Analysis

  • max time kernel
    50s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 10:09

General

  • Target

    5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe

  • Size

    538KB

  • MD5

    81a2baf571c347d4b734ab89ea0aec15

  • SHA1

    8f7164862cb5fa5560583147eab4d56b34332254

  • SHA256

    5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001

  • SHA512

    34a406fe9a0d5420acfee601a539a7dd15b12cc9cf3b5c174e3563c8f2dd71fc68ba3fdd177fc7e8a5e5242ee11f9544b581d16618772342cd4d60dcd7726a10

  • SSDEEP

    12288:gMrKy90UQvqUF3xeOPTuFy2Aklfo/sYSxaI4+v5N1tdHNVF0E:6yKvRtlT/bklfCsYCTBb/HRj

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe
    "C:\Users\Admin\AppData\Local\Temp\5030162e6678a7196bd22ed6c69d83cfae222c3ef463b470ad7047ad9f5f3001.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0735.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0735.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2953.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8462.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8462.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552963.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552963.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552963.exe

    Filesize

    175KB

    MD5

    7c11dfe7837f2079d50113de0e973682

    SHA1

    fae072addd4d56ab67d08ab82da4aac5d7223960

    SHA256

    442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

    SHA512

    06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552963.exe

    Filesize

    175KB

    MD5

    7c11dfe7837f2079d50113de0e973682

    SHA1

    fae072addd4d56ab67d08ab82da4aac5d7223960

    SHA256

    442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

    SHA512

    06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0735.exe

    Filesize

    397KB

    MD5

    485ac14ebb6ea47439ad739320ce5732

    SHA1

    268699eceea916e41d4006e534d3483c6059f085

    SHA256

    42336d9b301ac67a8c291a0d192f9ddd53de765eacdce9b6290d568cf3873464

    SHA512

    5d216dcb80fb11f7a88b0c291c5984b6ceb21f80a274df4295c834d5e1cea061584eaf7a4978ed7ef991707b2c059aeb1950aeede6eb707a8d284b5bbf40beea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0735.exe

    Filesize

    397KB

    MD5

    485ac14ebb6ea47439ad739320ce5732

    SHA1

    268699eceea916e41d4006e534d3483c6059f085

    SHA256

    42336d9b301ac67a8c291a0d192f9ddd53de765eacdce9b6290d568cf3873464

    SHA512

    5d216dcb80fb11f7a88b0c291c5984b6ceb21f80a274df4295c834d5e1cea061584eaf7a4978ed7ef991707b2c059aeb1950aeede6eb707a8d284b5bbf40beea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2953.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2953.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8462.exe

    Filesize

    355KB

    MD5

    a6b25bc4f6b616dec1cb7db0f500374a

    SHA1

    0ee92b52370dddc68ddd7f7053d1bb452ba04e57

    SHA256

    dfefb67ee4f7033d2902b62102f118226ab735c14b87041a7efc26b90c850f11

    SHA512

    dcd0105415e4add8bb34322da75b34d0afe4b986deceb4c5ab5faa657ed53835bb93bce96beac15ce598830ebff7a6645d5ca06585e3a04cc532a29bde04839f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8462.exe

    Filesize

    355KB

    MD5

    a6b25bc4f6b616dec1cb7db0f500374a

    SHA1

    0ee92b52370dddc68ddd7f7053d1bb452ba04e57

    SHA256

    dfefb67ee4f7033d2902b62102f118226ab735c14b87041a7efc26b90c850f11

    SHA512

    dcd0105415e4add8bb34322da75b34d0afe4b986deceb4c5ab5faa657ed53835bb93bce96beac15ce598830ebff7a6645d5ca06585e3a04cc532a29bde04839f

  • memory/1500-135-0x0000000000580000-0x000000000058A000-memory.dmp

    Filesize

    40KB

  • memory/2884-141-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

    Filesize

    300KB

  • memory/2884-142-0x0000000002E70000-0x0000000002EB6000-memory.dmp

    Filesize

    280KB

  • memory/2884-143-0x00000000071F0000-0x00000000076EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2884-144-0x0000000004B00000-0x0000000004B44000-memory.dmp

    Filesize

    272KB

  • memory/2884-145-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-146-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-148-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-150-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-152-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-155-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-154-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-158-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-157-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-159-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-161-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-163-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-165-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-167-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-169-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-171-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-173-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-175-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-177-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-179-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-181-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-183-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-185-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-187-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-189-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-191-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-193-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-195-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-197-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-199-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-201-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-203-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-205-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-207-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-209-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-211-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/2884-1054-0x0000000007D00000-0x0000000008306000-memory.dmp

    Filesize

    6.0MB

  • memory/2884-1055-0x0000000007730000-0x000000000783A000-memory.dmp

    Filesize

    1.0MB

  • memory/2884-1056-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/2884-1057-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/2884-1058-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/2884-1059-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-1061-0x0000000007B60000-0x0000000007BF2000-memory.dmp

    Filesize

    584KB

  • memory/2884-1062-0x0000000007C00000-0x0000000007C66000-memory.dmp

    Filesize

    408KB

  • memory/2884-1063-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-1064-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-1065-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/2884-1066-0x00000000089F0000-0x0000000008A66000-memory.dmp

    Filesize

    472KB

  • memory/2884-1067-0x0000000008A80000-0x0000000008AD0000-memory.dmp

    Filesize

    320KB

  • memory/2884-1068-0x0000000009F00000-0x000000000A0C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2884-1069-0x000000000A0D0000-0x000000000A5FC000-memory.dmp

    Filesize

    5.2MB

  • memory/2884-1072-0x0000000002E40000-0x0000000002E50000-memory.dmp

    Filesize

    64KB

  • memory/3376-1076-0x0000000000040000-0x0000000000072000-memory.dmp

    Filesize

    200KB

  • memory/3376-1077-0x0000000004A80000-0x0000000004ACB000-memory.dmp

    Filesize

    300KB

  • memory/3376-1078-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB