Analysis

  • max time kernel
    86s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/03/2023, 14:20

General

  • Target

    f0d9ef4a9de10906214cdba893c943cc9b5dcb993a6af1ab5cd7a2ec4fb638cf.exe

  • Size

    684KB

  • MD5

    f50101555e1aded123b09a3eea927acb

  • SHA1

    dfc210c3b8972e89c485cf678a1f060349729c7c

  • SHA256

    f0d9ef4a9de10906214cdba893c943cc9b5dcb993a6af1ab5cd7a2ec4fb638cf

  • SHA512

    2e1c077ad0d21e0b86ae98b4d2f3e2bb9125e1d3e71e795ba7f61f7df9b1cbbacb0686d12c779bec77247591423ba8b29df916ba00867c35e23473974de160f3

  • SSDEEP

    12288:b2p6IH/YF4pPp9BkMNVxauA6aFKm941l3qrKaPG4Lk2faSKVJ8ekcxAe:b2zpPpnkOVxa/68KZl3UKaPG4Lk2/KVf

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0d9ef4a9de10906214cdba893c943cc9b5dcb993a6af1ab5cd7a2ec4fb638cf.exe
    "C:\Users\Admin\AppData\Local\Temp\f0d9ef4a9de10906214cdba893c943cc9b5dcb993a6af1ab5cd7a2ec4fb638cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3132

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe

          Filesize

          175KB

          MD5

          f50023c2c4bad1bbf51efde95c575b28

          SHA1

          9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

          SHA256

          a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

          SHA512

          d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe

          Filesize

          175KB

          MD5

          f50023c2c4bad1bbf51efde95c575b28

          SHA1

          9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

          SHA256

          a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

          SHA512

          d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe

          Filesize

          398KB

          MD5

          cfb2eb242bb0e63df5142c30521388d6

          SHA1

          c793082cd9502cd7b1131a74dddc28bcb38adf8d

          SHA256

          50f0911b2b148deca7239749036458e857bc742d9cd3166d6d6596d0577403c3

          SHA512

          715303f6c1017b872d7966210f03e281563414a88897584d7576c26d18bce7ade495cc5735a1eac02fabbcefd6cbc6da94a19d6f80b5d216b036ba47aa6d9528

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe

          Filesize

          398KB

          MD5

          cfb2eb242bb0e63df5142c30521388d6

          SHA1

          c793082cd9502cd7b1131a74dddc28bcb38adf8d

          SHA256

          50f0911b2b148deca7239749036458e857bc742d9cd3166d6d6596d0577403c3

          SHA512

          715303f6c1017b872d7966210f03e281563414a88897584d7576c26d18bce7ade495cc5735a1eac02fabbcefd6cbc6da94a19d6f80b5d216b036ba47aa6d9528

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe

          Filesize

          357KB

          MD5

          f7b1f3086ead97c7fcd8eae485eec5a1

          SHA1

          4b41edab1ef531e7a5e983e193d50fbde97b7c98

          SHA256

          ffc243f5025ef8fd5a181ab1447fafb33153aba4a963dcb66a80f1624c2e23ad

          SHA512

          f6d265946280be35fb4899ccb3f8089f8524f8b69636285dcf2868452a6922df9c769f7bc73def6262dacdbcab90afeeab3d99e030932bee136ba9dfcb9eca62

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe

          Filesize

          357KB

          MD5

          f7b1f3086ead97c7fcd8eae485eec5a1

          SHA1

          4b41edab1ef531e7a5e983e193d50fbde97b7c98

          SHA256

          ffc243f5025ef8fd5a181ab1447fafb33153aba4a963dcb66a80f1624c2e23ad

          SHA512

          f6d265946280be35fb4899ccb3f8089f8524f8b69636285dcf2868452a6922df9c769f7bc73def6262dacdbcab90afeeab3d99e030932bee136ba9dfcb9eca62

        • memory/2108-190-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-198-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-145-0x0000000002C60000-0x0000000002CAB000-memory.dmp

          Filesize

          300KB

        • memory/2108-147-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-148-0x0000000007150000-0x000000000764E000-memory.dmp

          Filesize

          5.0MB

        • memory/2108-149-0x0000000007650000-0x0000000007694000-memory.dmp

          Filesize

          272KB

        • memory/2108-151-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-150-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-153-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-155-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-157-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-159-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-161-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-163-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-165-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-167-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-169-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-171-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-173-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-175-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-177-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-179-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-181-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-183-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-185-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-187-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-144-0x00000000070C0000-0x0000000007106000-memory.dmp

          Filesize

          280KB

        • memory/2108-189-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-192-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-194-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-196-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-146-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-200-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-202-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-204-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-206-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-208-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-210-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-212-0x0000000007650000-0x000000000768F000-memory.dmp

          Filesize

          252KB

        • memory/2108-1057-0x00000000077E0000-0x0000000007DE6000-memory.dmp

          Filesize

          6.0MB

        • memory/2108-1058-0x0000000007E70000-0x0000000007F7A000-memory.dmp

          Filesize

          1.0MB

        • memory/2108-1059-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

          Filesize

          72KB

        • memory/2108-1060-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-1061-0x0000000007FD0000-0x000000000800E000-memory.dmp

          Filesize

          248KB

        • memory/2108-1062-0x0000000008120000-0x000000000816B000-memory.dmp

          Filesize

          300KB

        • memory/2108-1065-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-1066-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-1067-0x00000000082B0000-0x0000000008316000-memory.dmp

          Filesize

          408KB

        • memory/2108-1068-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/2108-1069-0x0000000008A70000-0x0000000008C32000-memory.dmp

          Filesize

          1.8MB

        • memory/2108-1070-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/2108-1071-0x0000000008C40000-0x000000000916C000-memory.dmp

          Filesize

          5.2MB

        • memory/2108-1072-0x0000000009390000-0x0000000009406000-memory.dmp

          Filesize

          472KB

        • memory/2108-1073-0x0000000009410000-0x0000000009460000-memory.dmp

          Filesize

          320KB

        • memory/2108-1074-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/3132-1081-0x0000000000460000-0x0000000000492000-memory.dmp

          Filesize

          200KB

        • memory/3132-1082-0x0000000004E90000-0x0000000004EDB000-memory.dmp

          Filesize

          300KB

        • memory/3132-1083-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/4040-137-0x00000000069A0000-0x0000000006A29000-memory.dmp

          Filesize

          548KB

        • memory/4040-138-0x0000000000400000-0x0000000002BD9000-memory.dmp

          Filesize

          39.8MB

        • memory/4276-136-0x0000000000830000-0x000000000083A000-memory.dmp

          Filesize

          40KB