Analysis

  • max time kernel
    87s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/03/2023, 10:25

General

  • Target

    b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495.exe

  • Size

    835KB

  • MD5

    bebe0afbdd854802353d04cb16958dd5

  • SHA1

    924ca47f474c686ecb5db33aff7156331732c33e

  • SHA256

    b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495

  • SHA512

    de23901a7011001eb279e85b0b9b6d8249ce3f0278e2a56842ace904b23a2a8ec007d733da8858c3af97edd10375de8bf208e69c73df9b8d064f7e9cdbf36005

  • SSDEEP

    24576:wyq9L84fCZ8UnV2v7cEXvXmln2xfJKAFXLc+FHVy:3WLBnUVImlnafJKAZc+FHV

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495.exe
    "C:\Users\Admin\AppData\Local\Temp\b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5936.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5936.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8466.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8466.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2039.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2039.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu6125.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu6125.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIf96s43.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIf96s43.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si943762.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si943762.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4788

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si943762.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si943762.exe

          Filesize

          175KB

          MD5

          6fbff2d7c9ba7f0a71f02a5c70df9dfc

          SHA1

          003da0075734cd2d7f201c5b0e4779b8e1f33621

          SHA256

          cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

          SHA512

          25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5936.exe

          Filesize

          692KB

          MD5

          c09cf5230165d825f924ea9a5ffaf8d1

          SHA1

          f5385739ff41f8fb768c318f65c91b548c0e512b

          SHA256

          0560b36a5f124f93db44ea933332797496c166a89e93f64bb46f5a29630a3b11

          SHA512

          1310d772a1e6b977306577d960563f1d20437a22066e1b5f122a9331872ac032310cf618fc72e0ee42bd7cd0d860710127377f99159717f855191c8ba835bff9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5936.exe

          Filesize

          692KB

          MD5

          c09cf5230165d825f924ea9a5ffaf8d1

          SHA1

          f5385739ff41f8fb768c318f65c91b548c0e512b

          SHA256

          0560b36a5f124f93db44ea933332797496c166a89e93f64bb46f5a29630a3b11

          SHA512

          1310d772a1e6b977306577d960563f1d20437a22066e1b5f122a9331872ac032310cf618fc72e0ee42bd7cd0d860710127377f99159717f855191c8ba835bff9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIf96s43.exe

          Filesize

          362KB

          MD5

          cb987a5200a5fbae7a956e398b0bb4fd

          SHA1

          96c81d1a3e59ac296db2c6aad9583cfc5ea5f0d7

          SHA256

          c3481151a57ea80b1094a1665cba2cd3151688187cee1168c5857c13698fe2d7

          SHA512

          9054abead39b2bb187b87c9012d715414b7aa57588295d138a71dcef50389bb892a206a6dcc081ff59032d06fb957700d276089427fa22a864490a362777e8a5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIf96s43.exe

          Filesize

          362KB

          MD5

          cb987a5200a5fbae7a956e398b0bb4fd

          SHA1

          96c81d1a3e59ac296db2c6aad9583cfc5ea5f0d7

          SHA256

          c3481151a57ea80b1094a1665cba2cd3151688187cee1168c5857c13698fe2d7

          SHA512

          9054abead39b2bb187b87c9012d715414b7aa57588295d138a71dcef50389bb892a206a6dcc081ff59032d06fb957700d276089427fa22a864490a362777e8a5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8466.exe

          Filesize

          342KB

          MD5

          d166a98ff4d1a325f8f30d8345a3e80a

          SHA1

          cc4d1b3cc4759d16cf5fa0cdfbd767c23b4d4ae9

          SHA256

          ce1104efb1c8887bc06ec958972445ebbcf57af54ba937efe02434a0aaa289e8

          SHA512

          8c4370a43e903e962971e90756b297bcc81814b650eecd3d15590c7d0a0dc9fdec24fb7d30b43cb8807e09649fcee74964849b514ad2cf1500bcbff88fd3214c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8466.exe

          Filesize

          342KB

          MD5

          d166a98ff4d1a325f8f30d8345a3e80a

          SHA1

          cc4d1b3cc4759d16cf5fa0cdfbd767c23b4d4ae9

          SHA256

          ce1104efb1c8887bc06ec958972445ebbcf57af54ba937efe02434a0aaa289e8

          SHA512

          8c4370a43e903e962971e90756b297bcc81814b650eecd3d15590c7d0a0dc9fdec24fb7d30b43cb8807e09649fcee74964849b514ad2cf1500bcbff88fd3214c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2039.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro2039.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu6125.exe

          Filesize

          303KB

          MD5

          d690d20d0ec4c933cc97823ebe239360

          SHA1

          8c5142154a3e4527a3d13d4ae47fee8bc09c5002

          SHA256

          f113e3c202852959002e2e536f754d96384a1ac2af9c4884587c2889bab08b81

          SHA512

          7e4a0fbee07b3d95c8796df17699832a3117998b0236c597147b7655e1c94ea646ad2e174dd47a21d922ba81c18d4094779e1a7138b5b9af145c09d909f02cb2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu6125.exe

          Filesize

          303KB

          MD5

          d690d20d0ec4c933cc97823ebe239360

          SHA1

          8c5142154a3e4527a3d13d4ae47fee8bc09c5002

          SHA256

          f113e3c202852959002e2e536f754d96384a1ac2af9c4884587c2889bab08b81

          SHA512

          7e4a0fbee07b3d95c8796df17699832a3117998b0236c597147b7655e1c94ea646ad2e174dd47a21d922ba81c18d4094779e1a7138b5b9af145c09d909f02cb2

        • memory/2308-352-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-1107-0x0000000004F50000-0x0000000004F8E000-memory.dmp

          Filesize

          248KB

        • memory/2308-1119-0x0000000006F90000-0x0000000006FE0000-memory.dmp

          Filesize

          320KB

        • memory/2308-1118-0x0000000006F10000-0x0000000006F86000-memory.dmp

          Filesize

          472KB

        • memory/2308-1117-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-1116-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-1115-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-1114-0x00000000068A0000-0x0000000006DCC000-memory.dmp

          Filesize

          5.2MB

        • memory/2308-1113-0x00000000066D0000-0x0000000006892000-memory.dmp

          Filesize

          1.8MB

        • memory/2308-1111-0x00000000058C0000-0x0000000005926000-memory.dmp

          Filesize

          408KB

        • memory/2308-1110-0x0000000005820000-0x00000000058B2000-memory.dmp

          Filesize

          584KB

        • memory/2308-1109-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-1108-0x0000000004F90000-0x0000000004FDB000-memory.dmp

          Filesize

          300KB

        • memory/2308-1106-0x0000000002AB0000-0x0000000002AC2000-memory.dmp

          Filesize

          72KB

        • memory/2308-1105-0x0000000005500000-0x000000000560A000-memory.dmp

          Filesize

          1.0MB

        • memory/2308-1104-0x0000000005B10000-0x0000000006116000-memory.dmp

          Filesize

          6.0MB

        • memory/2308-349-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-351-0x0000000004FF0000-0x0000000005000000-memory.dmp

          Filesize

          64KB

        • memory/2308-348-0x0000000000960000-0x00000000009AB000-memory.dmp

          Filesize

          300KB

        • memory/2308-227-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-225-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-223-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-221-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-219-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-217-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-192-0x00000000024B0000-0x00000000024F6000-memory.dmp

          Filesize

          280KB

        • memory/2308-193-0x00000000026C0000-0x0000000002704000-memory.dmp

          Filesize

          272KB

        • memory/2308-194-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-195-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-197-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-199-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-201-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-203-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-205-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-207-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-209-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-213-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-211-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/2308-215-0x00000000026C0000-0x00000000026FE000-memory.dmp

          Filesize

          248KB

        • memory/3860-170-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-158-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-187-0x0000000000400000-0x0000000000833000-memory.dmp

          Filesize

          4.2MB

        • memory/3860-185-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3860-184-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3860-183-0x0000000000400000-0x0000000000833000-memory.dmp

          Filesize

          4.2MB

        • memory/3860-182-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-180-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-178-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-149-0x0000000004DD0000-0x00000000052CE000-memory.dmp

          Filesize

          5.0MB

        • memory/3860-176-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-174-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-172-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-151-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3860-152-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3860-150-0x0000000000910000-0x000000000093D000-memory.dmp

          Filesize

          180KB

        • memory/3860-155-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-164-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-162-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-160-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-168-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-156-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-166-0x0000000002780000-0x0000000002792000-memory.dmp

          Filesize

          72KB

        • memory/3860-154-0x0000000002770000-0x0000000002780000-memory.dmp

          Filesize

          64KB

        • memory/3860-153-0x0000000002780000-0x0000000002798000-memory.dmp

          Filesize

          96KB

        • memory/3860-148-0x0000000002300000-0x000000000231A000-memory.dmp

          Filesize

          104KB

        • memory/4788-1125-0x00000000002D0000-0x0000000000302000-memory.dmp

          Filesize

          200KB

        • memory/4788-1126-0x0000000004E40000-0x0000000004E50000-memory.dmp

          Filesize

          64KB

        • memory/4788-1127-0x0000000004D10000-0x0000000004D5B000-memory.dmp

          Filesize

          300KB

        • memory/5012-142-0x00000000000C0000-0x00000000000CA000-memory.dmp

          Filesize

          40KB