Analysis

  • max time kernel
    57s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 00:16

General

  • Target

    fbc3173865b508314532b4f8d2d1b0b6238fee38c8624dcf05d5316381ed5e46.exe

  • Size

    546KB

  • MD5

    06a9a5e5b3824f42f8193e07904d7995

  • SHA1

    3dae08a2d77a6fa08e6778b066c7c7418b604538

  • SHA256

    fbc3173865b508314532b4f8d2d1b0b6238fee38c8624dcf05d5316381ed5e46

  • SHA512

    19a753b4603479657e1634f90116108f523170cfd93fd4294dfc4813c107289477147c8511f11811ab61ffaf734ccb044af3652e279d8e0f7f2de8ed59ed6d84

  • SSDEEP

    12288:nMrDy90o6kvseQsQJWXyGZZNiPDync9tQwLEPGTT8+:syX6qTQs7yCP8rsGTl

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbc3173865b508314532b4f8d2d1b0b6238fee38c8624dcf05d5316381ed5e46.exe
    "C:\Users\Admin\AppData\Local\Temp\fbc3173865b508314532b4f8d2d1b0b6238fee38c8624dcf05d5316381ed5e46.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3923.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3923.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2047.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2047.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4895.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4895.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535673.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535673.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2176

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535673.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535673.exe
    Filesize

    175KB

    MD5

    41707338e1e2d868aa699ac0dd2e77b0

    SHA1

    36e0dfba09f9fb409faf0f9a99217d0d0c524b82

    SHA256

    8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

    SHA512

    80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3923.exe
    Filesize

    404KB

    MD5

    aacb989dcb149b166c933c852527499b

    SHA1

    2146e7014cf08159c8fc6cfa6b93f82f79e849e1

    SHA256

    257faecb28a4564240dc315e7576fd627230db2b3c746ec05ac95c46d97e536f

    SHA512

    e53307dcd63d3fca673be293db6cbe80efe4fdf4ee72d7b77aad8b915d95e02f6c4f2c9e61ab4055b9279b99aa47fb5b27b1e08c7fa837536cda5b02dee69fd6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3923.exe
    Filesize

    404KB

    MD5

    aacb989dcb149b166c933c852527499b

    SHA1

    2146e7014cf08159c8fc6cfa6b93f82f79e849e1

    SHA256

    257faecb28a4564240dc315e7576fd627230db2b3c746ec05ac95c46d97e536f

    SHA512

    e53307dcd63d3fca673be293db6cbe80efe4fdf4ee72d7b77aad8b915d95e02f6c4f2c9e61ab4055b9279b99aa47fb5b27b1e08c7fa837536cda5b02dee69fd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2047.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2047.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4895.exe
    Filesize

    358KB

    MD5

    830aaf429dc070ae5c3c9a975395184e

    SHA1

    06506991416cb5afebb0aa8d08473d315bfc6fbc

    SHA256

    b13f8b496a1eedfdc708db60f5b7c794003903fd693e22611990a9666de3462e

    SHA512

    dfe2cf5142126674090b7e73550087d9195292ce47aa4687d12806d58f2000733c1cfebff26af0a4cb3936867fb8fe042954d1e22521c9a1a03aae0fc292857c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4895.exe
    Filesize

    358KB

    MD5

    830aaf429dc070ae5c3c9a975395184e

    SHA1

    06506991416cb5afebb0aa8d08473d315bfc6fbc

    SHA256

    b13f8b496a1eedfdc708db60f5b7c794003903fd693e22611990a9666de3462e

    SHA512

    dfe2cf5142126674090b7e73550087d9195292ce47aa4687d12806d58f2000733c1cfebff26af0a4cb3936867fb8fe042954d1e22521c9a1a03aae0fc292857c

  • memory/2176-1071-0x0000000000090000-0x00000000000C2000-memory.dmp
    Filesize

    200KB

  • memory/2176-1072-0x0000000004AD0000-0x0000000004B1B000-memory.dmp
    Filesize

    300KB

  • memory/2176-1073-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4312-133-0x0000000000600000-0x000000000060A000-memory.dmp
    Filesize

    40KB

  • memory/4888-174-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-188-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-144-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
    Filesize

    64KB

  • memory/4888-143-0x00000000028B0000-0x00000000028F4000-memory.dmp
    Filesize

    272KB

  • memory/4888-142-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
    Filesize

    64KB

  • memory/4888-145-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-146-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-148-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-150-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-152-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-154-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-156-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-158-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-160-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-162-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-164-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-166-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-168-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-170-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-172-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-140-0x0000000004ED0000-0x00000000053CE000-memory.dmp
    Filesize

    5.0MB

  • memory/4888-176-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-178-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-180-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-186-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-184-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-182-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-141-0x0000000000880000-0x00000000008CB000-memory.dmp
    Filesize

    300KB

  • memory/4888-190-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-192-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-194-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-196-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-198-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-200-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-202-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-204-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-206-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-208-0x00000000028B0000-0x00000000028EE000-memory.dmp
    Filesize

    248KB

  • memory/4888-1051-0x00000000053D0000-0x00000000059D6000-memory.dmp
    Filesize

    6.0MB

  • memory/4888-1052-0x0000000004DB0000-0x0000000004EBA000-memory.dmp
    Filesize

    1.0MB

  • memory/4888-1053-0x0000000005A00000-0x0000000005A12000-memory.dmp
    Filesize

    72KB

  • memory/4888-1054-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
    Filesize

    64KB

  • memory/4888-1055-0x0000000005A20000-0x0000000005A5E000-memory.dmp
    Filesize

    248KB

  • memory/4888-1056-0x0000000005B70000-0x0000000005BBB000-memory.dmp
    Filesize

    300KB

  • memory/4888-1057-0x0000000005D00000-0x0000000005D66000-memory.dmp
    Filesize

    408KB

  • memory/4888-1058-0x00000000063F0000-0x0000000006482000-memory.dmp
    Filesize

    584KB

  • memory/4888-1060-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
    Filesize

    64KB

  • memory/4888-1061-0x00000000065B0000-0x0000000006772000-memory.dmp
    Filesize

    1.8MB

  • memory/4888-139-0x00000000022E0000-0x0000000002326000-memory.dmp
    Filesize

    280KB

  • memory/4888-1062-0x0000000006780000-0x0000000006CAC000-memory.dmp
    Filesize

    5.2MB

  • memory/4888-1063-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
    Filesize

    64KB

  • memory/4888-1064-0x0000000006F20000-0x0000000006F96000-memory.dmp
    Filesize

    472KB

  • memory/4888-1065-0x0000000006FA0000-0x0000000006FF0000-memory.dmp
    Filesize

    320KB