Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/03/2023, 16:07

General

  • Target

    41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c.exe

  • Size

    878KB

  • MD5

    83ef09f9ec22056d1ac5174009341d16

  • SHA1

    0987f8a683c4f042f63a0c8ac7c9a06aff04764f

  • SHA256

    41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c

  • SHA512

    6f9eb9efe5bc1a02719bce4b17cc72a6927a315424fd6cdfe921bf8cd458e2f378eabad9dc7c93c0aa2fb00b15666bf67f7873f290850f54bae5e28eb1f74abc

  • SSDEEP

    24576:vyQMe2nK6WH2lajwKRJnqMDQldTr4n/yn0lN:6/e2K6G2l6ncryyn0l

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c.exe
    "C:\Users\Admin\AppData\Local\Temp\41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1001.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1001.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio9559.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio9559.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8806.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8806.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0316.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0316.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4688
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 1080
            5⤵
            • Program crash
            PID:1884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rde29s02.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rde29s02.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 1348
          4⤵
          • Program crash
          PID:928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067854.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067854.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4688 -ip 4688
    1⤵
      PID:2032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 892 -ip 892
      1⤵
        PID:224

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067854.exe

        Filesize

        175KB

        MD5

        6fbff2d7c9ba7f0a71f02a5c70df9dfc

        SHA1

        003da0075734cd2d7f201c5b0e4779b8e1f33621

        SHA256

        cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

        SHA512

        25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si067854.exe

        Filesize

        175KB

        MD5

        6fbff2d7c9ba7f0a71f02a5c70df9dfc

        SHA1

        003da0075734cd2d7f201c5b0e4779b8e1f33621

        SHA256

        cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

        SHA512

        25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1001.exe

        Filesize

        736KB

        MD5

        e399607bba5649ccf6e93a1952d233b3

        SHA1

        afb4cc91f989842808e0d3f0ea66ff463f1ff008

        SHA256

        fccf2d9902e3a0f94255f230c8cd8725eb7c5ba5779f369c784eca80c93af0cc

        SHA512

        cba0a658dab0699d3a421c9bf52cefd5b9a0089a9de4a8a78d965e08dcf87725c61a0f7ed04023d8faf88642ddefd82aeb71f63a4ed8bd6ca64e1e1e82f6981a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1001.exe

        Filesize

        736KB

        MD5

        e399607bba5649ccf6e93a1952d233b3

        SHA1

        afb4cc91f989842808e0d3f0ea66ff463f1ff008

        SHA256

        fccf2d9902e3a0f94255f230c8cd8725eb7c5ba5779f369c784eca80c93af0cc

        SHA512

        cba0a658dab0699d3a421c9bf52cefd5b9a0089a9de4a8a78d965e08dcf87725c61a0f7ed04023d8faf88642ddefd82aeb71f63a4ed8bd6ca64e1e1e82f6981a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rde29s02.exe

        Filesize

        420KB

        MD5

        55be4b4aecdfb6ae650d2e24d537fa7b

        SHA1

        e8850b607dda66b076ccd4d0b7760934bd0d7117

        SHA256

        11122a9cf8e189251d6061a34d7e17d5d138122664caf9bfd16e1da80fb55d9d

        SHA512

        a2492a8218c358fe44425921f9f020c5bfa97b6f353674e0429f3139416db01c76a5348e2a2f8085d84d9ac338e489be2f5dea7ea9d369dccf73ac0a97ca683d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rde29s02.exe

        Filesize

        420KB

        MD5

        55be4b4aecdfb6ae650d2e24d537fa7b

        SHA1

        e8850b607dda66b076ccd4d0b7760934bd0d7117

        SHA256

        11122a9cf8e189251d6061a34d7e17d5d138122664caf9bfd16e1da80fb55d9d

        SHA512

        a2492a8218c358fe44425921f9f020c5bfa97b6f353674e0429f3139416db01c76a5348e2a2f8085d84d9ac338e489be2f5dea7ea9d369dccf73ac0a97ca683d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio9559.exe

        Filesize

        364KB

        MD5

        3f46fa7b5fa9cd17887ec72ae04df3fe

        SHA1

        fd5e1d191e45da85105355bb00a3d3f85e877e8e

        SHA256

        f55d72c64d0ad57aacac2ed28a1a7e0486e65c910e3ff27bb6b200c2ba9f455b

        SHA512

        3521926296f1a595c72b446128e664538cb71b7fbb762eb00dfabc7627b21a6aa147457df96f6e0ce31b165ffff90241e4662eee004330131c153041adcac23d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio9559.exe

        Filesize

        364KB

        MD5

        3f46fa7b5fa9cd17887ec72ae04df3fe

        SHA1

        fd5e1d191e45da85105355bb00a3d3f85e877e8e

        SHA256

        f55d72c64d0ad57aacac2ed28a1a7e0486e65c910e3ff27bb6b200c2ba9f455b

        SHA512

        3521926296f1a595c72b446128e664538cb71b7fbb762eb00dfabc7627b21a6aa147457df96f6e0ce31b165ffff90241e4662eee004330131c153041adcac23d

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8806.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8806.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0316.exe

        Filesize

        363KB

        MD5

        2ffc9ea86c67818d053013435877d0e2

        SHA1

        d282513c7aa5424a34b4be66a9f0982ad3e320d3

        SHA256

        dd043a043759591cec511139fe265cec5b444b2d085b80b76df98d2d7b580938

        SHA512

        8cc3d5a6c295fdbd3b346d059818372bee148a1cf13e3ef801cabc5a673250ea35c84ce8d9fb5b10758b146fb5b873b7cb2d7a83b2576934bae689a13dfd5fdb

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu0316.exe

        Filesize

        363KB

        MD5

        2ffc9ea86c67818d053013435877d0e2

        SHA1

        d282513c7aa5424a34b4be66a9f0982ad3e320d3

        SHA256

        dd043a043759591cec511139fe265cec5b444b2d085b80b76df98d2d7b580938

        SHA512

        8cc3d5a6c295fdbd3b346d059818372bee148a1cf13e3ef801cabc5a673250ea35c84ce8d9fb5b10758b146fb5b873b7cb2d7a83b2576934bae689a13dfd5fdb

      • memory/892-240-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-1114-0x0000000005B10000-0x0000000005C1A000-memory.dmp

        Filesize

        1.0MB

      • memory/892-1127-0x0000000007240000-0x0000000007290000-memory.dmp

        Filesize

        320KB

      • memory/892-1126-0x00000000071B0000-0x0000000007226000-memory.dmp

        Filesize

        472KB

      • memory/892-1125-0x0000000006A00000-0x0000000006F2C000-memory.dmp

        Filesize

        5.2MB

      • memory/892-1124-0x0000000006820000-0x00000000069E2000-memory.dmp

        Filesize

        1.8MB

      • memory/892-1123-0x0000000006000000-0x0000000006066000-memory.dmp

        Filesize

        408KB

      • memory/892-1122-0x0000000005F60000-0x0000000005FF2000-memory.dmp

        Filesize

        584KB

      • memory/892-1121-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-1120-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-1119-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-1117-0x0000000005C70000-0x0000000005CAC000-memory.dmp

        Filesize

        240KB

      • memory/892-1116-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-1115-0x0000000005C50000-0x0000000005C62000-memory.dmp

        Filesize

        72KB

      • memory/892-1113-0x00000000054A0000-0x0000000005AB8000-memory.dmp

        Filesize

        6.1MB

      • memory/892-238-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-236-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-234-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-231-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-232-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-230-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-227-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-228-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/892-225-0x0000000000730000-0x000000000077B000-memory.dmp

        Filesize

        300KB

      • memory/892-203-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-204-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-206-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-208-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-210-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-212-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-216-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-214-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-218-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-220-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-222-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/892-224-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/1332-1134-0x0000000005420000-0x0000000005430000-memory.dmp

        Filesize

        64KB

      • memory/1332-1133-0x0000000000810000-0x0000000000842000-memory.dmp

        Filesize

        200KB

      • memory/2856-154-0x0000000000070000-0x000000000007A000-memory.dmp

        Filesize

        40KB

      • memory/4688-182-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-178-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-194-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4688-193-0x0000000000400000-0x000000000071D000-memory.dmp

        Filesize

        3.1MB

      • memory/4688-192-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-190-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-161-0x0000000004E50000-0x00000000053F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4688-188-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-164-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4688-186-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-184-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-162-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4688-180-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-195-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4688-176-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-174-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-172-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-170-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-168-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-166-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-165-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/4688-160-0x0000000000720000-0x000000000074D000-memory.dmp

        Filesize

        180KB

      • memory/4688-196-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4688-198-0x0000000000400000-0x000000000071D000-memory.dmp

        Filesize

        3.1MB

      • memory/4688-163-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB