Analysis

  • max time kernel
    47s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2023, 22:17

General

  • Target

    fffd63f29209fc6d199467cb89a4de78fe3a85174c5d15d6f856fdaca00e8992.exe

  • Size

    725KB

  • MD5

    fc0dbe81d5382d4a7e4abd4bbf53a1aa

  • SHA1

    6fe9876a6f62c12e58034acb78cc60853c5850c3

  • SHA256

    fffd63f29209fc6d199467cb89a4de78fe3a85174c5d15d6f856fdaca00e8992

  • SHA512

    6e60ed4a3c569afad55958ca15d68699100604ae8e07e40ef992a06c560d112263acfc564a726e917376cd02ad9340ee09bae12eafd2b6aa77571cf3d1f221e7

  • SSDEEP

    12288:pcjNxg9Qtxdm1OpNTqZbKmwwekhcXqRTMT4zw34Oqf7uMS5ZabR4xe:pn9QHdLpNYwwekhcu4qf7afab9

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fffd63f29209fc6d199467cb89a4de78fe3a85174c5d15d6f856fdaca00e8992.exe
    "C:\Users\Admin\AppData\Local\Temp\fffd63f29209fc6d199467cb89a4de78fe3a85174c5d15d6f856fdaca00e8992.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigk1403.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigk1403.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337670.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337670.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr145884.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr145884.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1876

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr145884.exe

          Filesize

          175KB

          MD5

          f50023c2c4bad1bbf51efde95c575b28

          SHA1

          9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

          SHA256

          a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

          SHA512

          d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr145884.exe

          Filesize

          175KB

          MD5

          f50023c2c4bad1bbf51efde95c575b28

          SHA1

          9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

          SHA256

          a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

          SHA512

          d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigk1403.exe

          Filesize

          412KB

          MD5

          019ee7f4c5846a44fe6d6797cc7fa04f

          SHA1

          811f1e26e6bef53cfca9563b73c5d5acfc722e64

          SHA256

          2fbc66bd6bd00943da78ae655d5ed521096b32247dafe994137771335ef22334

          SHA512

          a3558a9b6aa5f198ac56bea427457fbf18eae55570789915582e6718e70f0ed0adbcd52095533b95c9170f73561a344c7341ce5fe92f0fb90888137b3f605515

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigk1403.exe

          Filesize

          412KB

          MD5

          019ee7f4c5846a44fe6d6797cc7fa04f

          SHA1

          811f1e26e6bef53cfca9563b73c5d5acfc722e64

          SHA256

          2fbc66bd6bd00943da78ae655d5ed521096b32247dafe994137771335ef22334

          SHA512

          a3558a9b6aa5f198ac56bea427457fbf18eae55570789915582e6718e70f0ed0adbcd52095533b95c9170f73561a344c7341ce5fe92f0fb90888137b3f605515

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337670.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337670.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe

          Filesize

          386KB

          MD5

          cd2b5a7d7a4e918725a07c42fb34706b

          SHA1

          6fc73eeeaa8cb00ea3ce516853431e42f18c1b4a

          SHA256

          d10c7501dd8bd2476df4dd0e68a5d3890340528238ef2d225a942fbd683880ec

          SHA512

          4252e3537f506c1a02920376d0604e33ac7454993ce865aee4d5965437e07bd937c9b7351dbd9cce3fd3373790136f060c6b08f1729ba9ca0f3d8f5ae7d0da43

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe

          Filesize

          386KB

          MD5

          cd2b5a7d7a4e918725a07c42fb34706b

          SHA1

          6fc73eeeaa8cb00ea3ce516853431e42f18c1b4a

          SHA256

          d10c7501dd8bd2476df4dd0e68a5d3890340528238ef2d225a942fbd683880ec

          SHA512

          4252e3537f506c1a02920376d0604e33ac7454993ce865aee4d5965437e07bd937c9b7351dbd9cce3fd3373790136f060c6b08f1729ba9ca0f3d8f5ae7d0da43

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe

          Filesize

          386KB

          MD5

          cd2b5a7d7a4e918725a07c42fb34706b

          SHA1

          6fc73eeeaa8cb00ea3ce516853431e42f18c1b4a

          SHA256

          d10c7501dd8bd2476df4dd0e68a5d3890340528238ef2d225a942fbd683880ec

          SHA512

          4252e3537f506c1a02920376d0604e33ac7454993ce865aee4d5965437e07bd937c9b7351dbd9cce3fd3373790136f060c6b08f1729ba9ca0f3d8f5ae7d0da43

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr145884.exe

          Filesize

          175KB

          MD5

          f50023c2c4bad1bbf51efde95c575b28

          SHA1

          9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

          SHA256

          a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

          SHA512

          d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zigk1403.exe

          Filesize

          412KB

          MD5

          019ee7f4c5846a44fe6d6797cc7fa04f

          SHA1

          811f1e26e6bef53cfca9563b73c5d5acfc722e64

          SHA256

          2fbc66bd6bd00943da78ae655d5ed521096b32247dafe994137771335ef22334

          SHA512

          a3558a9b6aa5f198ac56bea427457fbf18eae55570789915582e6718e70f0ed0adbcd52095533b95c9170f73561a344c7341ce5fe92f0fb90888137b3f605515

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zigk1403.exe

          Filesize

          412KB

          MD5

          019ee7f4c5846a44fe6d6797cc7fa04f

          SHA1

          811f1e26e6bef53cfca9563b73c5d5acfc722e64

          SHA256

          2fbc66bd6bd00943da78ae655d5ed521096b32247dafe994137771335ef22334

          SHA512

          a3558a9b6aa5f198ac56bea427457fbf18eae55570789915582e6718e70f0ed0adbcd52095533b95c9170f73561a344c7341ce5fe92f0fb90888137b3f605515

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337670.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe

          Filesize

          386KB

          MD5

          cd2b5a7d7a4e918725a07c42fb34706b

          SHA1

          6fc73eeeaa8cb00ea3ce516853431e42f18c1b4a

          SHA256

          d10c7501dd8bd2476df4dd0e68a5d3890340528238ef2d225a942fbd683880ec

          SHA512

          4252e3537f506c1a02920376d0604e33ac7454993ce865aee4d5965437e07bd937c9b7351dbd9cce3fd3373790136f060c6b08f1729ba9ca0f3d8f5ae7d0da43

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe

          Filesize

          386KB

          MD5

          cd2b5a7d7a4e918725a07c42fb34706b

          SHA1

          6fc73eeeaa8cb00ea3ce516853431e42f18c1b4a

          SHA256

          d10c7501dd8bd2476df4dd0e68a5d3890340528238ef2d225a942fbd683880ec

          SHA512

          4252e3537f506c1a02920376d0604e33ac7454993ce865aee4d5965437e07bd937c9b7351dbd9cce3fd3373790136f060c6b08f1729ba9ca0f3d8f5ae7d0da43

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142932.exe

          Filesize

          386KB

          MD5

          cd2b5a7d7a4e918725a07c42fb34706b

          SHA1

          6fc73eeeaa8cb00ea3ce516853431e42f18c1b4a

          SHA256

          d10c7501dd8bd2476df4dd0e68a5d3890340528238ef2d225a942fbd683880ec

          SHA512

          4252e3537f506c1a02920376d0604e33ac7454993ce865aee4d5965437e07bd937c9b7351dbd9cce3fd3373790136f060c6b08f1729ba9ca0f3d8f5ae7d0da43

        • memory/1244-54-0x0000000000230000-0x00000000002B2000-memory.dmp

          Filesize

          520KB

        • memory/1244-76-0x0000000000320000-0x00000000003AC000-memory.dmp

          Filesize

          560KB

        • memory/1244-75-0x0000000000400000-0x0000000002BE3000-memory.dmp

          Filesize

          39.9MB

        • memory/1244-55-0x0000000000320000-0x00000000003AC000-memory.dmp

          Filesize

          560KB

        • memory/1584-74-0x0000000001050000-0x000000000105A000-memory.dmp

          Filesize

          40KB

        • memory/1740-106-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-130-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-95-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-97-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-99-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-102-0x0000000000240000-0x000000000028B000-memory.dmp

          Filesize

          300KB

        • memory/1740-101-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-103-0x0000000007350000-0x0000000007390000-memory.dmp

          Filesize

          256KB

        • memory/1740-105-0x0000000007350000-0x0000000007390000-memory.dmp

          Filesize

          256KB

        • memory/1740-90-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-108-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-110-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-112-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-114-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-116-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-118-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-120-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-124-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-122-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-126-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-128-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-92-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-132-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-134-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-136-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-138-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-140-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-142-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-144-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-146-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-148-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-150-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-152-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-999-0x0000000007350000-0x0000000007390000-memory.dmp

          Filesize

          256KB

        • memory/1740-1002-0x0000000007350000-0x0000000007390000-memory.dmp

          Filesize

          256KB

        • memory/1740-1003-0x0000000007350000-0x0000000007390000-memory.dmp

          Filesize

          256KB

        • memory/1740-1004-0x0000000007350000-0x0000000007390000-memory.dmp

          Filesize

          256KB

        • memory/1740-89-0x00000000049B0000-0x00000000049EF000-memory.dmp

          Filesize

          252KB

        • memory/1740-88-0x00000000049B0000-0x00000000049F4000-memory.dmp

          Filesize

          272KB

        • memory/1740-87-0x0000000002EE0000-0x0000000002F26000-memory.dmp

          Filesize

          280KB

        • memory/1876-1011-0x0000000001100000-0x0000000001132000-memory.dmp

          Filesize

          200KB

        • memory/1876-1012-0x0000000001080000-0x00000000010C0000-memory.dmp

          Filesize

          256KB