Analysis

  • max time kernel
    42s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-03-2023 15:47

General

  • Target

    38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe

  • Size

    688KB

  • MD5

    9598a2d0b257363410282122308d3cc6

  • SHA1

    08afc2de24b97ad7b6fc97f50bc31f06f4980cb0

  • SHA256

    38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce

  • SHA512

    1d292a330ca2c5bdf8491b5826aaa044c8c94cda138b6d170eff2b9f03343aae7779e4d3278ecdf1c05d0036a253904fef311366512c8b252ebdff4214258de0

  • SSDEEP

    12288:gMrHy90jFVislKqfKBj7GBPEbERsL9EkcbektZblq5VYI9sfRvssPl:3ymQqM7GmbERe29nY5VYFLl

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

viza

C2

193.233.20.32:4125

Attributes
  • auth_value

    153a106a89fae7251f2dc17be2eb5720

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe
    "C:\Users\Admin\AppData\Local\Temp\38f7fb244abbaf706d7e4333530bed6c361092ecbf7cd9971b668cbec3d679ce.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388320.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388320.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2171.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2171.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0514.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si025887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si025887.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si025887.exe

    Filesize

    175KB

    MD5

    ee59ed8d569a7ffd44c985c447f60e1f

    SHA1

    7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

    SHA256

    6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

    SHA512

    0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si025887.exe

    Filesize

    175KB

    MD5

    ee59ed8d569a7ffd44c985c447f60e1f

    SHA1

    7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

    SHA256

    6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

    SHA512

    0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388320.exe

    Filesize

    546KB

    MD5

    154220b933b7a1649824d28c445af138

    SHA1

    8ceed2dfcc59252806eeab03d0da95672059e861

    SHA256

    24c244973f71e39e6eae3ee596fb0ccf0586e0c120b11cc581f3534ea5912452

    SHA512

    34dfc04d3abad557fc42e0b6a4846c66f7de2e99c58d4e1958483d0f792fcb2eb335156d2c4e4df0bdaa4558508ce9ba89525cd9dac3478a4c1add5d7fe7d322

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388320.exe

    Filesize

    546KB

    MD5

    154220b933b7a1649824d28c445af138

    SHA1

    8ceed2dfcc59252806eeab03d0da95672059e861

    SHA256

    24c244973f71e39e6eae3ee596fb0ccf0586e0c120b11cc581f3534ea5912452

    SHA512

    34dfc04d3abad557fc42e0b6a4846c66f7de2e99c58d4e1958483d0f792fcb2eb335156d2c4e4df0bdaa4558508ce9ba89525cd9dac3478a4c1add5d7fe7d322

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2171.exe

    Filesize

    324KB

    MD5

    d5faf661aa3ae17359018549abace394

    SHA1

    862e782ddc7ef73ee4e993d247aa14b7a5d4d5c0

    SHA256

    d5358af7b250c2ae2541b88a5f6b043fae627de08b19adffda6970cd9319449b

    SHA512

    d9919080e0e8bf67378b2093de6e311255fbc82a62c187a9735a46e7cf4eaff348e55ca7c511c19187d51deb68e044799187bfbcf43ec5c3b6558eac30219abf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2171.exe

    Filesize

    324KB

    MD5

    d5faf661aa3ae17359018549abace394

    SHA1

    862e782ddc7ef73ee4e993d247aa14b7a5d4d5c0

    SHA256

    d5358af7b250c2ae2541b88a5f6b043fae627de08b19adffda6970cd9319449b

    SHA512

    d9919080e0e8bf67378b2093de6e311255fbc82a62c187a9735a46e7cf4eaff348e55ca7c511c19187d51deb68e044799187bfbcf43ec5c3b6558eac30219abf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0514.exe

    Filesize

    383KB

    MD5

    157df330c26f63ffa7d15f56bf261d53

    SHA1

    a3cacc113e8b5d01310bcdb4e24fafd24d1a4d73

    SHA256

    967966ec6e005194b80be5430b60785b7fea99fb290996423fd1b938773a8268

    SHA512

    b97202f88e2a7bf68786868321d25b35cd366676d603270b2978295813b729802ca918b29a5f7def1654912cb83ff62f3c20f962d46d747fa5ac6ad345427ed1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0514.exe

    Filesize

    383KB

    MD5

    157df330c26f63ffa7d15f56bf261d53

    SHA1

    a3cacc113e8b5d01310bcdb4e24fafd24d1a4d73

    SHA256

    967966ec6e005194b80be5430b60785b7fea99fb290996423fd1b938773a8268

    SHA512

    b97202f88e2a7bf68786868321d25b35cd366676d603270b2978295813b729802ca918b29a5f7def1654912cb83ff62f3c20f962d46d747fa5ac6ad345427ed1

  • memory/2488-1116-0x0000000005380000-0x0000000005390000-memory.dmp

    Filesize

    64KB

  • memory/2488-1115-0x00000000051C0000-0x000000000520B000-memory.dmp

    Filesize

    300KB

  • memory/2488-1114-0x0000000000780000-0x00000000007B2000-memory.dmp

    Filesize

    200KB

  • memory/3820-1091-0x00000000077E0000-0x0000000007DE6000-memory.dmp

    Filesize

    6.0MB

  • memory/3820-1094-0x0000000007FD0000-0x000000000800E000-memory.dmp

    Filesize

    248KB

  • memory/3820-1108-0x000000000A0D0000-0x000000000A5FC000-memory.dmp

    Filesize

    5.2MB

  • memory/3820-1107-0x0000000009F00000-0x000000000A0C2000-memory.dmp

    Filesize

    1.8MB

  • memory/3820-1106-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-1105-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-1104-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-1103-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-1102-0x0000000008AB0000-0x0000000008B00000-memory.dmp

    Filesize

    320KB

  • memory/3820-1101-0x0000000008A10000-0x0000000008A86000-memory.dmp

    Filesize

    472KB

  • memory/3820-1100-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/3820-1099-0x0000000008350000-0x00000000083B6000-memory.dmp

    Filesize

    408KB

  • memory/3820-1098-0x00000000082B0000-0x0000000008342000-memory.dmp

    Filesize

    584KB

  • memory/3820-1096-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-1095-0x0000000008120000-0x000000000816B000-memory.dmp

    Filesize

    300KB

  • memory/3820-1093-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

    Filesize

    72KB

  • memory/3820-1092-0x0000000007E70000-0x0000000007F7A000-memory.dmp

    Filesize

    1.0MB

  • memory/3820-218-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-216-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-214-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-212-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-210-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-179-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/3820-180-0x0000000004980000-0x00000000049C6000-memory.dmp

    Filesize

    280KB

  • memory/3820-181-0x0000000007660000-0x00000000076A4000-memory.dmp

    Filesize

    272KB

  • memory/3820-182-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-183-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-184-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-186-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-185-0x0000000007110000-0x0000000007120000-memory.dmp

    Filesize

    64KB

  • memory/3820-188-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-190-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-192-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-194-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-196-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-198-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-200-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-202-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-204-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-206-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3820-208-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/3868-162-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-134-0x0000000002FF0000-0x000000000300A000-memory.dmp

    Filesize

    104KB

  • memory/3868-140-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/3868-173-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/3868-171-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/3868-139-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/3868-170-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/3868-169-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3868-142-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-168-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-166-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-164-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-174-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3868-141-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-144-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-154-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-156-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-152-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-150-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-148-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-146-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-158-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB

  • memory/3868-138-0x0000000007500000-0x0000000007510000-memory.dmp

    Filesize

    64KB

  • memory/3868-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3868-136-0x0000000004920000-0x0000000004938000-memory.dmp

    Filesize

    96KB

  • memory/3868-135-0x0000000007510000-0x0000000007A0E000-memory.dmp

    Filesize

    5.0MB

  • memory/3868-160-0x0000000004920000-0x0000000004932000-memory.dmp

    Filesize

    72KB