Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/03/2023, 07:42

General

  • Target

    c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe

  • Size

    837KB

  • MD5

    a68f1c5610728a125b370b7cdc6ca8ca

  • SHA1

    41d07292c9b1aaa3670f262a0467ee1bc1dc161a

  • SHA256

    c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8

  • SHA512

    c0ce8f37378570b57e2b26e183db03f701341d1f90a633bda264af8dee7be6ca26caccaacdfa7e7609c3acaa4719bac57870e377679fd2f51e2247b63ab4bb18

  • SSDEEP

    12288:+MrGy901jx9iTTWw1cs1lKgBWDb1Y899ulTjtUX+aHtDTyWRFPYwY24Qh:Ay+d9iXWw15XKggOu9uFjtsDTyKF11h

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe
    "C:\Users\Admin\AppData\Local\Temp\c8d58e83fbf186f2747ac8de2d42b92d2fdd2139e00f553f9a4b1f2439452ff8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9234.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3109.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3109.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5147.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5147.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8728.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8728.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUl02s54.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUl02s54.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709182.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709182.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709182.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709182.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9234.exe

          Filesize

          695KB

          MD5

          82c5fdfc224ca5985d8047e91070c35e

          SHA1

          b9b5f7a3832c942d19686d62799bdf47d4c8031c

          SHA256

          4d70debf3076e4bc7528a85f02398643d809142dc96ef46b0c3b332e1d2e3e96

          SHA512

          0e43c5b252cf8ba5a6ae13f6461b55ed73085667aa324594eed649d7e6af3f68d175a45256539c0c3ff142ffe5787995d84f9731244797959d1d1b8df838290c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9234.exe

          Filesize

          695KB

          MD5

          82c5fdfc224ca5985d8047e91070c35e

          SHA1

          b9b5f7a3832c942d19686d62799bdf47d4c8031c

          SHA256

          4d70debf3076e4bc7528a85f02398643d809142dc96ef46b0c3b332e1d2e3e96

          SHA512

          0e43c5b252cf8ba5a6ae13f6461b55ed73085667aa324594eed649d7e6af3f68d175a45256539c0c3ff142ffe5787995d84f9731244797959d1d1b8df838290c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUl02s54.exe

          Filesize

          362KB

          MD5

          bf9b71005ec032cdb9e8496f24f0fc53

          SHA1

          02ca268092c40794d77429ef2b9de7f19b1ac9d7

          SHA256

          e018610c3722ee0532770bb38044a30b0981b059328165e3e3eb5417c226af30

          SHA512

          39591d7bda9ba3731aa0bd33442c92f7457077b0ff5e8dc3be629b8d8c5efcaf73191df679ff19a21bff620e2112c6bd918542d779140db4d94fc58c64226cd6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rUl02s54.exe

          Filesize

          362KB

          MD5

          bf9b71005ec032cdb9e8496f24f0fc53

          SHA1

          02ca268092c40794d77429ef2b9de7f19b1ac9d7

          SHA256

          e018610c3722ee0532770bb38044a30b0981b059328165e3e3eb5417c226af30

          SHA512

          39591d7bda9ba3731aa0bd33442c92f7457077b0ff5e8dc3be629b8d8c5efcaf73191df679ff19a21bff620e2112c6bd918542d779140db4d94fc58c64226cd6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3109.exe

          Filesize

          344KB

          MD5

          af0151bfccbaefa297070d4eb700ea4b

          SHA1

          062f2b6503929683bbd046eac9f9079e53f7d2dc

          SHA256

          7b584fc2a06196819ef45f1698ea394af5f55e02cdf4c64dfb4689eac0f41a36

          SHA512

          66b5665390401bdd8b941b6e6b2209e8a06d6197434410b642f1b68ebaef03586b5aa843f4f24af307cbe2e4317a33ec5b3a3792debb3953d132356ac2e07df3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3109.exe

          Filesize

          344KB

          MD5

          af0151bfccbaefa297070d4eb700ea4b

          SHA1

          062f2b6503929683bbd046eac9f9079e53f7d2dc

          SHA256

          7b584fc2a06196819ef45f1698ea394af5f55e02cdf4c64dfb4689eac0f41a36

          SHA512

          66b5665390401bdd8b941b6e6b2209e8a06d6197434410b642f1b68ebaef03586b5aa843f4f24af307cbe2e4317a33ec5b3a3792debb3953d132356ac2e07df3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5147.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro5147.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8728.exe

          Filesize

          304KB

          MD5

          eb66216c95f2ce7272ba1b92f535851b

          SHA1

          d57ea15541313090686f2168c4ed5e1021cc3084

          SHA256

          ff5c0f4e1045893ced59b80bc4898334488abcd5a1c32af6926ca9f50fd4b57c

          SHA512

          dd653ec56479635efd016979c99223751e152ae99e790e84c3e2a3124b49ffb1ebbd8567953c96d1c2cec9ba45e84ce0a7d67a1634647934a01e83c7abd77ec5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8728.exe

          Filesize

          304KB

          MD5

          eb66216c95f2ce7272ba1b92f535851b

          SHA1

          d57ea15541313090686f2168c4ed5e1021cc3084

          SHA256

          ff5c0f4e1045893ced59b80bc4898334488abcd5a1c32af6926ca9f50fd4b57c

          SHA512

          dd653ec56479635efd016979c99223751e152ae99e790e84c3e2a3124b49ffb1ebbd8567953c96d1c2cec9ba45e84ce0a7d67a1634647934a01e83c7abd77ec5

        • memory/1620-142-0x0000000000D20000-0x0000000000D2A000-memory.dmp

          Filesize

          40KB

        • memory/1772-148-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/1772-149-0x0000000000CE0000-0x0000000000CFA000-memory.dmp

          Filesize

          104KB

        • memory/1772-150-0x0000000005070000-0x000000000556E000-memory.dmp

          Filesize

          5.0MB

        • memory/1772-151-0x0000000002610000-0x0000000002628000-memory.dmp

          Filesize

          96KB

        • memory/1772-152-0x0000000005060000-0x0000000005070000-memory.dmp

          Filesize

          64KB

        • memory/1772-153-0x0000000005060000-0x0000000005070000-memory.dmp

          Filesize

          64KB

        • memory/1772-154-0x0000000005060000-0x0000000005070000-memory.dmp

          Filesize

          64KB

        • memory/1772-155-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-156-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-158-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-160-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-162-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-164-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-166-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-168-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-170-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-172-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-174-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-176-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-178-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-180-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-182-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/1772-183-0x0000000000400000-0x0000000000834000-memory.dmp

          Filesize

          4.2MB

        • memory/1772-184-0x0000000005060000-0x0000000005070000-memory.dmp

          Filesize

          64KB

        • memory/1772-185-0x0000000005060000-0x0000000005070000-memory.dmp

          Filesize

          64KB

        • memory/1772-187-0x0000000000400000-0x0000000000834000-memory.dmp

          Filesize

          4.2MB

        • memory/3064-193-0x0000000002630000-0x0000000002674000-memory.dmp

          Filesize

          272KB

        • memory/3064-227-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-194-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-195-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-197-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-199-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-201-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-203-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-205-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-207-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-209-0x0000000000950000-0x000000000099B000-memory.dmp

          Filesize

          300KB

        • memory/3064-212-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-211-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-213-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-210-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-215-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-217-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-219-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-221-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-223-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-225-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-192-0x0000000002370000-0x00000000023B6000-memory.dmp

          Filesize

          280KB

        • memory/3064-229-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-231-0x0000000002630000-0x000000000266E000-memory.dmp

          Filesize

          248KB

        • memory/3064-1104-0x00000000055E0000-0x0000000005BE6000-memory.dmp

          Filesize

          6.0MB

        • memory/3064-1105-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

          Filesize

          1.0MB

        • memory/3064-1106-0x0000000004E40000-0x0000000004E52000-memory.dmp

          Filesize

          72KB

        • memory/3064-1107-0x0000000004E60000-0x0000000004E9E000-memory.dmp

          Filesize

          248KB

        • memory/3064-1108-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-1109-0x0000000005E00000-0x0000000005E4B000-memory.dmp

          Filesize

          300KB

        • memory/3064-1111-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-1112-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-1113-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-1114-0x0000000005F70000-0x0000000006002000-memory.dmp

          Filesize

          584KB

        • memory/3064-1115-0x0000000006010000-0x0000000006076000-memory.dmp

          Filesize

          408KB

        • memory/3064-1116-0x0000000006810000-0x00000000069D2000-memory.dmp

          Filesize

          1.8MB

        • memory/3064-1117-0x0000000006A00000-0x0000000006F2C000-memory.dmp

          Filesize

          5.2MB

        • memory/3064-1118-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

          Filesize

          64KB

        • memory/3064-1119-0x0000000007070000-0x00000000070E6000-memory.dmp

          Filesize

          472KB

        • memory/3064-1120-0x00000000070F0000-0x0000000007140000-memory.dmp

          Filesize

          320KB

        • memory/4972-1126-0x0000000000460000-0x0000000000492000-memory.dmp

          Filesize

          200KB

        • memory/4972-1127-0x0000000004EA0000-0x0000000004EEB000-memory.dmp

          Filesize

          300KB

        • memory/4972-1128-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB