Analysis

  • max time kernel
    58s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 08:22

General

  • Target

    dddb627b0301d922de5a793cfbbb9424aca279af7db3447021a21d0de5eed5ba.exe

  • Size

    539KB

  • MD5

    af367b99c1ab950a2c9d50d1ea8a464f

  • SHA1

    f3a618f028b2de85a31239ba72971d843b6d839f

  • SHA256

    dddb627b0301d922de5a793cfbbb9424aca279af7db3447021a21d0de5eed5ba

  • SHA512

    2ff1e4df85529224e0eadacd40bfc41e0d4404abe2372ca39b1e8f5a6f82b4c7e3dfb8d2710aa99942c7b34d36bacc85120528568723dfba739df0aebfa48b84

  • SSDEEP

    12288:DMrJy90xqsxIjvJbvWVDwpfo2DYjxDI4+sbfF6GwPmdX3mz:uySxIjvJDQwpfPDY9uqfAGwPm0

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dddb627b0301d922de5a793cfbbb9424aca279af7db3447021a21d0de5eed5ba.exe
    "C:\Users\Admin\AppData\Local\Temp\dddb627b0301d922de5a793cfbbb9424aca279af7db3447021a21d0de5eed5ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6614.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6614.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6544.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1001.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1001.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si722739.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si722739.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si722739.exe

    Filesize

    175KB

    MD5

    7c11dfe7837f2079d50113de0e973682

    SHA1

    fae072addd4d56ab67d08ab82da4aac5d7223960

    SHA256

    442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

    SHA512

    06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si722739.exe

    Filesize

    175KB

    MD5

    7c11dfe7837f2079d50113de0e973682

    SHA1

    fae072addd4d56ab67d08ab82da4aac5d7223960

    SHA256

    442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

    SHA512

    06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6614.exe

    Filesize

    397KB

    MD5

    6ae71a27f8c4bb8a156df7a2daf4c615

    SHA1

    4c503abad3a18b9ccdadaeea062604623d299630

    SHA256

    b3271c36f0874e848880439038d590cd6e70bcdbd5983e442f913608d0f47ae0

    SHA512

    8e8b7945cb463e0f952a5902a659f97368e14ebb1928e296a2e9c39fc08064e85f1cbe8776127fc4f0f8b4c40ea7773b3efd4090baf20becc08ed724c3c28d39

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6614.exe

    Filesize

    397KB

    MD5

    6ae71a27f8c4bb8a156df7a2daf4c615

    SHA1

    4c503abad3a18b9ccdadaeea062604623d299630

    SHA256

    b3271c36f0874e848880439038d590cd6e70bcdbd5983e442f913608d0f47ae0

    SHA512

    8e8b7945cb463e0f952a5902a659f97368e14ebb1928e296a2e9c39fc08064e85f1cbe8776127fc4f0f8b4c40ea7773b3efd4090baf20becc08ed724c3c28d39

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6544.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6544.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1001.exe

    Filesize

    355KB

    MD5

    659df38621c0e09ceaf4d404f5fa3bfa

    SHA1

    18e0fbafb7191ef9c11b5fc83737c432dac6989b

    SHA256

    f2b63b4331e019fa9b7387d70b547a2366c91f9bc54756335911b903b32b03a6

    SHA512

    c41e8dfd398a38a4230a733935e8ce8ae1402e46bc6fb33d9a9bf7dcd2833583dc7c651a73cacf2fa2aefd1a47e4442b3aeec720e6510cf39f76d89ae734cd96

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1001.exe

    Filesize

    355KB

    MD5

    659df38621c0e09ceaf4d404f5fa3bfa

    SHA1

    18e0fbafb7191ef9c11b5fc83737c432dac6989b

    SHA256

    f2b63b4331e019fa9b7387d70b547a2366c91f9bc54756335911b903b32b03a6

    SHA512

    c41e8dfd398a38a4230a733935e8ce8ae1402e46bc6fb33d9a9bf7dcd2833583dc7c651a73cacf2fa2aefd1a47e4442b3aeec720e6510cf39f76d89ae734cd96

  • memory/2320-1072-0x0000000000F40000-0x0000000000F72000-memory.dmp

    Filesize

    200KB

  • memory/2320-1073-0x0000000005980000-0x00000000059CB000-memory.dmp

    Filesize

    300KB

  • memory/2320-1074-0x0000000005790000-0x00000000057A0000-memory.dmp

    Filesize

    64KB

  • memory/2808-177-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-140-0x0000000002C90000-0x0000000002CDB000-memory.dmp

    Filesize

    300KB

  • memory/2808-142-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-141-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-143-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-144-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-145-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-147-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-149-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-151-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-153-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-155-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-157-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-159-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-161-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-163-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-165-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-167-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-169-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-171-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-173-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-175-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-138-0x00000000071A0000-0x000000000769E000-memory.dmp

    Filesize

    5.0MB

  • memory/2808-179-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-181-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-185-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-139-0x0000000004CC0000-0x0000000004D04000-memory.dmp

    Filesize

    272KB

  • memory/2808-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/2808-1050-0x0000000007CB0000-0x00000000082B6000-memory.dmp

    Filesize

    6.0MB

  • memory/2808-1051-0x0000000007720000-0x000000000782A000-memory.dmp

    Filesize

    1.0MB

  • memory/2808-1052-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/2808-1053-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-1054-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/2808-1055-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/2808-1057-0x0000000007B60000-0x0000000007BC6000-memory.dmp

    Filesize

    408KB

  • memory/2808-1058-0x0000000008860000-0x00000000088F2000-memory.dmp

    Filesize

    584KB

  • memory/2808-1059-0x0000000008900000-0x0000000008976000-memory.dmp

    Filesize

    472KB

  • memory/2808-1060-0x0000000008980000-0x00000000089D0000-memory.dmp

    Filesize

    320KB

  • memory/2808-1061-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-1062-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-137-0x0000000004840000-0x0000000004886000-memory.dmp

    Filesize

    280KB

  • memory/2808-1063-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-1064-0x00000000048A0000-0x00000000048B0000-memory.dmp

    Filesize

    64KB

  • memory/2808-1065-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/2808-1066-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB

  • memory/4992-131-0x0000000000340000-0x000000000034A000-memory.dmp

    Filesize

    40KB