Analysis

  • max time kernel
    39s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2023 12:06

General

  • Target

    0dd2d9905a53f3db8251a2a52e562cc5.exe

  • Size

    553KB

  • MD5

    0dd2d9905a53f3db8251a2a52e562cc5

  • SHA1

    530120b2f97754dc5967effb0845cf551171bcd5

  • SHA256

    9d08f15196cc86b8bbf32d25a77809fae9f14edb05159ea5df793a859b594414

  • SHA512

    b3ba7ea0ed1842f473eea2eb2fcc5c515f965e51d974da64d8166beb1239f5300edf3ab6659886dcf8b4ce6eebc8292f2c11a4f4092fd0bd26b4d34b9b22c46b

  • SSDEEP

    12288:VMrFy90Qq6JAa4JR8k5iuZyKynC/mWaoR6cSi8bsv:0ytqWH6I9nC/YoRrSRbsv

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

rotik

C2

193.233.20.32:4125

Attributes
  • auth_value

    74863478ae154e921eb729354d2bb4bd

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dd2d9905a53f3db8251a2a52e562cc5.exe
    "C:\Users\Admin\AppData\Local\Temp\0dd2d9905a53f3db8251a2a52e562cc5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7603.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7603.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h71XG20.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h71XG20.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l80fj09.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l80fj09.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1000

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l80fj09.exe
    Filesize

    175KB

    MD5

    efc3b1703bec9a0e79d4a9fdcedf4a20

    SHA1

    d019bfe5fbf05fde5cae0029f9580dca9677a3b2

    SHA256

    1d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855

    SHA512

    f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l80fj09.exe
    Filesize

    175KB

    MD5

    efc3b1703bec9a0e79d4a9fdcedf4a20

    SHA1

    d019bfe5fbf05fde5cae0029f9580dca9677a3b2

    SHA256

    1d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855

    SHA512

    f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7603.exe
    Filesize

    411KB

    MD5

    6640068912e6e973c0ecf0dedf85910b

    SHA1

    985cc675565254eb2d6fdf71ccb14c96511cbbc6

    SHA256

    f37fcb2ada8cd3c0eebe20e2e9c0a6b9368da093f137de2c757c548077e0a837

    SHA512

    80ebdbf637152a47e55e7d27f91ad37d534d698cbe0d8f87c5c49acc82719e5a29ecb3ac36ce13b7a1f005671528ebda2a93f330645dd6156f951a58fc71e8e0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7603.exe
    Filesize

    411KB

    MD5

    6640068912e6e973c0ecf0dedf85910b

    SHA1

    985cc675565254eb2d6fdf71ccb14c96511cbbc6

    SHA256

    f37fcb2ada8cd3c0eebe20e2e9c0a6b9368da093f137de2c757c548077e0a837

    SHA512

    80ebdbf637152a47e55e7d27f91ad37d534d698cbe0d8f87c5c49acc82719e5a29ecb3ac36ce13b7a1f005671528ebda2a93f330645dd6156f951a58fc71e8e0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h71XG20.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h71XG20.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
    Filesize

    385KB

    MD5

    f81449cac86e759983979b5c27c0dd89

    SHA1

    3e7e7996a008ba3c079172fb93bfa15eaf792424

    SHA256

    5142ebcf26ae8ec7d6ab37958d5a1da0260f8b01f5195264f0e7e38940393bf1

    SHA512

    90283d9f52c8b5f886af9afdd73daaf1862c61d51bba43daf43f6f62f29e334cb1428fad276b4bea558446fcaf85e8dc9d2e01a81985a73fadf7bd85f5b8bfe9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
    Filesize

    385KB

    MD5

    f81449cac86e759983979b5c27c0dd89

    SHA1

    3e7e7996a008ba3c079172fb93bfa15eaf792424

    SHA256

    5142ebcf26ae8ec7d6ab37958d5a1da0260f8b01f5195264f0e7e38940393bf1

    SHA512

    90283d9f52c8b5f886af9afdd73daaf1862c61d51bba43daf43f6f62f29e334cb1428fad276b4bea558446fcaf85e8dc9d2e01a81985a73fadf7bd85f5b8bfe9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
    Filesize

    385KB

    MD5

    f81449cac86e759983979b5c27c0dd89

    SHA1

    3e7e7996a008ba3c079172fb93bfa15eaf792424

    SHA256

    5142ebcf26ae8ec7d6ab37958d5a1da0260f8b01f5195264f0e7e38940393bf1

    SHA512

    90283d9f52c8b5f886af9afdd73daaf1862c61d51bba43daf43f6f62f29e334cb1428fad276b4bea558446fcaf85e8dc9d2e01a81985a73fadf7bd85f5b8bfe9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\l80fj09.exe
    Filesize

    175KB

    MD5

    efc3b1703bec9a0e79d4a9fdcedf4a20

    SHA1

    d019bfe5fbf05fde5cae0029f9580dca9677a3b2

    SHA256

    1d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855

    SHA512

    f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\l80fj09.exe
    Filesize

    175KB

    MD5

    efc3b1703bec9a0e79d4a9fdcedf4a20

    SHA1

    d019bfe5fbf05fde5cae0029f9580dca9677a3b2

    SHA256

    1d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855

    SHA512

    f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7603.exe
    Filesize

    411KB

    MD5

    6640068912e6e973c0ecf0dedf85910b

    SHA1

    985cc675565254eb2d6fdf71ccb14c96511cbbc6

    SHA256

    f37fcb2ada8cd3c0eebe20e2e9c0a6b9368da093f137de2c757c548077e0a837

    SHA512

    80ebdbf637152a47e55e7d27f91ad37d534d698cbe0d8f87c5c49acc82719e5a29ecb3ac36ce13b7a1f005671528ebda2a93f330645dd6156f951a58fc71e8e0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7603.exe
    Filesize

    411KB

    MD5

    6640068912e6e973c0ecf0dedf85910b

    SHA1

    985cc675565254eb2d6fdf71ccb14c96511cbbc6

    SHA256

    f37fcb2ada8cd3c0eebe20e2e9c0a6b9368da093f137de2c757c548077e0a837

    SHA512

    80ebdbf637152a47e55e7d27f91ad37d534d698cbe0d8f87c5c49acc82719e5a29ecb3ac36ce13b7a1f005671528ebda2a93f330645dd6156f951a58fc71e8e0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\h71XG20.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
    Filesize

    385KB

    MD5

    f81449cac86e759983979b5c27c0dd89

    SHA1

    3e7e7996a008ba3c079172fb93bfa15eaf792424

    SHA256

    5142ebcf26ae8ec7d6ab37958d5a1da0260f8b01f5195264f0e7e38940393bf1

    SHA512

    90283d9f52c8b5f886af9afdd73daaf1862c61d51bba43daf43f6f62f29e334cb1428fad276b4bea558446fcaf85e8dc9d2e01a81985a73fadf7bd85f5b8bfe9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
    Filesize

    385KB

    MD5

    f81449cac86e759983979b5c27c0dd89

    SHA1

    3e7e7996a008ba3c079172fb93bfa15eaf792424

    SHA256

    5142ebcf26ae8ec7d6ab37958d5a1da0260f8b01f5195264f0e7e38940393bf1

    SHA512

    90283d9f52c8b5f886af9afdd73daaf1862c61d51bba43daf43f6f62f29e334cb1428fad276b4bea558446fcaf85e8dc9d2e01a81985a73fadf7bd85f5b8bfe9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\izJyg41.exe
    Filesize

    385KB

    MD5

    f81449cac86e759983979b5c27c0dd89

    SHA1

    3e7e7996a008ba3c079172fb93bfa15eaf792424

    SHA256

    5142ebcf26ae8ec7d6ab37958d5a1da0260f8b01f5195264f0e7e38940393bf1

    SHA512

    90283d9f52c8b5f886af9afdd73daaf1862c61d51bba43daf43f6f62f29e334cb1428fad276b4bea558446fcaf85e8dc9d2e01a81985a73fadf7bd85f5b8bfe9

  • memory/672-108-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-128-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-89-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-92-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-94-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-96-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-98-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-100-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-102-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-104-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-106-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-87-0x0000000000240000-0x000000000028B000-memory.dmp
    Filesize

    300KB

  • memory/672-110-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-112-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-114-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-116-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-118-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-120-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-122-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-124-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-126-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-90-0x0000000007430000-0x0000000007470000-memory.dmp
    Filesize

    256KB

  • memory/672-130-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-132-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-134-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-136-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-138-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-140-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-142-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-144-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-146-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-148-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-150-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-993-0x0000000007430000-0x0000000007470000-memory.dmp
    Filesize

    256KB

  • memory/672-86-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-85-0x0000000003230000-0x000000000326F000-memory.dmp
    Filesize

    252KB

  • memory/672-84-0x0000000003230000-0x0000000003274000-memory.dmp
    Filesize

    272KB

  • memory/672-83-0x0000000002EC0000-0x0000000002F06000-memory.dmp
    Filesize

    280KB

  • memory/1000-1002-0x0000000000960000-0x0000000000992000-memory.dmp
    Filesize

    200KB

  • memory/1000-1003-0x0000000000A40000-0x0000000000A80000-memory.dmp
    Filesize

    256KB

  • memory/1388-72-0x0000000000170000-0x000000000017A000-memory.dmp
    Filesize

    40KB