22c4fdbe84ec887b975bd9119c13384f8d26af3912624b8af21

          SHA512

          94135a738376c004e090f11e3b2a504d4d29ed0efd258f13cfd1849fee8ed272ceaa9f3555195132613dd5ade3c787d49bf31301d26388b07c43123ad9522f93

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iGulO40.exe

          Filesize

          349KB

          MD5

          aa64dc13e80527fcc251736bf4d10a2c

          SHA1

          847f86d295d2dbcd8293358449ae2a7341309cf6

          SHA256

          48a6533292f6e22c4fdbe84ec887b975bd9119c13384f8d26af3912624b8af21

          SHA512

          94135a738376c004e090f11e3b2a504d4d29ed0efd258f13cfd1849fee8ed272ceaa9f3555195132613dd5ade3c787d49bf31301d26388b07c43123ad9522f93

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4794.exe

          Filesize

          334KB

          MD5

          36a630afcd567f371af08601cc1f9f8d

          SHA1

          67519fe4fa01639baea7c91db26dd92412cf427f

          SHA256

          e91e421b5f09f158801ebcba5e4c158699e1cdf57f3113f735a9c92fa29b130e

          SHA512

          8e5e4da57e7951d9a6fb2e18556da45f48b950a1a2c865f1744c13907a2e1501edf0cb9fa91cfec686567ff8f10c9648c75f61b08e5e1f8b0c46f05f4129f50f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba4794.exe

          Filesize

          334KB

          MD5

          36a630afcd567f371af08601cc1f9f8d

          SHA1

          67519fe4fa01639baea7c91db26dd92412cf427f

          SHA256

          e91e421b5f09f158801ebcba5e4c158699e1cdf57f3113f735a9c92fa29b130e

          SHA512

          8e5e4da57e7951d9a6fb2e18556da45f48b950a1a2c865f1744c13907a2e1501edf0cb9fa91cfec686567ff8f10c9648c75f61b08e5e1f8b0c46f05f4129f50f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2888Uy.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2888Uy.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h20wT75.exe

          Filesize

          290KB

          MD5

          e6c9638787c91cf6226fe44512d7155a

          SHA1

          a90e30d0f4a23150c6a915a864110436cb3549a1

          SHA256

          9b2aa59104bc44588c93dca5c9d4e59f42525afada6dee07eb4da20e0eb06cf4

          SHA512

          a76ad22e078535eb1b4443a9dcff0311e422c5c0a7cbd269a759694b21819a5d63c39705ad5a7a7bd37130bb480a86588aebbe52b21eee84c40ff5d4a29b2eac

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h20wT75.exe

          Filesize

          290KB

          MD5

          e6c9638787c91cf6226fe44512d7155a

          SHA1

          a90e30d0f4a23150c6a915a864110436cb3549a1

          SHA256

          9b2aa59104bc44588c93dca5c9d4e59f42525afada6dee07eb4da20e0eb06cf4

          SHA512

          a76ad22e078535eb1b4443a9dcff0311e422c5c0a7cbd269a759694b21819a5d63c39705ad5a7a7bd37130bb480a86588aebbe52b21eee84c40ff5d4a29b2eac

        • memory/4472-229-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-1106-0x0000000005650000-0x0000000005662000-memory.dmp

          Filesize

          72KB

        • memory/4472-1119-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-1118-0x0000000006D50000-0x000000000727C000-memory.dmp

          Filesize

          5.2MB

        • memory/4472-1117-0x0000000006B80000-0x0000000006D42000-memory.dmp

          Filesize

          1.8MB

        • memory/4472-1116-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-1115-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-1113-0x0000000006770000-0x00000000067C0000-memory.dmp

          Filesize

          320KB

        • memory/4472-1112-0x00000000066F0000-0x0000000006766000-memory.dmp

          Filesize

          472KB

        • memory/4472-1111-0x0000000006650000-0x00000000066E2000-memory.dmp

          Filesize

          584KB

        • memory/4472-1110-0x0000000005950000-0x00000000059B6000-memory.dmp

          Filesize

          408KB

        • memory/4472-1109-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-1108-0x00000000057C0000-0x000000000580B000-memory.dmp

          Filesize

          300KB

        • memory/4472-1107-0x0000000005670000-0x00000000056AE000-memory.dmp

          Filesize

          248KB

        • memory/4472-1105-0x0000000005510000-0x000000000561A000-memory.dmp

          Filesize

          1.0MB

        • memory/4472-1104-0x0000000005AA0000-0x00000000060A6000-memory.dmp

          Filesize

          6.0MB

        • memory/4472-231-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-227-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-225-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-223-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-221-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-219-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-217-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-215-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-213-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-211-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-192-0x00000000026F0000-0x0000000002736000-memory.dmp

          Filesize

          280KB

        • memory/4472-193-0x0000000004DA0000-0x0000000004DE4000-memory.dmp

          Filesize

          272KB

        • memory/4472-194-0x0000000000910000-0x000000000095B000-memory.dmp

          Filesize

          300KB

        • memory/4472-195-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-196-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-198-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-197-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/4472-199-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-201-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-203-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-205-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-207-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4472-209-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

          Filesize

          248KB

        • memory/4660-1127-0x0000000005020000-0x0000000005030000-memory.dmp

          Filesize

          64KB

        • memory/4660-1126-0x0000000004EC0000-0x0000000004F0B000-memory.dmp

          Filesize

          300KB

        • memory/4660-1125-0x0000000000480000-0x00000000004B2000-memory.dmp

          Filesize

          200KB

        • memory/4668-141-0x0000000000010000-0x000000000001A000-memory.dmp

          Filesize

          40KB

        • memory/4928-171-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-165-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-182-0x0000000000400000-0x0000000000830000-memory.dmp

          Filesize

          4.2MB

        • memory/4928-181-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-179-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-148-0x0000000004EA0000-0x000000000539E000-memory.dmp

          Filesize

          5.0MB

        • memory/4928-177-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-175-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-173-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-150-0x0000000004E90000-0x0000000004EA0000-memory.dmp

          Filesize

          64KB

        • memory/4928-149-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4928-167-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-169-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-183-0x0000000004E90000-0x0000000004EA0000-memory.dmp

          Filesize

          64KB

        • memory/4928-163-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-161-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-159-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-157-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-155-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-154-0x0000000002850000-0x0000000002862000-memory.dmp

          Filesize

          72KB

        • memory/4928-152-0x0000000002850000-0x0000000002868000-memory.dmp

          Filesize

          96KB

        • memory/4928-153-0x0000000004E90000-0x0000000004EA0000-memory.dmp

          Filesize

          64KB

        • memory/4928-147-0x00000000024A0000-0x00000000024BA000-memory.dmp

          Filesize

          104KB

        • memory/4928-184-0x0000000004E90000-0x0000000004EA0000-memory.dmp

          Filesize

          64KB

        • memory/4928-185-0x0000000004E90000-0x0000000004EA0000-memory.dmp

          Filesize

          64KB

        • memory/4928-187-0x0000000000400000-0x0000000000830000-memory.dmp

          Filesize

          4.2MB

        • memory/4928-151-0x0000000004E90000-0x0000000004EA0000-memory.dmp

          Filesize

          64KB