Analysis

  • max time kernel
    55s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 21:56

General

  • Target

    7b62a16ffee1d8f8a15e810a180d242061969823abe58d24e9c5b96f6aa66e75.exe

  • Size

    544KB

  • MD5

    3ce55930fe61cb0682669b6916416f15

  • SHA1

    0dc697e29df107aa4a6c52b5df29590393136876

  • SHA256

    7b62a16ffee1d8f8a15e810a180d242061969823abe58d24e9c5b96f6aa66e75

  • SHA512

    cae433b1bbc9fb792d740fb9e652e6cd14e9d82f4a39920c6832006837f5dff7824e823ddb0a3af732b751e41090f89eff198a1034b3307187f14329b5d07aab

  • SSDEEP

    12288:dMrKy90o6PVwlu7WBff10O3VXqgUcML7wtl/+NHwt4YaA4:3yj+m2WBVDlMfmINQte

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b62a16ffee1d8f8a15e810a180d242061969823abe58d24e9c5b96f6aa66e75.exe
    "C:\Users\Admin\AppData\Local\Temp\7b62a16ffee1d8f8a15e810a180d242061969823abe58d24e9c5b96f6aa66e75.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1866.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1866.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0513.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0513.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0259.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0259.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si288374.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si288374.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1084

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si288374.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si288374.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1866.exe
    Filesize

    402KB

    MD5

    28c01818914778c2af663cb6497a0d1c

    SHA1

    346b10f44cb6ebfa5a1290c8a3483d9a1ac9e0f2

    SHA256

    6e9b3dd085ea9bc367d9754fe1d2175107c79f9efb735c6ee696f95b8e8b443f

    SHA512

    66236009b68cdea76a8eeaac704d8c2b4b485373f8e11fda60351fcfeb8d25a3d1f7524911a45592287510e54269fb43133164cb662782e3fb629b2182f8e4bd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1866.exe
    Filesize

    402KB

    MD5

    28c01818914778c2af663cb6497a0d1c

    SHA1

    346b10f44cb6ebfa5a1290c8a3483d9a1ac9e0f2

    SHA256

    6e9b3dd085ea9bc367d9754fe1d2175107c79f9efb735c6ee696f95b8e8b443f

    SHA512

    66236009b68cdea76a8eeaac704d8c2b4b485373f8e11fda60351fcfeb8d25a3d1f7524911a45592287510e54269fb43133164cb662782e3fb629b2182f8e4bd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0513.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0513.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0259.exe
    Filesize

    349KB

    MD5

    48b3f1fdd7211ddb0962fb74a3df5ea2

    SHA1

    9756b8e0dda8fc7ec0ac3a7e7ba9a28e5eaafee9

    SHA256

    746952d3e74994fc25d61938df2db4c37115fbbbb7b9c490b1f47e89cb3d7929

    SHA512

    1c5322e10ea275929a8d3f52044cb6f90ac85fa2af60a94374eb31f2626127a4987895c811155f3193fd66baddeec542acbeb0e2a871f671ed3241658f9fadf7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0259.exe
    Filesize

    349KB

    MD5

    48b3f1fdd7211ddb0962fb74a3df5ea2

    SHA1

    9756b8e0dda8fc7ec0ac3a7e7ba9a28e5eaafee9

    SHA256

    746952d3e74994fc25d61938df2db4c37115fbbbb7b9c490b1f47e89cb3d7929

    SHA512

    1c5322e10ea275929a8d3f52044cb6f90ac85fa2af60a94374eb31f2626127a4987895c811155f3193fd66baddeec542acbeb0e2a871f671ed3241658f9fadf7

  • memory/1084-1071-0x00000000005A0000-0x00000000005D2000-memory.dmp
    Filesize

    200KB

  • memory/1084-1072-0x0000000004FE0000-0x000000000502B000-memory.dmp
    Filesize

    300KB

  • memory/1084-1073-0x00000000050F0000-0x0000000005100000-memory.dmp
    Filesize

    64KB

  • memory/2080-131-0x0000000000420000-0x000000000042A000-memory.dmp
    Filesize

    40KB

  • memory/3888-172-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-186-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-141-0x0000000004C90000-0x0000000004CD4000-memory.dmp
    Filesize

    272KB

  • memory/3888-140-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB

  • memory/3888-142-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB

  • memory/3888-143-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-144-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-146-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-148-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-150-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-152-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-154-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-156-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-158-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-160-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-162-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-164-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-166-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-168-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-174-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-138-0x0000000004C10000-0x0000000004C56000-memory.dmp
    Filesize

    280KB

  • memory/3888-170-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-176-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-178-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-180-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-182-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-184-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-139-0x0000000004D90000-0x000000000528E000-memory.dmp
    Filesize

    5.0MB

  • memory/3888-188-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-190-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-192-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-194-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-196-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-198-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-200-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-202-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-204-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-206-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/3888-1049-0x00000000058A0000-0x0000000005EA6000-memory.dmp
    Filesize

    6.0MB

  • memory/3888-1050-0x00000000052B0000-0x00000000053BA000-memory.dmp
    Filesize

    1.0MB

  • memory/3888-1051-0x00000000053F0000-0x0000000005402000-memory.dmp
    Filesize

    72KB

  • memory/3888-1052-0x0000000005410000-0x000000000544E000-memory.dmp
    Filesize

    248KB

  • memory/3888-1053-0x0000000005560000-0x00000000055AB000-memory.dmp
    Filesize

    300KB

  • memory/3888-1054-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB

  • memory/3888-1056-0x00000000056F0000-0x0000000005782000-memory.dmp
    Filesize

    584KB

  • memory/3888-1057-0x0000000005790000-0x00000000057F6000-memory.dmp
    Filesize

    408KB

  • memory/3888-1058-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB

  • memory/3888-1059-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB

  • memory/3888-1060-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB

  • memory/3888-1061-0x0000000006470000-0x00000000064E6000-memory.dmp
    Filesize

    472KB

  • memory/3888-137-0x0000000000830000-0x000000000087B000-memory.dmp
    Filesize

    300KB

  • memory/3888-1062-0x0000000006510000-0x0000000006560000-memory.dmp
    Filesize

    320KB

  • memory/3888-1063-0x0000000006920000-0x0000000006AE2000-memory.dmp
    Filesize

    1.8MB

  • memory/3888-1064-0x0000000006AF0000-0x000000000701C000-memory.dmp
    Filesize

    5.2MB

  • memory/3888-1065-0x0000000004D80000-0x0000000004D90000-memory.dmp
    Filesize

    64KB