Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/03/2023, 00:44

General

  • Target

    1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe

  • Size

    818KB

  • MD5

    83c4a8f98afee2372970c01c3b9d7a7b

  • SHA1

    0e2c4b9828eaa162d41a7cf598eb1b51d7f376db

  • SHA256

    1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184

  • SHA512

    b6c636af185cf0f2504725826fd408694771627b59b4918f098ff8eb47ff7050c9ab5133f9bcfc614c391b7bbaec9a6b15735e381a3f0c9bb9eba68647e3c9eb

  • SSDEEP

    24576:JyCc+YsHrFMJeW/acXDD+z8UErkzkJve:8Cc9sHrqvacTDIF4

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe
    "C:\Users\Admin\AppData\Local\Temp\1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0136.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0136.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5936.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5936.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3542.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3542.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0128.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0128.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQJ79s82.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQJ79s82.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852877.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852877.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3780

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852877.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si852877.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0136.exe

          Filesize

          676KB

          MD5

          eb392cfa313dc707e30eff0fa320c63b

          SHA1

          dcc88c9a0d74a7b981e03ea84fac2293ab14e38b

          SHA256

          1ff3982f5acf48ef85dd4a13c3367496ef852c053c28e4137c71a8d0cc7126c7

          SHA512

          c84740d0fa47a141cbc6a356730595ba2a695301df740f6e084b83b670a6ae8cb942e8306553e748ca55d6f6d622e4ab41c22cf3004dcf905a78fd15412ba0b8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0136.exe

          Filesize

          676KB

          MD5

          eb392cfa313dc707e30eff0fa320c63b

          SHA1

          dcc88c9a0d74a7b981e03ea84fac2293ab14e38b

          SHA256

          1ff3982f5acf48ef85dd4a13c3367496ef852c053c28e4137c71a8d0cc7126c7

          SHA512

          c84740d0fa47a141cbc6a356730595ba2a695301df740f6e084b83b670a6ae8cb942e8306553e748ca55d6f6d622e4ab41c22cf3004dcf905a78fd15412ba0b8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQJ79s82.exe

          Filesize

          349KB

          MD5

          43e8b0f0ad404a9a88b573cd0cfbf72f

          SHA1

          7ca602d4d58979f5edcfb0ad0ef8d7cac47fa4b7

          SHA256

          bf2d464c14a756cdc94a3990802d8deb1049524c900f8dde858e4b61ec80e524

          SHA512

          0f63650b1a8278359c8051c0c1e15f25b1e490a45a1de3ee69de7ed6ff271472c80f913343b61c65bc3b4be19035c09b9ffe898d0baddc454f91835f3a2acfab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQJ79s82.exe

          Filesize

          349KB

          MD5

          43e8b0f0ad404a9a88b573cd0cfbf72f

          SHA1

          7ca602d4d58979f5edcfb0ad0ef8d7cac47fa4b7

          SHA256

          bf2d464c14a756cdc94a3990802d8deb1049524c900f8dde858e4b61ec80e524

          SHA512

          0f63650b1a8278359c8051c0c1e15f25b1e490a45a1de3ee69de7ed6ff271472c80f913343b61c65bc3b4be19035c09b9ffe898d0baddc454f91835f3a2acfab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5936.exe

          Filesize

          334KB

          MD5

          175201ea8a51f63179cb308f6184c93a

          SHA1

          522006d5160220565097786b1e0e80a3cbe34bc9

          SHA256

          d43685dc3879d11bbb249ef8dc2af1fd88fd51c8a441e53f834c6d8e0422db05

          SHA512

          81da7325dfc87e5e8e6dc85dc6c13e1c97fa2619747b90940398d6966cd836bfadebbe25e54815e8d66186e7e69b1b71400c359e812866e5d47841ba31fcc4fe

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5936.exe

          Filesize

          334KB

          MD5

          175201ea8a51f63179cb308f6184c93a

          SHA1

          522006d5160220565097786b1e0e80a3cbe34bc9

          SHA256

          d43685dc3879d11bbb249ef8dc2af1fd88fd51c8a441e53f834c6d8e0422db05

          SHA512

          81da7325dfc87e5e8e6dc85dc6c13e1c97fa2619747b90940398d6966cd836bfadebbe25e54815e8d66186e7e69b1b71400c359e812866e5d47841ba31fcc4fe

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3542.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3542.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0128.exe

          Filesize

          290KB

          MD5

          7cec95089acb17ba126aa7a431e53bd8

          SHA1

          87fe1ac093406a572871832dcb6de1104ae74800

          SHA256

          ffca6b0eec7bec0e290bdb3847a26c87396e1f0e54373fe389f6ecd21372f543

          SHA512

          706bb6a9651cbaafa89c55c8c60162764008e9bc4f6c9416a2730e5d6f8b2ccf422fdd059d111746f493aaa70cafbc06b911d143d12cecf1c2bfda439b09c3bb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0128.exe

          Filesize

          290KB

          MD5

          7cec95089acb17ba126aa7a431e53bd8

          SHA1

          87fe1ac093406a572871832dcb6de1104ae74800

          SHA256

          ffca6b0eec7bec0e290bdb3847a26c87396e1f0e54373fe389f6ecd21372f543

          SHA512

          706bb6a9651cbaafa89c55c8c60162764008e9bc4f6c9416a2730e5d6f8b2ccf422fdd059d111746f493aaa70cafbc06b911d143d12cecf1c2bfda439b09c3bb

        • memory/2812-228-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-1104-0x0000000005B40000-0x0000000005B7E000-memory.dmp

          Filesize

          248KB

        • memory/2812-1118-0x0000000007210000-0x0000000007260000-memory.dmp

          Filesize

          320KB

        • memory/2812-1117-0x0000000007190000-0x0000000007206000-memory.dmp

          Filesize

          472KB

        • memory/2812-1115-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-1114-0x00000000067B0000-0x0000000006CDC000-memory.dmp

          Filesize

          5.2MB

        • memory/2812-1113-0x00000000065E0000-0x00000000067A2000-memory.dmp

          Filesize

          1.8MB

        • memory/2812-1112-0x0000000006510000-0x00000000065A2000-memory.dmp

          Filesize

          584KB

        • memory/2812-1111-0x0000000005E20000-0x0000000005E86000-memory.dmp

          Filesize

          408KB

        • memory/2812-1110-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-1109-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-1108-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-1106-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-1105-0x0000000005C90000-0x0000000005CDB000-memory.dmp

          Filesize

          300KB

        • memory/2812-1103-0x0000000005B20000-0x0000000005B32000-memory.dmp

          Filesize

          72KB

        • memory/2812-1102-0x00000000059E0000-0x0000000005AEA000-memory.dmp

          Filesize

          1.0MB

        • memory/2812-1101-0x00000000053D0000-0x00000000059D6000-memory.dmp

          Filesize

          6.0MB

        • memory/2812-226-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-224-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-222-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-220-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-218-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-216-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-214-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-212-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-189-0x0000000002450000-0x0000000002496000-memory.dmp

          Filesize

          280KB

        • memory/2812-190-0x0000000004E00000-0x0000000004E44000-memory.dmp

          Filesize

          272KB

        • memory/2812-191-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-192-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-194-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-196-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-198-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-201-0x0000000000840000-0x000000000088B000-memory.dmp

          Filesize

          300KB

        • memory/2812-203-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-204-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-205-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-200-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-207-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/2812-208-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2812-210-0x0000000004E00000-0x0000000004E3E000-memory.dmp

          Filesize

          248KB

        • memory/2900-139-0x0000000000260000-0x000000000026A000-memory.dmp

          Filesize

          40KB

        • memory/3780-1126-0x0000000005770000-0x0000000005780000-memory.dmp

          Filesize

          64KB

        • memory/3780-1125-0x00000000055D0000-0x000000000561B000-memory.dmp

          Filesize

          300KB

        • memory/3780-1124-0x0000000000B90000-0x0000000000BC2000-memory.dmp

          Filesize

          200KB

        • memory/4280-167-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-161-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-179-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-177-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-146-0x0000000002400000-0x000000000241A000-memory.dmp

          Filesize

          104KB

        • memory/4280-175-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-173-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-171-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-149-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/4280-169-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-147-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/4280-165-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-163-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-180-0x0000000000400000-0x0000000000830000-memory.dmp

          Filesize

          4.2MB

        • memory/4280-159-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-157-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-155-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-153-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-152-0x0000000002450000-0x0000000002462000-memory.dmp

          Filesize

          72KB

        • memory/4280-151-0x0000000002450000-0x0000000002468000-memory.dmp

          Filesize

          96KB

        • memory/4280-150-0x0000000005110000-0x000000000560E000-memory.dmp

          Filesize

          5.0MB

        • memory/4280-145-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4280-181-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/4280-182-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/4280-184-0x0000000000400000-0x0000000000830000-memory.dmp

          Filesize

          4.2MB

        • memory/4280-148-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB