Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/03/2023, 20:53

General

  • Target

    0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe

  • Size

    908KB

  • MD5

    4cf914a08c2b997981cbf48c09ecca1a

  • SHA1

    02ae8d2f526de4ec8de960d01a578c768a595152

  • SHA256

    0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb

  • SHA512

    562c42c03ad1c81f1b07d9870f1a92696158bcadc4fcda7d331532ff26d3bd71957e2564bc8ef78e812d3211c484da0284c28064aa1cf44e13edc5ef2fda2c44

  • SSDEEP

    24576:kyu9/k5tERYeBq6QnprkEm11C7j1yHrIwlx:zuNsEZzJ184

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

polo

C2

193.233.20.31:4125

Attributes
  • auth_value

    f1a1b1041a864e0f1f788d42ececa8b3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\0eda8617d518e4f31b8e1ac4fcc15ba605aebd85e9a17b45fb06fd609dd20dbb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5288.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5288.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio7422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio7422.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4934.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4934.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4376
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5923.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5923.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWJ68s29.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWJ68s29.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542526.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542526.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3520

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542526.exe

          Filesize

          175KB

          MD5

          44a26d7004f8b65e1a8bac0ccac86d6a

          SHA1

          30b583c2c04c1167703ae255b4d44b96b411c8ff

          SHA256

          37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

          SHA512

          17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si542526.exe

          Filesize

          175KB

          MD5

          44a26d7004f8b65e1a8bac0ccac86d6a

          SHA1

          30b583c2c04c1167703ae255b4d44b96b411c8ff

          SHA256

          37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

          SHA512

          17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5288.exe

          Filesize

          765KB

          MD5

          b333133b3670f8d256d1e73b1cf5a9d4

          SHA1

          d4fa31c593a88567560a54e819d623327bffdecd

          SHA256

          7aa094ab5b1ab197151ea65fcd739c4cbcf7919d5d7da4eb5d85dd037f2abe1f

          SHA512

          7858a1f70802442d2ab7b804b062b12d5218c668fdec8366d3913d2fc918a9cb5ca1227961e0cd5c1b51e0f933e9d1f2336593d47284f5445a4b303901eb068f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5288.exe

          Filesize

          765KB

          MD5

          b333133b3670f8d256d1e73b1cf5a9d4

          SHA1

          d4fa31c593a88567560a54e819d623327bffdecd

          SHA256

          7aa094ab5b1ab197151ea65fcd739c4cbcf7919d5d7da4eb5d85dd037f2abe1f

          SHA512

          7858a1f70802442d2ab7b804b062b12d5218c668fdec8366d3913d2fc918a9cb5ca1227961e0cd5c1b51e0f933e9d1f2336593d47284f5445a4b303901eb068f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWJ68s29.exe

          Filesize

          457KB

          MD5

          c95516cffaedd477695fda93372e5516

          SHA1

          6318d5b0e9ac25c5802548c6e8bd4bb671c0e969

          SHA256

          76772979c090bf4bb58c40fc36d412c8ace51cc15bc8ce9a04abc38604da1de6

          SHA512

          27c60e282719f5878384a2d5f1f2fcae2fe750d33dfb4e942b4fd24fd3554103f511dbd1a7f78c3ea58db0889a697fac49c4f6323f48d5adf3777fcc1f8cde2f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWJ68s29.exe

          Filesize

          457KB

          MD5

          c95516cffaedd477695fda93372e5516

          SHA1

          6318d5b0e9ac25c5802548c6e8bd4bb671c0e969

          SHA256

          76772979c090bf4bb58c40fc36d412c8ace51cc15bc8ce9a04abc38604da1de6

          SHA512

          27c60e282719f5878384a2d5f1f2fcae2fe750d33dfb4e942b4fd24fd3554103f511dbd1a7f78c3ea58db0889a697fac49c4f6323f48d5adf3777fcc1f8cde2f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio7422.exe

          Filesize

          379KB

          MD5

          4e13d1ddcb8557289a215ad4aaaba201

          SHA1

          414fa7561a12399057864682e9dff39f6ce283e6

          SHA256

          af764fa6b1d9ed7733a64dc1cd481054b1f453df7fad6233f55af5120a9eadb1

          SHA512

          9ddc029aa79944ff0b8dcb2c1f8e80de2a678e06019b56bb64ea01f1fe6e5911b2957577e14f447726bd457f285fd360b849eee33708836804bbd8da9fcc992e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio7422.exe

          Filesize

          379KB

          MD5

          4e13d1ddcb8557289a215ad4aaaba201

          SHA1

          414fa7561a12399057864682e9dff39f6ce283e6

          SHA256

          af764fa6b1d9ed7733a64dc1cd481054b1f453df7fad6233f55af5120a9eadb1

          SHA512

          9ddc029aa79944ff0b8dcb2c1f8e80de2a678e06019b56bb64ea01f1fe6e5911b2957577e14f447726bd457f285fd360b849eee33708836804bbd8da9fcc992e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4934.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4934.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5923.exe

          Filesize

          399KB

          MD5

          83a9ba94b6db3597599b081c546111dc

          SHA1

          1aa9f1601a775d4fd98b08479bc13075d2f432dc

          SHA256

          3fead7ceb3d0877c87412e7477355168eea8e9f5f23bafce60d0b4f5b29081ca

          SHA512

          480e71ca80c048dc73077d65af2ab64e9d7c55e07443a023eac3bb15c5699482e045bc8b8e75f017667987a3948e839153447d7ddbcf1f31d93ef2b056101deb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu5923.exe

          Filesize

          399KB

          MD5

          83a9ba94b6db3597599b081c546111dc

          SHA1

          1aa9f1601a775d4fd98b08479bc13075d2f432dc

          SHA256

          3fead7ceb3d0877c87412e7477355168eea8e9f5f23bafce60d0b4f5b29081ca

          SHA512

          480e71ca80c048dc73077d65af2ab64e9d7c55e07443a023eac3bb15c5699482e045bc8b8e75f017667987a3948e839153447d7ddbcf1f31d93ef2b056101deb

        • memory/1976-1098-0x0000000005A40000-0x0000000006046000-memory.dmp

          Filesize

          6.0MB

        • memory/1976-1102-0x0000000004E60000-0x0000000004EAB000-memory.dmp

          Filesize

          300KB

        • memory/1976-1113-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-1112-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-1111-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-1110-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-1108-0x0000000006790000-0x0000000006CBC000-memory.dmp

          Filesize

          5.2MB

        • memory/1976-1107-0x00000000065C0000-0x0000000006782000-memory.dmp

          Filesize

          1.8MB

        • memory/1976-1106-0x0000000006530000-0x0000000006580000-memory.dmp

          Filesize

          320KB

        • memory/1976-1105-0x00000000064B0000-0x0000000006526000-memory.dmp

          Filesize

          472KB

        • memory/1976-1104-0x0000000006410000-0x00000000064A2000-memory.dmp

          Filesize

          584KB

        • memory/1976-1103-0x0000000005710000-0x0000000005776000-memory.dmp

          Filesize

          408KB

        • memory/1976-1101-0x00000000028C0000-0x00000000028FE000-memory.dmp

          Filesize

          248KB

        • memory/1976-1100-0x00000000028A0000-0x00000000028B2000-memory.dmp

          Filesize

          72KB

        • memory/1976-1099-0x0000000005430000-0x000000000553A000-memory.dmp

          Filesize

          1.0MB

        • memory/1976-225-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-223-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-221-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-219-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-217-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-215-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-213-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-211-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-209-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-186-0x0000000002350000-0x0000000002396000-memory.dmp

          Filesize

          280KB

        • memory/1976-187-0x0000000002540000-0x0000000002584000-memory.dmp

          Filesize

          272KB

        • memory/1976-189-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-188-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-191-0x0000000000740000-0x000000000078B000-memory.dmp

          Filesize

          300KB

        • memory/1976-192-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-193-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-196-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-198-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-199-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-195-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/1976-201-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-203-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-205-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/1976-207-0x0000000002540000-0x000000000257E000-memory.dmp

          Filesize

          248KB

        • memory/3520-1122-0x0000000005650000-0x0000000005660000-memory.dmp

          Filesize

          64KB

        • memory/3520-1121-0x0000000005650000-0x0000000005660000-memory.dmp

          Filesize

          64KB

        • memory/3520-1120-0x0000000005520000-0x000000000556B000-memory.dmp

          Filesize

          300KB

        • memory/3520-1119-0x0000000000AE0000-0x0000000000B12000-memory.dmp

          Filesize

          200KB

        • memory/4376-137-0x0000000000A40000-0x0000000000A4A000-memory.dmp

          Filesize

          40KB

        • memory/4388-163-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-155-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-173-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-171-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-144-0x0000000004DF0000-0x00000000052EE000-memory.dmp

          Filesize

          5.0MB

        • memory/4388-169-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-167-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-165-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-148-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4388-145-0x0000000002760000-0x0000000002778000-memory.dmp

          Filesize

          96KB

        • memory/4388-161-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-159-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-157-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-175-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-153-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-151-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-150-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-149-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4388-147-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4388-143-0x00000000025A0000-0x00000000025BA000-memory.dmp

          Filesize

          104KB

        • memory/4388-177-0x0000000002760000-0x0000000002772000-memory.dmp

          Filesize

          72KB

        • memory/4388-178-0x0000000000400000-0x0000000000726000-memory.dmp

          Filesize

          3.1MB

        • memory/4388-179-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4388-181-0x0000000000400000-0x0000000000726000-memory.dmp

          Filesize

          3.1MB

        • memory/4388-146-0x0000000000730000-0x000000000075D000-memory.dmp

          Filesize

          180KB