Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/03/2023, 06:57

General

  • Target

    241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe

  • Size

    851KB

  • MD5

    5ca9f06872888453734a2a2f84652106

  • SHA1

    1229b505cd58d404263a39920b2bb9ef68ddb50d

  • SHA256

    241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf

  • SHA512

    7fc459da5f20abe1751944ca52c1e5673605e788a99c12c1cc2beb2d23d66a0c60904fce87767eae8f1b326de20f2edb737fa225311749a740f8e8c0404a122f

  • SSDEEP

    24576:/yyEMBa2oCRUMcGbZzDcQ83Gla3vDacOH/:KWa/CyE0HGla3vDnOH

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe
    "C:\Users\Admin\AppData\Local\Temp\241496d527b9607dba4f64f9ad13f42149189295070c19b8b37d2fae551fd2bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4104.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4104.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4821.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4821.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2677HS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2677HS.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c41gN05.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c41gN05.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYdkb03.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYdkb03.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83zt90.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83zt90.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83zt90.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e83zt90.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4104.exe

          Filesize

          706KB

          MD5

          a3aa504ff99a08b56ed57a9fdd69da76

          SHA1

          f6edf7d7d69aa671e1d5f2b5cdb11f5a5003cf74

          SHA256

          e70eacc9fcfe19fbf2d2a9eb050e2803dc1365f15a89baee26e63d1ae8c0e647

          SHA512

          9ac43cd85b7dd98bb72452402ebf134b4c395709457f6141e9afe53bb7c8c0054a0a7ed88a50f27815e180cdbfbd0d9de729c9f662fbe282bb3d92892758db84

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4104.exe

          Filesize

          706KB

          MD5

          a3aa504ff99a08b56ed57a9fdd69da76

          SHA1

          f6edf7d7d69aa671e1d5f2b5cdb11f5a5003cf74

          SHA256

          e70eacc9fcfe19fbf2d2a9eb050e2803dc1365f15a89baee26e63d1ae8c0e647

          SHA512

          9ac43cd85b7dd98bb72452402ebf134b4c395709457f6141e9afe53bb7c8c0054a0a7ed88a50f27815e180cdbfbd0d9de729c9f662fbe282bb3d92892758db84

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYdkb03.exe

          Filesize

          391KB

          MD5

          b2c99ed90e107e7f2b59ac36be9650a0

          SHA1

          2d98c4bc94c510f9bc96fd7b822d7c4e67e47a25

          SHA256

          4b7c16b60accc72b5681419826873300af501c618a541b951ec1e263f000c289

          SHA512

          c78fa75e197e8dc444d180e0ba805d32e3dc5e056dd045504551fb25a047243fc43eee20b3c5a10eb82778ab1d93a1472811677ea4a17cc0bea4ce8f0dfd71ab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dYdkb03.exe

          Filesize

          391KB

          MD5

          b2c99ed90e107e7f2b59ac36be9650a0

          SHA1

          2d98c4bc94c510f9bc96fd7b822d7c4e67e47a25

          SHA256

          4b7c16b60accc72b5681419826873300af501c618a541b951ec1e263f000c289

          SHA512

          c78fa75e197e8dc444d180e0ba805d32e3dc5e056dd045504551fb25a047243fc43eee20b3c5a10eb82778ab1d93a1472811677ea4a17cc0bea4ce8f0dfd71ab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4821.exe

          Filesize

          353KB

          MD5

          033acb10cb5390e6c91def767b836d12

          SHA1

          66d30260e4bdc16dc0f602feb07b05542c859dc5

          SHA256

          beca09949c82888a167535f5f2780ddfd1f7d8c01ea78b4dbc62eb314ce17681

          SHA512

          6a13d803a2876d1d9ddbeb5920c1436c349c215a2df26b07a89b5ab505f6e8fd1828ae39237531ca79e536c8802fecb29325a79b101f083a4700983d29a63a42

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4821.exe

          Filesize

          353KB

          MD5

          033acb10cb5390e6c91def767b836d12

          SHA1

          66d30260e4bdc16dc0f602feb07b05542c859dc5

          SHA256

          beca09949c82888a167535f5f2780ddfd1f7d8c01ea78b4dbc62eb314ce17681

          SHA512

          6a13d803a2876d1d9ddbeb5920c1436c349c215a2df26b07a89b5ab505f6e8fd1828ae39237531ca79e536c8802fecb29325a79b101f083a4700983d29a63a42

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2677HS.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2677HS.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c41gN05.exe

          Filesize

          333KB

          MD5

          ff688d640a085c3c0f75a24a5d5b8b83

          SHA1

          19dfca18197e53384f58d3b54edfb8934f176b4c

          SHA256

          15c560b28427af09a1a0b0c7e60dadf8e96c1cbce1607d517d1f1c70308d6dd4

          SHA512

          7851b026a83836b614dd26e0962e0e7f8d6b252ba0ff0a0b7297dc247fb21683ff7e1617c0cc8ddac9e9ccad743f3ebadc0e32c30178f293377945aafbfc236a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c41gN05.exe

          Filesize

          333KB

          MD5

          ff688d640a085c3c0f75a24a5d5b8b83

          SHA1

          19dfca18197e53384f58d3b54edfb8934f176b4c

          SHA256

          15c560b28427af09a1a0b0c7e60dadf8e96c1cbce1607d517d1f1c70308d6dd4

          SHA512

          7851b026a83836b614dd26e0962e0e7f8d6b252ba0ff0a0b7297dc247fb21683ff7e1617c0cc8ddac9e9ccad743f3ebadc0e32c30178f293377945aafbfc236a

        • memory/1144-1100-0x0000000007720000-0x0000000007D26000-memory.dmp

          Filesize

          6.0MB

        • memory/1144-1104-0x0000000007E80000-0x0000000007EBE000-memory.dmp

          Filesize

          248KB

        • memory/1144-1118-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-1115-0x0000000008C70000-0x000000000919C000-memory.dmp

          Filesize

          5.2MB

        • memory/1144-1114-0x0000000008AA0000-0x0000000008C62000-memory.dmp

          Filesize

          1.8MB

        • memory/1144-1113-0x0000000008A10000-0x0000000008A60000-memory.dmp

          Filesize

          320KB

        • memory/1144-1112-0x0000000008980000-0x00000000089F6000-memory.dmp

          Filesize

          472KB

        • memory/1144-1111-0x00000000081A0000-0x0000000008206000-memory.dmp

          Filesize

          408KB

        • memory/1144-1110-0x0000000008100000-0x0000000008192000-memory.dmp

          Filesize

          584KB

        • memory/1144-1109-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-1108-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-1107-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-1105-0x0000000007FC0000-0x000000000800B000-memory.dmp

          Filesize

          300KB

        • memory/1144-1103-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-1102-0x00000000071D0000-0x00000000071E2000-memory.dmp

          Filesize

          72KB

        • memory/1144-1101-0x0000000007D30000-0x0000000007E3A000-memory.dmp

          Filesize

          1.0MB

        • memory/1144-227-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-225-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-223-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-221-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-219-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-217-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-189-0x00000000047B0000-0x00000000047F6000-memory.dmp

          Filesize

          280KB

        • memory/1144-190-0x00000000070D0000-0x0000000007114000-memory.dmp

          Filesize

          272KB

        • memory/1144-191-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-193-0x0000000002B20000-0x0000000002B6B000-memory.dmp

          Filesize

          300KB

        • memory/1144-192-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-196-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-197-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-195-0x0000000007210000-0x0000000007220000-memory.dmp

          Filesize

          64KB

        • memory/1144-199-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-201-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-203-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-205-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-207-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-209-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-211-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-213-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/1144-215-0x00000000070D0000-0x000000000710E000-memory.dmp

          Filesize

          248KB

        • memory/2124-142-0x0000000000600000-0x000000000060A000-memory.dmp

          Filesize

          40KB

        • memory/4160-169-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-151-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4160-182-0x0000000000400000-0x0000000002B03000-memory.dmp

          Filesize

          39.0MB

        • memory/4160-181-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-179-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-149-0x00000000071E0000-0x00000000076DE000-memory.dmp

          Filesize

          5.0MB

        • memory/4160-177-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-171-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-173-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-153-0x00000000071D0000-0x00000000071E0000-memory.dmp

          Filesize

          64KB

        • memory/4160-175-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-150-0x0000000004C10000-0x0000000004C28000-memory.dmp

          Filesize

          96KB

        • memory/4160-184-0x0000000000400000-0x0000000002B03000-memory.dmp

          Filesize

          39.0MB

        • memory/4160-167-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-155-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-161-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-159-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-157-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-163-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-154-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/4160-152-0x00000000071D0000-0x00000000071E0000-memory.dmp

          Filesize

          64KB

        • memory/4160-148-0x0000000002EB0000-0x0000000002ECA000-memory.dmp

          Filesize

          104KB

        • memory/4160-165-0x0000000004C10000-0x0000000004C22000-memory.dmp

          Filesize

          72KB

        • memory/5020-1122-0x0000000000EF0000-0x0000000000F22000-memory.dmp

          Filesize

          200KB

        • memory/5020-1123-0x0000000005980000-0x00000000059CB000-memory.dmp

          Filesize

          300KB

        • memory/5020-1124-0x0000000005820000-0x0000000005830000-memory.dmp

          Filesize

          64KB