Analysis

  • max time kernel
    49s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 11:32

General

  • Target

    e6e1ce57f74e59356e8c6933a759e24658c5f5dc110e3b4056cbcf343dd30ed5.exe

  • Size

    540KB

  • MD5

    57bd15a4bfe7e34d8e8ec37eb4d12b86

  • SHA1

    9ce222b4c17efb01a1c7b22a6477d84e0efd5fdd

  • SHA256

    e6e1ce57f74e59356e8c6933a759e24658c5f5dc110e3b4056cbcf343dd30ed5

  • SHA512

    322ef3e48ca53656f31322dcab98b8d10278ca43da83632b90e3877ebb6fca17450c23e091fa342c78c456cc5d0ceb04e463f0d6e61a795a6cf150bfae1eb6c5

  • SSDEEP

    6144:KQy+bnr+Ap0yN90QE2mf0wBbxnOMAL50vuY16cHhQ35b+UI+eULUsZKGzNrruyy4:8MrEy90awrqNY16ceFI9ULFQC0/kRUg

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6e1ce57f74e59356e8c6933a759e24658c5f5dc110e3b4056cbcf343dd30ed5.exe
    "C:\Users\Admin\AppData\Local\Temp\e6e1ce57f74e59356e8c6933a759e24658c5f5dc110e3b4056cbcf343dd30ed5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6236.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6236.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9355.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9355.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0612.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0612.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356133.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356133.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356133.exe

    Filesize

    175KB

    MD5

    7c11dfe7837f2079d50113de0e973682

    SHA1

    fae072addd4d56ab67d08ab82da4aac5d7223960

    SHA256

    442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

    SHA512

    06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356133.exe

    Filesize

    175KB

    MD5

    7c11dfe7837f2079d50113de0e973682

    SHA1

    fae072addd4d56ab67d08ab82da4aac5d7223960

    SHA256

    442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

    SHA512

    06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6236.exe

    Filesize

    397KB

    MD5

    01ce0d4d8d712e302f48bb6d6218516d

    SHA1

    a8c077d0f44bf39f16ad3b5b1fd401e9406d9be7

    SHA256

    6fa9822066a5a9841a0d738beab02a0264a20f936f0d5d06a5aaebaa28bbf3a9

    SHA512

    2a5a6279e80c26c0e773282f1a1777ef156f99be747de6302f1ccdd45ba3cfc073d926efe068f6e87804a323c584c412cf286f0602e945649fe9fb5ff06b59b9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6236.exe

    Filesize

    397KB

    MD5

    01ce0d4d8d712e302f48bb6d6218516d

    SHA1

    a8c077d0f44bf39f16ad3b5b1fd401e9406d9be7

    SHA256

    6fa9822066a5a9841a0d738beab02a0264a20f936f0d5d06a5aaebaa28bbf3a9

    SHA512

    2a5a6279e80c26c0e773282f1a1777ef156f99be747de6302f1ccdd45ba3cfc073d926efe068f6e87804a323c584c412cf286f0602e945649fe9fb5ff06b59b9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9355.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9355.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0612.exe

    Filesize

    356KB

    MD5

    e75191810ad25b55844e345bfdfc6024

    SHA1

    e5a3454ccd8e5f2aef0348b67a4dccd479d22503

    SHA256

    8b1389137ebb9d05dc5faf3598fda8e7cbed82e0a519196bbaaebeda5ec9b508

    SHA512

    041f5ea3e36486c2c9898c13178606068ac9f41909ae7b2b68317c9fcf1fa3ce58249f684e96f9ce707175c68a1b4c3e5f9c98f79e58e82ffd8f2edbee1a96c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0612.exe

    Filesize

    356KB

    MD5

    e75191810ad25b55844e345bfdfc6024

    SHA1

    e5a3454ccd8e5f2aef0348b67a4dccd479d22503

    SHA256

    8b1389137ebb9d05dc5faf3598fda8e7cbed82e0a519196bbaaebeda5ec9b508

    SHA512

    041f5ea3e36486c2c9898c13178606068ac9f41909ae7b2b68317c9fcf1fa3ce58249f684e96f9ce707175c68a1b4c3e5f9c98f79e58e82ffd8f2edbee1a96c1

  • memory/3900-1074-0x0000000000D80000-0x0000000000DB2000-memory.dmp

    Filesize

    200KB

  • memory/3900-1075-0x0000000005650000-0x000000000569B000-memory.dmp

    Filesize

    300KB

  • memory/3900-1076-0x00000000059B0000-0x00000000059C0000-memory.dmp

    Filesize

    64KB

  • memory/4252-133-0x0000000000AF0000-0x0000000000AFA000-memory.dmp

    Filesize

    40KB

  • memory/4264-177-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-187-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-143-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-144-0x00000000076A0000-0x00000000076E4000-memory.dmp

    Filesize

    272KB

  • memory/4264-142-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-145-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-146-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-147-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-149-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-151-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-153-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-155-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-157-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-159-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-161-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-163-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-165-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-167-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-169-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-171-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-173-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-175-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-140-0x0000000007160000-0x000000000765E000-memory.dmp

    Filesize

    5.0MB

  • memory/4264-179-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-181-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-183-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-185-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-141-0x0000000002F10000-0x0000000002F5B000-memory.dmp

    Filesize

    300KB

  • memory/4264-189-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-191-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-193-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-195-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-197-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-199-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-201-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-203-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-205-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-207-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-209-0x00000000076A0000-0x00000000076DE000-memory.dmp

    Filesize

    248KB

  • memory/4264-1052-0x0000000007820000-0x0000000007E26000-memory.dmp

    Filesize

    6.0MB

  • memory/4264-1053-0x0000000007E70000-0x0000000007F7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4264-1054-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

    Filesize

    72KB

  • memory/4264-1055-0x0000000007FD0000-0x000000000800E000-memory.dmp

    Filesize

    248KB

  • memory/4264-1056-0x0000000008120000-0x000000000816B000-memory.dmp

    Filesize

    300KB

  • memory/4264-1057-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-1059-0x00000000082B0000-0x0000000008342000-memory.dmp

    Filesize

    584KB

  • memory/4264-1060-0x0000000008350000-0x00000000083B6000-memory.dmp

    Filesize

    408KB

  • memory/4264-1061-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-1062-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-1063-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4264-1064-0x0000000008B50000-0x0000000008BC6000-memory.dmp

    Filesize

    472KB

  • memory/4264-139-0x0000000004C80000-0x0000000004CC6000-memory.dmp

    Filesize

    280KB

  • memory/4264-1065-0x0000000008BD0000-0x0000000008C20000-memory.dmp

    Filesize

    320KB

  • memory/4264-1066-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/4264-1067-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB

  • memory/4264-1068-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB