Analysis

  • max time kernel
    52s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 21:30

General

  • Target

    f7af7dd96ac552a173e3f9918954637331e982a3c9da667a6b0d9862c7bf634c.exe

  • Size

    544KB

  • MD5

    f381eadda868dfe259b72be448beaf93

  • SHA1

    f4e8c5f6052d1965e3e00daee08fa8d746180c39

  • SHA256

    f7af7dd96ac552a173e3f9918954637331e982a3c9da667a6b0d9862c7bf634c

  • SHA512

    73ac39fde0d6312d3e6e7b2fd5966fd437c46daea49cde2b71f173ded3036947b856aabeb7bab48522090319b8b8fc7823ea942329947874d6861696a73d7012

  • SSDEEP

    12288:2Mrsy90JnRXejC5MQ3fw0ObS/qgU5MLBwJUZZTdXHbkJnFKw:uyy1LdIMAMtpFdX7kJFKw

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7af7dd96ac552a173e3f9918954637331e982a3c9da667a6b0d9862c7bf634c.exe
    "C:\Users\Admin\AppData\Local\Temp\f7af7dd96ac552a173e3f9918954637331e982a3c9da667a6b0d9862c7bf634c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2411.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2411.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7682.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7682.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4093.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4093.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si201584.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si201584.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4380

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si201584.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si201584.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2411.exe
    Filesize

    402KB

    MD5

    573e086dd38d72d3b37497b464b0aee4

    SHA1

    a3fd0be5de3fd905909e851b25d5441797f88615

    SHA256

    6c6898a6493bc47729f1490de0d68c3ec258b6494b330bb961f0f692c7ee48cc

    SHA512

    aba692a57d9a39782400f81278aa773c3b9201c9c8b73ee31eae916ed7859a653c5b3ef2490411f19ea232759c25548bfb4a5e8a928a3681bec56a6058cdeccf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2411.exe
    Filesize

    402KB

    MD5

    573e086dd38d72d3b37497b464b0aee4

    SHA1

    a3fd0be5de3fd905909e851b25d5441797f88615

    SHA256

    6c6898a6493bc47729f1490de0d68c3ec258b6494b330bb961f0f692c7ee48cc

    SHA512

    aba692a57d9a39782400f81278aa773c3b9201c9c8b73ee31eae916ed7859a653c5b3ef2490411f19ea232759c25548bfb4a5e8a928a3681bec56a6058cdeccf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7682.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7682.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4093.exe
    Filesize

    349KB

    MD5

    b21ae3df0123fcaab478672b0fa2744e

    SHA1

    3423b78b1f51e215462ae7eb3eac49d8c9f51498

    SHA256

    d84fcfc7f3adda33a20589b9b8fa40f5d3eec96d9398ea5da23bcbbd73535508

    SHA512

    4ae30181d71d85378bae9333ea9646186eb344489673c3990607dd6d6817f24d0417078a1c8619f01e8e88f891f23918393fd86d8360f25cd3ba0faee6d84a54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4093.exe
    Filesize

    349KB

    MD5

    b21ae3df0123fcaab478672b0fa2744e

    SHA1

    3423b78b1f51e215462ae7eb3eac49d8c9f51498

    SHA256

    d84fcfc7f3adda33a20589b9b8fa40f5d3eec96d9398ea5da23bcbbd73535508

    SHA512

    4ae30181d71d85378bae9333ea9646186eb344489673c3990607dd6d6817f24d0417078a1c8619f01e8e88f891f23918393fd86d8360f25cd3ba0faee6d84a54

  • memory/1740-135-0x00000000003B0000-0x00000000003BA000-memory.dmp
    Filesize

    40KB

  • memory/2044-141-0x00000000022C0000-0x0000000002306000-memory.dmp
    Filesize

    280KB

  • memory/2044-142-0x0000000004E00000-0x00000000052FE000-memory.dmp
    Filesize

    5.0MB

  • memory/2044-143-0x00000000029C0000-0x0000000002A04000-memory.dmp
    Filesize

    272KB

  • memory/2044-144-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-145-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-147-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-149-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-151-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-153-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-154-0x0000000000810000-0x000000000085B000-memory.dmp
    Filesize

    300KB

  • memory/2044-156-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-157-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-159-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-160-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-163-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-161-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-165-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-167-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-169-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-171-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-173-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-175-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-179-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-177-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-181-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-183-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-185-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-191-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-193-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-199-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-209-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-211-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-207-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-205-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-203-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-201-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-197-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-195-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-189-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-187-0x00000000029C0000-0x00000000029FE000-memory.dmp
    Filesize

    248KB

  • memory/2044-1054-0x0000000005910000-0x0000000005F16000-memory.dmp
    Filesize

    6.0MB

  • memory/2044-1055-0x0000000005300000-0x000000000540A000-memory.dmp
    Filesize

    1.0MB

  • memory/2044-1056-0x0000000002A90000-0x0000000002AA2000-memory.dmp
    Filesize

    72KB

  • memory/2044-1057-0x0000000005410000-0x000000000544E000-memory.dmp
    Filesize

    248KB

  • memory/2044-1058-0x0000000005560000-0x00000000055AB000-memory.dmp
    Filesize

    300KB

  • memory/2044-1059-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-1061-0x00000000056F0000-0x0000000005756000-memory.dmp
    Filesize

    408KB

  • memory/2044-1062-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-1063-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-1065-0x00000000063F0000-0x0000000006482000-memory.dmp
    Filesize

    584KB

  • memory/2044-1064-0x0000000002390000-0x00000000023A0000-memory.dmp
    Filesize

    64KB

  • memory/2044-1066-0x0000000006590000-0x0000000006606000-memory.dmp
    Filesize

    472KB

  • memory/2044-1067-0x0000000006610000-0x0000000006660000-memory.dmp
    Filesize

    320KB

  • memory/2044-1068-0x00000000066A0000-0x0000000006862000-memory.dmp
    Filesize

    1.8MB

  • memory/2044-1069-0x0000000006870000-0x0000000006D9C000-memory.dmp
    Filesize

    5.2MB

  • memory/4380-1075-0x00000000004A0000-0x00000000004D2000-memory.dmp
    Filesize

    200KB

  • memory/4380-1076-0x0000000004EE0000-0x0000000004F2B000-memory.dmp
    Filesize

    300KB

  • memory/4380-1077-0x0000000005080000-0x0000000005090000-memory.dmp
    Filesize

    64KB