Analysis

  • max time kernel
    57s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/03/2023, 14:14

General

  • Target

    7e173dfe9fe3a0917a77a5decf5bafd77d71087a418361ed9b1b827325d61f06.exe

  • Size

    541KB

  • MD5

    365153be002b1c09e747f425895df8b6

  • SHA1

    b93ddd75e3c697649ee3c2e7f8236ee432ab6937

  • SHA256

    7e173dfe9fe3a0917a77a5decf5bafd77d71087a418361ed9b1b827325d61f06

  • SHA512

    61429125f62ebf4e550830883cf5c3f21a06768f52483df75c6acf7e9008702cb7fc8587d3867376c594604f339c035c159b908f756270ece9d89124e6639a58

  • SSDEEP

    12288:rMr4y908RBnPEtZpY6retnskqj+qO94NbJmHv81wBpFA:3yzRBPEtZq6askO+X94lAPAwHC

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e173dfe9fe3a0917a77a5decf5bafd77d71087a418361ed9b1b827325d61f06.exe
    "C:\Users\Admin\AppData\Local\Temp\7e173dfe9fe3a0917a77a5decf5bafd77d71087a418361ed9b1b827325d61f06.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0094.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0094.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5428.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5428.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si459064.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si459064.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si459064.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si459064.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0094.exe

    Filesize

    399KB

    MD5

    8279cd3331e65bcd6d460bed01421f58

    SHA1

    1713621e0520617982cb0daf34ec776d20c878ba

    SHA256

    72e8fa53f39b0cdb5d35de50a0ad38d76511c37341a90a2b93a8f8215e196b74

    SHA512

    928dfca6895cbcac9187fa348c287485a853ceb4c32d12be05e895392e2ae04d00a0b1715b326918cdaed4d1329353bce91ac80a86811f0a564adad06c803241

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0094.exe

    Filesize

    399KB

    MD5

    8279cd3331e65bcd6d460bed01421f58

    SHA1

    1713621e0520617982cb0daf34ec776d20c878ba

    SHA256

    72e8fa53f39b0cdb5d35de50a0ad38d76511c37341a90a2b93a8f8215e196b74

    SHA512

    928dfca6895cbcac9187fa348c287485a853ceb4c32d12be05e895392e2ae04d00a0b1715b326918cdaed4d1329353bce91ac80a86811f0a564adad06c803241

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5428.exe

    Filesize

    357KB

    MD5

    7e5cf4cc92ec3d303e861e5acc047a7b

    SHA1

    ae7554775d82ea83bd9485836c3e32c6b2c41d0d

    SHA256

    9ad906ad2be73841457e5298e705f6643711cbfe11a9715e2abb5ee2b6d36b92

    SHA512

    f07224e724bbee0a8153749296182dc6efbe866937fecce0774b894535d3dee00be860a775eb82182d9bdfdd7e3db7be3b349879db668127b949fb4aaa5fc317

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5428.exe

    Filesize

    357KB

    MD5

    7e5cf4cc92ec3d303e861e5acc047a7b

    SHA1

    ae7554775d82ea83bd9485836c3e32c6b2c41d0d

    SHA256

    9ad906ad2be73841457e5298e705f6643711cbfe11a9715e2abb5ee2b6d36b92

    SHA512

    f07224e724bbee0a8153749296182dc6efbe866937fecce0774b894535d3dee00be860a775eb82182d9bdfdd7e3db7be3b349879db668127b949fb4aaa5fc317

  • memory/2140-133-0x0000000000C70000-0x0000000000C7A000-memory.dmp

    Filesize

    40KB

  • memory/4552-1073-0x0000000000FA0000-0x0000000000FD2000-memory.dmp

    Filesize

    200KB

  • memory/4552-1074-0x00000000059E0000-0x0000000005A2B000-memory.dmp

    Filesize

    300KB

  • memory/4552-1075-0x0000000005820000-0x0000000005830000-memory.dmp

    Filesize

    64KB

  • memory/4700-173-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-187-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-142-0x00000000071D0000-0x00000000076CE000-memory.dmp

    Filesize

    5.0MB

  • memory/4700-143-0x0000000007160000-0x00000000071A4000-memory.dmp

    Filesize

    272KB

  • memory/4700-144-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-145-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-147-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-149-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-151-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-153-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-155-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-157-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-159-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-161-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-163-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-165-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-166-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-169-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-168-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-171-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-140-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/4700-175-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-177-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-179-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-181-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-183-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-185-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-141-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-189-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-191-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-193-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-195-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-197-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-199-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-201-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-203-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-205-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-207-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-209-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4700-1052-0x00000000076D0000-0x0000000007CD6000-memory.dmp

    Filesize

    6.0MB

  • memory/4700-1053-0x0000000007D30000-0x0000000007E3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4700-1054-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/4700-1055-0x0000000007E90000-0x0000000007ECE000-memory.dmp

    Filesize

    248KB

  • memory/4700-1056-0x0000000007FE0000-0x000000000802B000-memory.dmp

    Filesize

    300KB

  • memory/4700-1057-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-1059-0x0000000008170000-0x0000000008202000-memory.dmp

    Filesize

    584KB

  • memory/4700-1060-0x0000000008210000-0x0000000008276000-memory.dmp

    Filesize

    408KB

  • memory/4700-1061-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-1062-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-1063-0x0000000008B50000-0x0000000008BC6000-memory.dmp

    Filesize

    472KB

  • memory/4700-139-0x0000000004BD0000-0x0000000004C16000-memory.dmp

    Filesize

    280KB

  • memory/4700-1064-0x0000000008BE0000-0x0000000008C30000-memory.dmp

    Filesize

    320KB

  • memory/4700-1065-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-1066-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/4700-1067-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB