Analysis

  • max time kernel
    57s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/03/2023, 23:32

General

  • Target

    d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe

  • Size

    908KB

  • MD5

    9fc6e4e8b032a1a310736dc8ab628588

  • SHA1

    6083e31142f694bba34484cbf55beb58461144f9

  • SHA256

    d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d

  • SHA512

    87e24ee5ca76063125c1f2723a4fe49cbd7abd09798df96420885fb49e04336c2c1186642f9f216ca0d787fcb30451c6e6eaadc84f8e119579e38e5ac5618467

  • SSDEEP

    12288:sMr9y90oUw/O/8hJl+15u3cMCoygNMeFRc4ZhCXAQlwkDhMy/DWHp2jPr/VCXsuq:hyTUwGIu1ecMCoLZhEAHIPpCXfa

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

polo

C2

193.233.20.31:4125

Attributes
  • auth_value

    f1a1b1041a864e0f1f788d42ececa8b3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe
    "C:\Users\Admin\AppData\Local\Temp\d580481138bf12ace01ba5cd9abc60053aed6662604bce7f82a0328445c3da2d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9699.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9699.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5432.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2463.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2463.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1756
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0950.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0950.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUZ02s22.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUZ02s22.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si467040.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si467040.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3144

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si467040.exe

          Filesize

          175KB

          MD5

          44a26d7004f8b65e1a8bac0ccac86d6a

          SHA1

          30b583c2c04c1167703ae255b4d44b96b411c8ff

          SHA256

          37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

          SHA512

          17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si467040.exe

          Filesize

          175KB

          MD5

          44a26d7004f8b65e1a8bac0ccac86d6a

          SHA1

          30b583c2c04c1167703ae255b4d44b96b411c8ff

          SHA256

          37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

          SHA512

          17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9699.exe

          Filesize

          765KB

          MD5

          ffafc95afe49b4f18ab2138db795a869

          SHA1

          6ef123ed6a3ed85c49c0030127d92ace5edbfb2b

          SHA256

          da5ed656590d42139ce70f325ffb6fdbf77f5b462bcbdcb18a76899538b25646

          SHA512

          6f4b5fd7f7be8a11a893df81c51ea0a6f2bee20d5d9c6643e4db6b80e19783f66ef1761e1f8cdc92d8cc4171fbcad9d338348caa7f2d83284e44b67609fbd633

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9699.exe

          Filesize

          765KB

          MD5

          ffafc95afe49b4f18ab2138db795a869

          SHA1

          6ef123ed6a3ed85c49c0030127d92ace5edbfb2b

          SHA256

          da5ed656590d42139ce70f325ffb6fdbf77f5b462bcbdcb18a76899538b25646

          SHA512

          6f4b5fd7f7be8a11a893df81c51ea0a6f2bee20d5d9c6643e4db6b80e19783f66ef1761e1f8cdc92d8cc4171fbcad9d338348caa7f2d83284e44b67609fbd633

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUZ02s22.exe

          Filesize

          457KB

          MD5

          4f43fbcacf2d5c3fe50991e6ed5da8ac

          SHA1

          ded8439f5c5599b560bc0f8b1c5c11d72d51fa44

          SHA256

          c20009df7cb3a0027a6ee6edf83237167f2410318c3d189143b8fd01137a61b2

          SHA512

          e9a356c5c1e33144c009987f83d128a8e36e494f47de096451b2c60a7f0bb2adc1a658c461b7abb46eae3c60d9b65a6dfabcd17e92004fa62a31e505a67dcebc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUZ02s22.exe

          Filesize

          457KB

          MD5

          4f43fbcacf2d5c3fe50991e6ed5da8ac

          SHA1

          ded8439f5c5599b560bc0f8b1c5c11d72d51fa44

          SHA256

          c20009df7cb3a0027a6ee6edf83237167f2410318c3d189143b8fd01137a61b2

          SHA512

          e9a356c5c1e33144c009987f83d128a8e36e494f47de096451b2c60a7f0bb2adc1a658c461b7abb46eae3c60d9b65a6dfabcd17e92004fa62a31e505a67dcebc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5432.exe

          Filesize

          379KB

          MD5

          38a79753add600ecb3afddcb6bd07d0a

          SHA1

          2f32ea7af0ccfbfa40488a4679faf425f4c48938

          SHA256

          48d74af72761ecb3fa063b42844ac33d684edfdd076ff2711af6adcc7753b449

          SHA512

          abe71dfb780410f2b16021a4d6ce3f171dfa50fd0a3a0f4049fb5d338e1cba594c5ff72c80c3819a22cf51da24e46ea09f936cb0faec4198e0cf599ecfbfdf6b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5432.exe

          Filesize

          379KB

          MD5

          38a79753add600ecb3afddcb6bd07d0a

          SHA1

          2f32ea7af0ccfbfa40488a4679faf425f4c48938

          SHA256

          48d74af72761ecb3fa063b42844ac33d684edfdd076ff2711af6adcc7753b449

          SHA512

          abe71dfb780410f2b16021a4d6ce3f171dfa50fd0a3a0f4049fb5d338e1cba594c5ff72c80c3819a22cf51da24e46ea09f936cb0faec4198e0cf599ecfbfdf6b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2463.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2463.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0950.exe

          Filesize

          399KB

          MD5

          0040635bde51379fd874e53ea10fafb0

          SHA1

          065f5471ddf19c4411acc8359aa3d35fd730be9e

          SHA256

          2684c7a0269d7d80bf2cb040faed36f5c43ff9c83bbb15021c51791e672692bc

          SHA512

          82ed766d48cf0f19f4c87f7c18ab45a909e703cb1e9c0b792397cb5dc4d8c701b980c35a75b19f17c114433d9492a6ad1cc29eb866d760727f70bc70ca773d70

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0950.exe

          Filesize

          399KB

          MD5

          0040635bde51379fd874e53ea10fafb0

          SHA1

          065f5471ddf19c4411acc8359aa3d35fd730be9e

          SHA256

          2684c7a0269d7d80bf2cb040faed36f5c43ff9c83bbb15021c51791e672692bc

          SHA512

          82ed766d48cf0f19f4c87f7c18ab45a909e703cb1e9c0b792397cb5dc4d8c701b980c35a75b19f17c114433d9492a6ad1cc29eb866d760727f70bc70ca773d70

        • memory/1756-137-0x0000000000D70000-0x0000000000D7A000-memory.dmp

          Filesize

          40KB

        • memory/3144-1122-0x0000000004C60000-0x0000000004CAB000-memory.dmp

          Filesize

          300KB

        • memory/3144-1121-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/3144-1120-0x0000000000380000-0x00000000003B2000-memory.dmp

          Filesize

          200KB

        • memory/3144-1123-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/3888-150-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-169-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-149-0x0000000002420000-0x0000000002438000-memory.dmp

          Filesize

          96KB

        • memory/3888-147-0x0000000002280000-0x0000000002290000-memory.dmp

          Filesize

          64KB

        • memory/3888-151-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-153-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-155-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-157-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-159-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-161-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-163-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-165-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-167-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-148-0x0000000004C70000-0x000000000516E000-memory.dmp

          Filesize

          5.0MB

        • memory/3888-171-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-173-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-175-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-177-0x0000000002420000-0x0000000002432000-memory.dmp

          Filesize

          72KB

        • memory/3888-178-0x0000000000400000-0x0000000000726000-memory.dmp

          Filesize

          3.1MB

        • memory/3888-179-0x0000000002280000-0x0000000002290000-memory.dmp

          Filesize

          64KB

        • memory/3888-180-0x0000000002280000-0x0000000002290000-memory.dmp

          Filesize

          64KB

        • memory/3888-182-0x0000000000400000-0x0000000000726000-memory.dmp

          Filesize

          3.1MB

        • memory/3888-146-0x0000000002280000-0x0000000002290000-memory.dmp

          Filesize

          64KB

        • memory/3888-145-0x0000000002280000-0x0000000002290000-memory.dmp

          Filesize

          64KB

        • memory/3888-144-0x00000000020E0000-0x000000000210D000-memory.dmp

          Filesize

          180KB

        • memory/3888-143-0x0000000002320000-0x000000000233A000-memory.dmp

          Filesize

          104KB

        • memory/4728-189-0x0000000004CA0000-0x0000000004CE4000-memory.dmp

          Filesize

          272KB

        • memory/4728-192-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-193-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-195-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-197-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-199-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-201-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-203-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-205-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-207-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-209-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-211-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-213-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-215-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-217-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-219-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-221-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-223-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-225-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

          Filesize

          248KB

        • memory/4728-1098-0x0000000005340000-0x0000000005946000-memory.dmp

          Filesize

          6.0MB

        • memory/4728-1099-0x0000000005950000-0x0000000005A5A000-memory.dmp

          Filesize

          1.0MB

        • memory/4728-1100-0x0000000004DF0000-0x0000000004E02000-memory.dmp

          Filesize

          72KB

        • memory/4728-1101-0x0000000005A60000-0x0000000005A9E000-memory.dmp

          Filesize

          248KB

        • memory/4728-1102-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-1103-0x0000000005BA0000-0x0000000005BEB000-memory.dmp

          Filesize

          300KB

        • memory/4728-1104-0x0000000005D20000-0x0000000005D86000-memory.dmp

          Filesize

          408KB

        • memory/4728-1105-0x0000000006410000-0x00000000064A2000-memory.dmp

          Filesize

          584KB

        • memory/4728-1106-0x00000000064B0000-0x0000000006526000-memory.dmp

          Filesize

          472KB

        • memory/4728-1107-0x0000000006530000-0x0000000006580000-memory.dmp

          Filesize

          320KB

        • memory/4728-1109-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-1110-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-1111-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-191-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-188-0x0000000000830000-0x000000000087B000-memory.dmp

          Filesize

          300KB

        • memory/4728-190-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/4728-187-0x0000000002700000-0x0000000002746000-memory.dmp

          Filesize

          280KB

        • memory/4728-1113-0x0000000008C50000-0x0000000008E12000-memory.dmp

          Filesize

          1.8MB

        • memory/4728-1114-0x0000000008E20000-0x000000000934C000-memory.dmp

          Filesize

          5.2MB