Analysis

  • max time kernel
    57s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-03-2023 02:25

General

  • Target

    925efd028ed22717be1cf72caea7705fb587dec8cacf4031e8644ce4a8c070c6.exe

  • Size

    851KB

  • MD5

    3da1afb118590f17d5a1642fb7271abf

  • SHA1

    43442e26af12b72bb526ceffc102aaa49bf0e13e

  • SHA256

    925efd028ed22717be1cf72caea7705fb587dec8cacf4031e8644ce4a8c070c6

  • SHA512

    951072ac85fab339e596af353f5efec5f6e06699bb253c6a2a19f1cbe2235ed3fa3f7eb77b686564bfc191cc3c0990f0d8d2ec05e9c8a67be15e62526ba5a9aa

  • SSDEEP

    24576:iyfVafZhcyV7Zauti2HRCXnaacXIU7oGc1m8:JNafj91NHRCXnxO7U

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

ruka

C2

193.233.20.28:4125

Attributes
  • auth_value

    5d1d0e51ebe1e3f16cca573ff651c43c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\925efd028ed22717be1cf72caea7705fb587dec8cacf4031e8644ce4a8c070c6.exe
    "C:\Users\Admin\AppData\Local\Temp\925efd028ed22717be1cf72caea7705fb587dec8cacf4031e8644ce4a8c070c6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8668.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8668.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7163.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7163.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7786bK.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7786bK.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h06Oi49.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h06Oi49.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iBuVR81.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iBuVR81.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l05bb17.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l05bb17.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3976

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l05bb17.exe
    Filesize

    175KB

    MD5

    6c4c2a56d5dd785adbe4fe60fa3cc1f2

    SHA1

    f8bd4379310258f8e54c47b56f5eec7394adb9a2

    SHA256

    b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

    SHA512

    f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l05bb17.exe
    Filesize

    175KB

    MD5

    6c4c2a56d5dd785adbe4fe60fa3cc1f2

    SHA1

    f8bd4379310258f8e54c47b56f5eec7394adb9a2

    SHA256

    b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

    SHA512

    f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8668.exe
    Filesize

    709KB

    MD5

    1591835327007e81bb7f57f1152f224c

    SHA1

    9dc95cb12975e2073b08c7be78bfbc84b07528bf

    SHA256

    7f7ee259bd1d21c0667f2f20494fff342238998993ef5013dfdcb941845784a0

    SHA512

    4a26600f85c8a5361d994144a73218b367a032a99903443c9a35affdb6841e0a32a8271e9f3387ceaf9cacba911ae9440d60670f811ec3bad0588b2854c2284f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8668.exe
    Filesize

    709KB

    MD5

    1591835327007e81bb7f57f1152f224c

    SHA1

    9dc95cb12975e2073b08c7be78bfbc84b07528bf

    SHA256

    7f7ee259bd1d21c0667f2f20494fff342238998993ef5013dfdcb941845784a0

    SHA512

    4a26600f85c8a5361d994144a73218b367a032a99903443c9a35affdb6841e0a32a8271e9f3387ceaf9cacba911ae9440d60670f811ec3bad0588b2854c2284f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iBuVR81.exe
    Filesize

    391KB

    MD5

    2351fed6229abe8f96cd7a0a11ef3896

    SHA1

    ea4654677c73d2c2108c44bccae145044a64360b

    SHA256

    160d099ee91fafa3ef2b63ab60666bae6dcda0b4000134c6298841a764d900cc

    SHA512

    58a628dca597bf80076a8c0b1d35aea8ac770ac5d5a0c769c087fe4ed938f8fc9064f8eb3472f5c05ffcb84dc7c48e4ae885b02412c6c5bca62c875a8116cf5b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iBuVR81.exe
    Filesize

    391KB

    MD5

    2351fed6229abe8f96cd7a0a11ef3896

    SHA1

    ea4654677c73d2c2108c44bccae145044a64360b

    SHA256

    160d099ee91fafa3ef2b63ab60666bae6dcda0b4000134c6298841a764d900cc

    SHA512

    58a628dca597bf80076a8c0b1d35aea8ac770ac5d5a0c769c087fe4ed938f8fc9064f8eb3472f5c05ffcb84dc7c48e4ae885b02412c6c5bca62c875a8116cf5b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7163.exe
    Filesize

    358KB

    MD5

    9e3d888668c22a03418277b142053b91

    SHA1

    b2c4fbd2bf7da32116359b8d6f31c9e7b1bf8547

    SHA256

    d709ea8db83884b2b2dea72283def6efbad7df1e183036754c93a2df561855b8

    SHA512

    3328e3078be29a398ea7a004cb0c616d9188fbc3ccfa7793efb6ddfd1db7e58cdae0be95fc23ff797eb65c118802aa2a17597038d3f635040107039883ae8b6a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7163.exe
    Filesize

    358KB

    MD5

    9e3d888668c22a03418277b142053b91

    SHA1

    b2c4fbd2bf7da32116359b8d6f31c9e7b1bf8547

    SHA256

    d709ea8db83884b2b2dea72283def6efbad7df1e183036754c93a2df561855b8

    SHA512

    3328e3078be29a398ea7a004cb0c616d9188fbc3ccfa7793efb6ddfd1db7e58cdae0be95fc23ff797eb65c118802aa2a17597038d3f635040107039883ae8b6a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7786bK.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7786bK.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h06Oi49.exe
    Filesize

    371KB

    MD5

    41003fe29bf23789fa139d4381fa693f

    SHA1

    db70c4089423476fd8be5a5f00a99124a2ed11eb

    SHA256

    33ee5eb0be1fb0ef4fef384316503be79579ab24254d0d15638db521adcdd42a

    SHA512

    c57bff9927769359503ba91e1e604cebfa124076b36e26209c8f62478a239b9d94d11d24c2f21d7ba581a7233573f73279b66f8f8bd5bdfffbb8ea62c3969ea0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h06Oi49.exe
    Filesize

    371KB

    MD5

    41003fe29bf23789fa139d4381fa693f

    SHA1

    db70c4089423476fd8be5a5f00a99124a2ed11eb

    SHA256

    33ee5eb0be1fb0ef4fef384316503be79579ab24254d0d15638db521adcdd42a

    SHA512

    c57bff9927769359503ba91e1e604cebfa124076b36e26209c8f62478a239b9d94d11d24c2f21d7ba581a7233573f73279b66f8f8bd5bdfffbb8ea62c3969ea0

  • memory/1000-156-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-166-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-147-0x0000000007260000-0x0000000007270000-memory.dmp
    Filesize

    64KB

  • memory/1000-148-0x0000000004B00000-0x0000000004B18000-memory.dmp
    Filesize

    96KB

  • memory/1000-146-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1000-149-0x0000000007260000-0x0000000007270000-memory.dmp
    Filesize

    64KB

  • memory/1000-150-0x0000000007260000-0x0000000007270000-memory.dmp
    Filesize

    64KB

  • memory/1000-151-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-152-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-154-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-144-0x0000000002DE0000-0x0000000002DFA000-memory.dmp
    Filesize

    104KB

  • memory/1000-158-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-160-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-162-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-164-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-145-0x0000000007270000-0x000000000776E000-memory.dmp
    Filesize

    5.0MB

  • memory/1000-168-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-170-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-172-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-174-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-176-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-178-0x0000000004B00000-0x0000000004B12000-memory.dmp
    Filesize

    72KB

  • memory/1000-179-0x0000000000400000-0x0000000002B0C000-memory.dmp
    Filesize

    39.0MB

  • memory/1000-181-0x0000000007260000-0x0000000007270000-memory.dmp
    Filesize

    64KB

  • memory/1000-180-0x0000000007260000-0x0000000007270000-memory.dmp
    Filesize

    64KB

  • memory/1000-182-0x0000000007260000-0x0000000007270000-memory.dmp
    Filesize

    64KB

  • memory/1000-184-0x0000000000400000-0x0000000002B0C000-memory.dmp
    Filesize

    39.0MB

  • memory/2096-138-0x0000000000DE0000-0x0000000000DEA000-memory.dmp
    Filesize

    40KB

  • memory/3976-1127-0x00000000054F0000-0x0000000005500000-memory.dmp
    Filesize

    64KB

  • memory/3976-1126-0x00000000054F0000-0x0000000005500000-memory.dmp
    Filesize

    64KB

  • memory/3976-1124-0x00000000008E0000-0x0000000000912000-memory.dmp
    Filesize

    200KB

  • memory/3976-1125-0x0000000005320000-0x000000000536B000-memory.dmp
    Filesize

    300KB

  • memory/4844-192-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-196-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-198-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-200-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-202-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-204-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-206-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-208-0x0000000002B20000-0x0000000002B6B000-memory.dmp
    Filesize

    300KB

  • memory/4844-210-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-209-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-212-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-213-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-215-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-216-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-218-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-220-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-222-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-224-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-226-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-228-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-1101-0x0000000007780000-0x0000000007D86000-memory.dmp
    Filesize

    6.0MB

  • memory/4844-1102-0x0000000007E00000-0x0000000007F0A000-memory.dmp
    Filesize

    1.0MB

  • memory/4844-1103-0x0000000007F40000-0x0000000007F52000-memory.dmp
    Filesize

    72KB

  • memory/4844-1104-0x0000000007F60000-0x0000000007F9E000-memory.dmp
    Filesize

    248KB

  • memory/4844-1105-0x00000000080B0000-0x00000000080FB000-memory.dmp
    Filesize

    300KB

  • memory/4844-1106-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-1108-0x0000000008240000-0x00000000082D2000-memory.dmp
    Filesize

    584KB

  • memory/4844-1109-0x00000000082E0000-0x0000000008346000-memory.dmp
    Filesize

    408KB

  • memory/4844-1110-0x00000000089A0000-0x0000000008A16000-memory.dmp
    Filesize

    472KB

  • memory/4844-1111-0x0000000008A40000-0x0000000008A90000-memory.dmp
    Filesize

    320KB

  • memory/4844-1112-0x0000000008AC0000-0x0000000008C82000-memory.dmp
    Filesize

    1.8MB

  • memory/4844-1113-0x0000000008CA0000-0x00000000091CC000-memory.dmp
    Filesize

    5.2MB

  • memory/4844-1114-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-1115-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-194-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-191-0x0000000007080000-0x00000000070BE000-memory.dmp
    Filesize

    248KB

  • memory/4844-190-0x0000000007080000-0x00000000070C4000-memory.dmp
    Filesize

    272KB

  • memory/4844-189-0x0000000004AE0000-0x0000000004B26000-memory.dmp
    Filesize

    280KB

  • memory/4844-1116-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4844-1117-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB