Analysis

  • max time kernel
    79s
  • max time network
    81s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/03/2023, 20:02

General

  • Target

    e09daae4b3c8fb11eb350d4b1556924178d9481372157e8a465b6492b7721268.exe

  • Size

    722KB

  • MD5

    7fb886b0273af976fb5362809c401061

  • SHA1

    4e07985916f2c694dd9efc771c0c7fb2f9d4a047

  • SHA256

    e09daae4b3c8fb11eb350d4b1556924178d9481372157e8a465b6492b7721268

  • SHA512

    3338fed5b75a3270ae7edac2136d3a6cf23a9dead240ef728a086f8ecf2a524696a4fc4fb2435f258add5c847457d26c3de81a0aedddf5639b558dd6c153c9c9

  • SSDEEP

    12288:M1J7ppIKstg6eUo1UbOYIPrdHK939cA3mQo2PC5YCn9yAMX6w2Im3Gn9u:M1mKsq6ajPVQoY69ydqws3GnY

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

viza

C2

193.233.20.32:4125

Attributes
  • auth_value

    153a106a89fae7251f2dc17be2eb5720

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e09daae4b3c8fb11eb350d4b1556924178d9481372157e8a465b6492b7721268.exe
    "C:\Users\Admin\AppData\Local\Temp\e09daae4b3c8fb11eb350d4b1556924178d9481372157e8a465b6492b7721268.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr583688.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr583688.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2792

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr583688.exe

          Filesize

          175KB

          MD5

          ee59ed8d569a7ffd44c985c447f60e1f

          SHA1

          7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

          SHA256

          6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

          SHA512

          0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr583688.exe

          Filesize

          175KB

          MD5

          ee59ed8d569a7ffd44c985c447f60e1f

          SHA1

          7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

          SHA256

          6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

          SHA512

          0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe

          Filesize

          412KB

          MD5

          3dd0d54d5d94af4887dc5b90ff5e3816

          SHA1

          27accb2c0431fb60035198c5c30b70accebdddaf

          SHA256

          8982fb60f5e03018746e24758f03bd15e785e754791b66bbf658afab67fc4134

          SHA512

          30d5746d4860a52608b9ea26eed99e0e2bacf9383f16aec84bcdc9cac3f9903c98860d676071e5c13069ebf6f5e974b7c9b62fd31b8a474732c1eb0340a3892c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe

          Filesize

          412KB

          MD5

          3dd0d54d5d94af4887dc5b90ff5e3816

          SHA1

          27accb2c0431fb60035198c5c30b70accebdddaf

          SHA256

          8982fb60f5e03018746e24758f03bd15e785e754791b66bbf658afab67fc4134

          SHA512

          30d5746d4860a52608b9ea26eed99e0e2bacf9383f16aec84bcdc9cac3f9903c98860d676071e5c13069ebf6f5e974b7c9b62fd31b8a474732c1eb0340a3892c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe

          Filesize

          383KB

          MD5

          2a7799dac75250c9810cb1c12e5cce97

          SHA1

          f0809023d562e4ee2ed5812b36432650e49f1338

          SHA256

          9e90e637f9d9aa955831c50519ba9200e00e69af13d9991e805326a304a91927

          SHA512

          69891029aeec8f4fe87a41eb1a8ee5384e8d4e503093f6293138a7c49be941a8110f63b55a471c832deef1b2113b90de8f7eec4ecb913d478fcfce3fb3a3e198

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe

          Filesize

          383KB

          MD5

          2a7799dac75250c9810cb1c12e5cce97

          SHA1

          f0809023d562e4ee2ed5812b36432650e49f1338

          SHA256

          9e90e637f9d9aa955831c50519ba9200e00e69af13d9991e805326a304a91927

          SHA512

          69891029aeec8f4fe87a41eb1a8ee5384e8d4e503093f6293138a7c49be941a8110f63b55a471c832deef1b2113b90de8f7eec4ecb913d478fcfce3fb3a3e198

        • memory/2792-1082-0x0000000005AC0000-0x0000000005AD0000-memory.dmp

          Filesize

          64KB

        • memory/2792-1081-0x0000000005990000-0x00000000059DB000-memory.dmp

          Filesize

          300KB

        • memory/2792-1080-0x0000000000F60000-0x0000000000F92000-memory.dmp

          Filesize

          200KB

        • memory/4092-137-0x0000000000400000-0x0000000002BE2000-memory.dmp

          Filesize

          39.9MB

        • memory/4092-128-0x00000000069F0000-0x0000000006A7C000-memory.dmp

          Filesize

          560KB

        • memory/4108-185-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-197-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-149-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-151-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-153-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-155-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-157-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-159-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-161-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-163-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-165-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-167-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-168-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-170-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-171-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-173-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-175-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-177-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-179-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-181-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-183-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-147-0x00000000076A0000-0x00000000076E4000-memory.dmp

          Filesize

          272KB

        • memory/4108-187-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-189-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-191-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-193-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-195-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-148-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-199-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-201-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-203-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-205-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-207-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-209-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-211-0x00000000076A0000-0x00000000076DF000-memory.dmp

          Filesize

          252KB

        • memory/4108-1056-0x0000000007CF0000-0x00000000082F6000-memory.dmp

          Filesize

          6.0MB

        • memory/4108-1057-0x0000000007720000-0x000000000782A000-memory.dmp

          Filesize

          1.0MB

        • memory/4108-1058-0x0000000007860000-0x0000000007872000-memory.dmp

          Filesize

          72KB

        • memory/4108-1059-0x0000000007880000-0x00000000078BE000-memory.dmp

          Filesize

          248KB

        • memory/4108-1061-0x00000000079D0000-0x0000000007A1B000-memory.dmp

          Filesize

          300KB

        • memory/4108-1062-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-1064-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-1065-0x0000000007B60000-0x0000000007BC6000-memory.dmp

          Filesize

          408KB

        • memory/4108-1066-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-1067-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-1068-0x0000000008830000-0x00000000088C2000-memory.dmp

          Filesize

          584KB

        • memory/4108-1069-0x0000000008A10000-0x0000000008A86000-memory.dmp

          Filesize

          472KB

        • memory/4108-1070-0x0000000008A90000-0x0000000008AE0000-memory.dmp

          Filesize

          320KB

        • memory/4108-1071-0x0000000008C40000-0x0000000008E02000-memory.dmp

          Filesize

          1.8MB

        • memory/4108-1072-0x0000000008E20000-0x000000000934C000-memory.dmp

          Filesize

          5.2MB

        • memory/4108-146-0x0000000007160000-0x000000000765E000-memory.dmp

          Filesize

          5.0MB

        • memory/4108-145-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4108-144-0x0000000002C60000-0x0000000002CAB000-memory.dmp

          Filesize

          300KB

        • memory/4108-143-0x0000000004BA0000-0x0000000004BE6000-memory.dmp

          Filesize

          280KB

        • memory/4108-1074-0x0000000004BF0000-0x0000000004C00000-memory.dmp

          Filesize

          64KB

        • memory/4124-136-0x0000000000290000-0x000000000029A000-memory.dmp

          Filesize

          40KB