Analysis

  • max time kernel
    53s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-03-2023 00:02

General

  • Target

    9342ac1ae36fb04cc4193933033a66f94ba87bcd47505a15f73f5fe3ef6d642e.exe

  • Size

    728KB

  • MD5

    73b36a319589d2ff31dc178b6404b383

  • SHA1

    a4e2b03f4ce46c6b5e4cfe2591429576f3beec78

  • SHA256

    9342ac1ae36fb04cc4193933033a66f94ba87bcd47505a15f73f5fe3ef6d642e

  • SHA512

    b5bcf788901b1bf559a8bc563d849325cecdbfa4adfade349a1d72d252d3766f4acf791ca516432711dd221899faf574b995ab166b5a9e7b984103779fd990f1

  • SSDEEP

    12288:+M7HjeztCIzGcv+qAPARIv+kUdTPIdCdyTiAtba1JGDn4rRU2hdxs:+5ztCi27vRwTPJdyTdteG0LS

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9342ac1ae36fb04cc4193933033a66f94ba87bcd47505a15f73f5fe3ef6d642e.exe
    "C:\Users\Admin\AppData\Local\Temp\9342ac1ae36fb04cc4193933033a66f94ba87bcd47505a15f73f5fe3ef6d642e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe

    Filesize

    414KB

    MD5

    14781f1440a44bf65d4ce7d116fa4c68

    SHA1

    89a8a052e62a2a6c0dbef7dacbba4e21ba13b579

    SHA256

    e6b1723483d29272c84633ecb30fc537c7970818a2b5b09ba43e7fdbb1e84ad2

    SHA512

    b3cd073cb6530760d78f837fb697546dd9a573386cabe7df3487e1439da8d3ec21f4cd461393fe1bc1b04521be85fc5f53dbcfaadb7ed2af39eaf8a17a1f70bf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe

    Filesize

    414KB

    MD5

    14781f1440a44bf65d4ce7d116fa4c68

    SHA1

    89a8a052e62a2a6c0dbef7dacbba4e21ba13b579

    SHA256

    e6b1723483d29272c84633ecb30fc537c7970818a2b5b09ba43e7fdbb1e84ad2

    SHA512

    b3cd073cb6530760d78f837fb697546dd9a573386cabe7df3487e1439da8d3ec21f4cd461393fe1bc1b04521be85fc5f53dbcfaadb7ed2af39eaf8a17a1f70bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe

    Filesize

    387KB

    MD5

    c94d79a744d968ae1c80dab3d15947b4

    SHA1

    9153bbb7965551ecf7f4fafa88d97bfbd1080d0d

    SHA256

    782b835506a84eb51b9f20eedbbf0296cf50cd3656f4709ab9b151a94688e483

    SHA512

    0c546daae052bf4d3f5d973f64effd8bb8d0e04e726a2f838c31d01d2f8b6fa74b9d0aacf88a717bff3d78e0278e93d8c9dcd12d54eedb0838abd4215a4f49f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe

    Filesize

    387KB

    MD5

    c94d79a744d968ae1c80dab3d15947b4

    SHA1

    9153bbb7965551ecf7f4fafa88d97bfbd1080d0d

    SHA256

    782b835506a84eb51b9f20eedbbf0296cf50cd3656f4709ab9b151a94688e483

    SHA512

    0c546daae052bf4d3f5d973f64effd8bb8d0e04e726a2f838c31d01d2f8b6fa74b9d0aacf88a717bff3d78e0278e93d8c9dcd12d54eedb0838abd4215a4f49f6

  • memory/1548-1083-0x0000000004F80000-0x0000000004FCB000-memory.dmp

    Filesize

    300KB

  • memory/1548-1084-0x0000000005120000-0x0000000005130000-memory.dmp

    Filesize

    64KB

  • memory/1548-1081-0x0000000000550000-0x0000000000582000-memory.dmp

    Filesize

    200KB

  • memory/3076-139-0x0000000000400000-0x0000000002BE4000-memory.dmp

    Filesize

    39.9MB

  • memory/3076-130-0x0000000006AB0000-0x0000000006B3D000-memory.dmp

    Filesize

    564KB

  • memory/4188-138-0x0000000000D90000-0x0000000000D9A000-memory.dmp

    Filesize

    40KB

  • memory/4228-185-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-199-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-152-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-154-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-156-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-158-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-160-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-162-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-164-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-166-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-168-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-169-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-171-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-172-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-174-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-175-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-177-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-179-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-181-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-183-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-149-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-187-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-189-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-191-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-193-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-195-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-197-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-150-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-201-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-203-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-205-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-207-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-209-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-211-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-213-0x0000000007600000-0x000000000763F000-memory.dmp

    Filesize

    252KB

  • memory/4228-1058-0x0000000007CB0000-0x00000000082B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4228-1059-0x0000000007720000-0x000000000782A000-memory.dmp

    Filesize

    1.0MB

  • memory/4228-1060-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/4228-1061-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/4228-1062-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/4228-1063-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-1066-0x0000000007B60000-0x0000000007BF2000-memory.dmp

    Filesize

    584KB

  • memory/4228-1067-0x0000000007C00000-0x0000000007C66000-memory.dmp

    Filesize

    408KB

  • memory/4228-1068-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-1069-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-1070-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB

  • memory/4228-1071-0x0000000008B50000-0x0000000008BC6000-memory.dmp

    Filesize

    472KB

  • memory/4228-1072-0x0000000008BD0000-0x0000000008C20000-memory.dmp

    Filesize

    320KB

  • memory/4228-1073-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/4228-1074-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB

  • memory/4228-148-0x0000000007600000-0x0000000007644000-memory.dmp

    Filesize

    272KB

  • memory/4228-147-0x00000000070B0000-0x00000000075AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4228-146-0x0000000004BF0000-0x0000000004C36000-memory.dmp

    Filesize

    280KB

  • memory/4228-145-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4228-1075-0x0000000004740000-0x0000000004750000-memory.dmp

    Filesize

    64KB