Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/03/2023, 08:59

General

  • Target

    98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe

  • Size

    689KB

  • MD5

    40ae386b14879572bec40748287a6e6d

  • SHA1

    a3c543618287dc342085d65cf507dbe5fa772a3e

  • SHA256

    98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a

  • SHA512

    1c4637ffc96b1ccfb20ad4196a990b105c565d4870445822da8052af33f71a7618da96e57fb086afea421851f3fee5c691cadcc54641c94855bc69329101e0fe

  • SSDEEP

    12288:QMrXy90ucPb4yeDDqgLumU9as0rjeyTsF8+XTKptb7TGENl3mvokt4hy:XyMjgiKeqsS+EtbfGjv/x

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

lenka

C2

193.233.20.32:4125

Attributes
  • auth_value

    8a60e8b2ec79d6a7e92f9feac39b8830

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe
    "C:\Users\Admin\AppData\Local\Temp\98b16b69b66406ee2a97e2d665eac89126e7a563d55d542037f94a4f19ab1a0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0916.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0916.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7089.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9800.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9800.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683614.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683614.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683614.exe

    Filesize

    175KB

    MD5

    17eecdfcdba58dcc35826a14d78a8e60

    SHA1

    b7db5fc772b4096eda4165fec03da4239e0922e7

    SHA256

    5ad947677902bd4d155a4566dd12d9146f4e77b1bbaf251d265cbdc994b7cf58

    SHA512

    4a0016c3f7275ade99e4b02281c6423bc82fe6a1c8c914f6ddb13241bfd11a8ece28a239a98e3b56b9e2ab69219af04290faf56b9df24b13e0b1d8abf4d74099

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si683614.exe

    Filesize

    175KB

    MD5

    17eecdfcdba58dcc35826a14d78a8e60

    SHA1

    b7db5fc772b4096eda4165fec03da4239e0922e7

    SHA256

    5ad947677902bd4d155a4566dd12d9146f4e77b1bbaf251d265cbdc994b7cf58

    SHA512

    4a0016c3f7275ade99e4b02281c6423bc82fe6a1c8c914f6ddb13241bfd11a8ece28a239a98e3b56b9e2ab69219af04290faf56b9df24b13e0b1d8abf4d74099

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0916.exe

    Filesize

    547KB

    MD5

    361aa17f442e806199190c1414f1a603

    SHA1

    acc0a489ac389a62ecc393299e17f2d302e203cb

    SHA256

    c9581ccc6e067848ec5c87b8ce51a9c21637d85e465b60d756864585d425b514

    SHA512

    22b9cc2284ef07c17abb1cf47221766b45c10d95225e8e8b54df35574b8f2554fa750a59756f0fb81fefe2a5079f6f5ed308df52a9375049f02a9bcff49fd8ea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0916.exe

    Filesize

    547KB

    MD5

    361aa17f442e806199190c1414f1a603

    SHA1

    acc0a489ac389a62ecc393299e17f2d302e203cb

    SHA256

    c9581ccc6e067848ec5c87b8ce51a9c21637d85e465b60d756864585d425b514

    SHA512

    22b9cc2284ef07c17abb1cf47221766b45c10d95225e8e8b54df35574b8f2554fa750a59756f0fb81fefe2a5079f6f5ed308df52a9375049f02a9bcff49fd8ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7089.exe

    Filesize

    327KB

    MD5

    d80ac8257dfffe36209f6fdf46bbe92e

    SHA1

    70e1e2834c22ae4a063659ec9b56fb76533ecdff

    SHA256

    2fa4b403c8f95019c3fd3ae8b2a40b7af4554c22e04ae9d94c7b2c9c09cafff8

    SHA512

    2c766922672c3c9b7e6310fa4a507fe97f2a84d73065bcf679a82716ecbbcb71da84f1d71ef21ed822eef09a1855ed0a6d19f5573e36a326a2a8a6addecdeda4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7089.exe

    Filesize

    327KB

    MD5

    d80ac8257dfffe36209f6fdf46bbe92e

    SHA1

    70e1e2834c22ae4a063659ec9b56fb76533ecdff

    SHA256

    2fa4b403c8f95019c3fd3ae8b2a40b7af4554c22e04ae9d94c7b2c9c09cafff8

    SHA512

    2c766922672c3c9b7e6310fa4a507fe97f2a84d73065bcf679a82716ecbbcb71da84f1d71ef21ed822eef09a1855ed0a6d19f5573e36a326a2a8a6addecdeda4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9800.exe

    Filesize

    385KB

    MD5

    31975f6579801a8fbe501c78f9b4eb57

    SHA1

    17b9f25ec9b2f0821e3b9f9a97601a3af1cd404f

    SHA256

    20961c43d7e3dcc9b10fcb72ab06980a10d5bd362ea96ade1450cef643eb04d1

    SHA512

    4969ab6422e839aae49982dd737b27ebe039d0a1c1b7e95d1d71092dd2d0f7e3f182f674e94d4cb972deab2dc318c6968a42f6594df8c7a9e89488f355c17bcb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9800.exe

    Filesize

    385KB

    MD5

    31975f6579801a8fbe501c78f9b4eb57

    SHA1

    17b9f25ec9b2f0821e3b9f9a97601a3af1cd404f

    SHA256

    20961c43d7e3dcc9b10fcb72ab06980a10d5bd362ea96ade1450cef643eb04d1

    SHA512

    4969ab6422e839aae49982dd737b27ebe039d0a1c1b7e95d1d71092dd2d0f7e3f182f674e94d4cb972deab2dc318c6968a42f6594df8c7a9e89488f355c17bcb

  • memory/3592-1111-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/3592-1110-0x0000000004FF0000-0x000000000503B000-memory.dmp

    Filesize

    300KB

  • memory/3592-1109-0x0000000000730000-0x0000000000762000-memory.dmp

    Filesize

    200KB

  • memory/4864-1088-0x0000000007E70000-0x0000000007F7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4864-1091-0x0000000008120000-0x000000000816B000-memory.dmp

    Filesize

    300KB

  • memory/4864-1103-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-1102-0x0000000009090000-0x00000000095BC000-memory.dmp

    Filesize

    5.2MB

  • memory/4864-1101-0x0000000008EB0000-0x0000000009072000-memory.dmp

    Filesize

    1.8MB

  • memory/4864-1100-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-1099-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-1098-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-1097-0x0000000008AE0000-0x0000000008B30000-memory.dmp

    Filesize

    320KB

  • memory/4864-1096-0x0000000008A50000-0x0000000008AC6000-memory.dmp

    Filesize

    472KB

  • memory/4864-1095-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/4864-1094-0x00000000082B0000-0x0000000008316000-memory.dmp

    Filesize

    408KB

  • memory/4864-1092-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-1090-0x0000000007FD0000-0x000000000800E000-memory.dmp

    Filesize

    248KB

  • memory/4864-1089-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

    Filesize

    72KB

  • memory/4864-1087-0x0000000007810000-0x0000000007E16000-memory.dmp

    Filesize

    6.0MB

  • memory/4864-214-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-212-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-210-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-208-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-206-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-175-0x0000000006F90000-0x0000000006FD6000-memory.dmp

    Filesize

    280KB

  • memory/4864-176-0x0000000007690000-0x00000000076D4000-memory.dmp

    Filesize

    272KB

  • memory/4864-177-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-178-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-180-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-182-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-184-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-187-0x0000000004510000-0x000000000455B000-memory.dmp

    Filesize

    300KB

  • memory/4864-186-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-192-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-190-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-189-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-196-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-194-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4864-193-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-198-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-200-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-202-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4864-204-0x0000000007690000-0x00000000076CF000-memory.dmp

    Filesize

    252KB

  • memory/4944-158-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-134-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-167-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/4944-170-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4944-169-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4944-168-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4944-137-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-165-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/4944-164-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-144-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4944-162-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-160-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-142-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-139-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-146-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4944-152-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-150-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-145-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-154-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-148-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-141-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4944-135-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-156-0x00000000070B0000-0x00000000070C2000-memory.dmp

    Filesize

    72KB

  • memory/4944-133-0x00000000070B0000-0x00000000070C8000-memory.dmp

    Filesize

    96KB

  • memory/4944-132-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4944-131-0x0000000004BC0000-0x0000000004BDA000-memory.dmp

    Filesize

    104KB