Analysis

  • max time kernel
    56s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 23:49

General

  • Target

    c1e8f39e4f2871e2dc1f84d9d5dce8f1a5d8c925e361702c8ff87be3388474f2.exe

  • Size

    546KB

  • MD5

    01a1b7db759a9eb50a65e4bbd06f44e4

  • SHA1

    0d1333096296d9a6d0167a6ef0e960932da9911c

  • SHA256

    c1e8f39e4f2871e2dc1f84d9d5dce8f1a5d8c925e361702c8ff87be3388474f2

  • SHA512

    410f34dab91f95c81c3d18b2c40e418a2792ebd1e3ecfaa16798662210c14a7d16886ef605c1eaac9a26ba4f3960ba975d6bf67ce7add343c164d106fd146c47

  • SSDEEP

    12288:iMrCy90KXW//f8BxbghZuyKF7cOb85jLTGH2A6NGkNV:8yjeYxbg+b7p85fG2AFkNV

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1e8f39e4f2871e2dc1f84d9d5dce8f1a5d8c925e361702c8ff87be3388474f2.exe
    "C:\Users\Admin\AppData\Local\Temp\c1e8f39e4f2871e2dc1f84d9d5dce8f1a5d8c925e361702c8ff87be3388474f2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2476.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3214.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3214.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si360110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si360110.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si360110.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si360110.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2476.exe
    Filesize

    404KB

    MD5

    ec758942f4f8962256265081d928a6e1

    SHA1

    bb1da6c1163d94289576a4f18446af8f961edc72

    SHA256

    70b4a19f957a418e2f5c04738344e8931f879409bf6c32fae27adc2970f8c420

    SHA512

    4bf4b6d562160ece2740475d877335c89e507c61d441e645010b372f1d80e679459b1e2da97343b0a0e70106a9df767dee6974097aaea62b550f77406ec85518

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2476.exe
    Filesize

    404KB

    MD5

    ec758942f4f8962256265081d928a6e1

    SHA1

    bb1da6c1163d94289576a4f18446af8f961edc72

    SHA256

    70b4a19f957a418e2f5c04738344e8931f879409bf6c32fae27adc2970f8c420

    SHA512

    4bf4b6d562160ece2740475d877335c89e507c61d441e645010b372f1d80e679459b1e2da97343b0a0e70106a9df767dee6974097aaea62b550f77406ec85518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3214.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3214.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe
    Filesize

    358KB

    MD5

    8c924b4f3ff9abee6b8175f3495b067d

    SHA1

    e71c9689f8453b42645db7b9c63f99b17640da63

    SHA256

    df8ae1737c09d22b282aff048c5cf9c96f4882a81724780ebf9e25eae249c6c6

    SHA512

    66af9a69b1c9beb817b7f0a57b228db3aae472636bc79020cb697d6ba14a38f5cb67c199426b89f29c3c103ac6ba961eb2b21294e8fdf7c1efe3c68b0036a502

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe
    Filesize

    358KB

    MD5

    8c924b4f3ff9abee6b8175f3495b067d

    SHA1

    e71c9689f8453b42645db7b9c63f99b17640da63

    SHA256

    df8ae1737c09d22b282aff048c5cf9c96f4882a81724780ebf9e25eae249c6c6

    SHA512

    66af9a69b1c9beb817b7f0a57b228db3aae472636bc79020cb697d6ba14a38f5cb67c199426b89f29c3c103ac6ba961eb2b21294e8fdf7c1efe3c68b0036a502

  • memory/3680-135-0x0000000000470000-0x000000000047A000-memory.dmp
    Filesize

    40KB

  • memory/4296-1075-0x00000000009D0000-0x0000000000A02000-memory.dmp
    Filesize

    200KB

  • memory/4296-1076-0x00000000052D0000-0x000000000531B000-memory.dmp
    Filesize

    300KB

  • memory/4296-1077-0x0000000005640000-0x0000000005650000-memory.dmp
    Filesize

    64KB

  • memory/4908-176-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-190-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-144-0x0000000000720000-0x000000000076B000-memory.dmp
    Filesize

    300KB

  • memory/4908-145-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4908-146-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4908-147-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-148-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-150-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-152-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-154-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-156-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-158-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-160-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-162-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-164-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-166-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-168-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-170-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-172-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-174-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-142-0x0000000004E50000-0x000000000534E000-memory.dmp
    Filesize

    5.0MB

  • memory/4908-178-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-180-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-182-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-184-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-186-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-188-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-143-0x0000000004C90000-0x0000000004CD4000-memory.dmp
    Filesize

    272KB

  • memory/4908-192-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-194-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-196-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-198-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-200-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-202-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-204-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-206-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-208-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-210-0x0000000004C90000-0x0000000004CCE000-memory.dmp
    Filesize

    248KB

  • memory/4908-1053-0x0000000005350000-0x0000000005956000-memory.dmp
    Filesize

    6.0MB

  • memory/4908-1054-0x0000000005960000-0x0000000005A6A000-memory.dmp
    Filesize

    1.0MB

  • memory/4908-1055-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
    Filesize

    72KB

  • memory/4908-1056-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4908-1057-0x0000000004DF0000-0x0000000004E2E000-memory.dmp
    Filesize

    248KB

  • memory/4908-1058-0x0000000005B70000-0x0000000005BBB000-memory.dmp
    Filesize

    300KB

  • memory/4908-1060-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4908-1061-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4908-1062-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4908-1063-0x0000000005D00000-0x0000000005D92000-memory.dmp
    Filesize

    584KB

  • memory/4908-1064-0x0000000005DA0000-0x0000000005E06000-memory.dmp
    Filesize

    408KB

  • memory/4908-1065-0x00000000065F0000-0x0000000006666000-memory.dmp
    Filesize

    472KB

  • memory/4908-141-0x00000000024D0000-0x0000000002516000-memory.dmp
    Filesize

    280KB

  • memory/4908-1066-0x0000000006670000-0x00000000066C0000-memory.dmp
    Filesize

    320KB

  • memory/4908-1067-0x00000000066D0000-0x0000000006892000-memory.dmp
    Filesize

    1.8MB

  • memory/4908-1068-0x00000000068B0000-0x0000000006DDC000-memory.dmp
    Filesize

    5.2MB

  • memory/4908-1069-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB