Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 10:23

General

  • Target

    5fce4b4a9c7c6a3d26b89462b324d5918a79123cf621532cef1e1d3b8a8e1d3b.exe

  • Size

    538KB

  • MD5

    85dc8f374339d58bd62df44476340a85

  • SHA1

    b5a4230a0ead462acf3e5e2018490590e8671b3f

  • SHA256

    5fce4b4a9c7c6a3d26b89462b324d5918a79123cf621532cef1e1d3b8a8e1d3b

  • SHA512

    ed8da0b2562b8668fb1a8837f89ed776960c5250971706934f074e52d7d36598e3d4bab004a2cacddcdac505669e4ed9967980f213e8d7bd91917a04bc1b4543

  • SSDEEP

    12288:wMrMy90T9Z+8bFApVPluDre7YSx2I4+9VSEA49IRFE:syAZtFYKDC7YCvbq4eE

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

bolt

C2

193.233.20.31:4125

Attributes
  • auth_value

    29540c7bf0277243e2faf6601e15a754

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fce4b4a9c7c6a3d26b89462b324d5918a79123cf621532cef1e1d3b8a8e1d3b.exe
    "C:\Users\Admin\AppData\Local\Temp\5fce4b4a9c7c6a3d26b89462b324d5918a79123cf621532cef1e1d3b8a8e1d3b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3956.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3956.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h05ur20.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h05ur20.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iMFrA10.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iMFrA10.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l15vk48.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l15vk48.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3908

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l15vk48.exe
    Filesize

    175KB

    MD5

    78efaf7292c2027da40635ca1aae855a

    SHA1

    686227a48e23b382a06c74f17d9b6f36e76042fd

    SHA256

    2f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab

    SHA512

    19e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l15vk48.exe
    Filesize

    175KB

    MD5

    78efaf7292c2027da40635ca1aae855a

    SHA1

    686227a48e23b382a06c74f17d9b6f36e76042fd

    SHA256

    2f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab

    SHA512

    19e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3956.exe
    Filesize

    396KB

    MD5

    b3bae120be940bff5a95aee4c5a22517

    SHA1

    6239afd64921b0c415940955408e0becdf0938dd

    SHA256

    a56430e1c5408692f6a8132003925abc9d22ba9357a98db707beed63fc4ffb4e

    SHA512

    37ce7a0d58a081d63067d19c819248b21163219db07e77ab787c052ca42907ec03b9c70975b51c4d457cc7b078fc11afaf4ae24a0616d2b8a0def40fda36926a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3956.exe
    Filesize

    396KB

    MD5

    b3bae120be940bff5a95aee4c5a22517

    SHA1

    6239afd64921b0c415940955408e0becdf0938dd

    SHA256

    a56430e1c5408692f6a8132003925abc9d22ba9357a98db707beed63fc4ffb4e

    SHA512

    37ce7a0d58a081d63067d19c819248b21163219db07e77ab787c052ca42907ec03b9c70975b51c4d457cc7b078fc11afaf4ae24a0616d2b8a0def40fda36926a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h05ur20.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h05ur20.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iMFrA10.exe
    Filesize

    355KB

    MD5

    231faa5e794f9558035b821b7a1c60f5

    SHA1

    88917e473cd38cf1171d12119f48deb5ebe9de0c

    SHA256

    d0c310bcd17220b3b4cf9558b24f5b4d0e98a7309473fbc7f25c89413446e1b1

    SHA512

    e5594c853fe13c22c5f9cc2b948fe9a53e7dd127013bdb0d3efc6852d149aa758fe95029ccbd610a3a3a2a40c2d0a8a5f278b4b8239cc1ace16f20be719d4630

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iMFrA10.exe
    Filesize

    355KB

    MD5

    231faa5e794f9558035b821b7a1c60f5

    SHA1

    88917e473cd38cf1171d12119f48deb5ebe9de0c

    SHA256

    d0c310bcd17220b3b4cf9558b24f5b4d0e98a7309473fbc7f25c89413446e1b1

    SHA512

    e5594c853fe13c22c5f9cc2b948fe9a53e7dd127013bdb0d3efc6852d149aa758fe95029ccbd610a3a3a2a40c2d0a8a5f278b4b8239cc1ace16f20be719d4630

  • memory/2344-130-0x00000000000E0000-0x00000000000EA000-memory.dmp
    Filesize

    40KB

  • memory/3908-1072-0x00000000008A0000-0x00000000008D2000-memory.dmp
    Filesize

    200KB

  • memory/3908-1073-0x00000000052E0000-0x000000000532B000-memory.dmp
    Filesize

    300KB

  • memory/3908-1074-0x00000000051A0000-0x00000000051B0000-memory.dmp
    Filesize

    64KB

  • memory/5116-175-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-185-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-140-0x0000000007100000-0x0000000007144000-memory.dmp
    Filesize

    272KB

  • memory/5116-141-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-142-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-144-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-146-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-148-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-152-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-154-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-150-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-156-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-158-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-160-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-163-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-164-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-166-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-162-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-167-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-169-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-171-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-173-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-138-0x0000000007080000-0x00000000070C6000-memory.dmp
    Filesize

    280KB

  • memory/5116-177-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-179-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-181-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-183-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-139-0x00000000071C0000-0x00000000076BE000-memory.dmp
    Filesize

    5.0MB

  • memory/5116-187-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-189-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-191-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-193-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-195-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-197-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-199-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-201-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-203-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-205-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-207-0x0000000007100000-0x000000000713E000-memory.dmp
    Filesize

    248KB

  • memory/5116-1050-0x0000000007800000-0x0000000007E06000-memory.dmp
    Filesize

    6.0MB

  • memory/5116-1051-0x0000000007E70000-0x0000000007F7A000-memory.dmp
    Filesize

    1.0MB

  • memory/5116-1052-0x0000000007FB0000-0x0000000007FC2000-memory.dmp
    Filesize

    72KB

  • memory/5116-1053-0x0000000007FD0000-0x000000000800E000-memory.dmp
    Filesize

    248KB

  • memory/5116-1054-0x0000000008120000-0x000000000816B000-memory.dmp
    Filesize

    300KB

  • memory/5116-1055-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-1057-0x00000000082B0000-0x0000000008342000-memory.dmp
    Filesize

    584KB

  • memory/5116-1058-0x0000000008350000-0x00000000083B6000-memory.dmp
    Filesize

    408KB

  • memory/5116-1059-0x0000000008A20000-0x0000000008A96000-memory.dmp
    Filesize

    472KB

  • memory/5116-1060-0x0000000008AB0000-0x0000000008B00000-memory.dmp
    Filesize

    320KB

  • memory/5116-1061-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-1062-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-137-0x0000000002D90000-0x0000000002DDB000-memory.dmp
    Filesize

    300KB

  • memory/5116-1063-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB

  • memory/5116-1064-0x0000000008C50000-0x0000000008E12000-memory.dmp
    Filesize

    1.8MB

  • memory/5116-1065-0x0000000008E20000-0x000000000934C000-memory.dmp
    Filesize

    5.2MB

  • memory/5116-1066-0x00000000071B0000-0x00000000071C0000-memory.dmp
    Filesize

    64KB