Analysis

  • max time kernel
    51s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/03/2023, 13:42

General

  • Target

    45b56eb4f3918409997b6d49f52e0eb318e62f8c488ae33a70e5c058cca7c196.exe

  • Size

    720KB

  • MD5

    c3494d55dae2b75f110710260ec79a74

  • SHA1

    b7574fefcd5848336327b4393aff5637dc0477be

  • SHA256

    45b56eb4f3918409997b6d49f52e0eb318e62f8c488ae33a70e5c058cca7c196

  • SHA512

    53140f98042569b0522915cb3ce4cbb1d53e485c8cef2098a0937b53fd66ab93b503ddb05b99dc055f42b9121eaa7963997abd4904372ba0db0d6f9b919bdf42

  • SSDEEP

    12288:1PVeNcnGiCOPSp5wLsiIF9Kc7MnMGpZsOLQV2B98w18GRF4/Nl:qNcnGi9PSPIRIIMOLQV2CGb4/Nl

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45b56eb4f3918409997b6d49f52e0eb318e62f8c488ae33a70e5c058cca7c196.exe
    "C:\Users\Admin\AppData\Local\Temp\45b56eb4f3918409997b6d49f52e0eb318e62f8c488ae33a70e5c058cca7c196.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKo9964.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKo9964.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr134897.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr134897.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku898866.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku898866.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr579000.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr579000.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr579000.exe

    Filesize

    175KB

    MD5

    9c4e69eff1ffd131e8e134943b5b3c4c

    SHA1

    c282e02305a48f3d37e3ff39f6219bf0fce0f334

    SHA256

    04057838eef9b9ccfd786bf0dca3656a2f157035644f52f071989b19da01e078

    SHA512

    b090ab981bb91466b7cd5ec0437abc5708cdbcd63dc9c89d24ef49418d9932373d208170b4d0d77677577c5b9655f465a963a23b2adf4bb72da1682a3e5b9f0c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr579000.exe

    Filesize

    175KB

    MD5

    9c4e69eff1ffd131e8e134943b5b3c4c

    SHA1

    c282e02305a48f3d37e3ff39f6219bf0fce0f334

    SHA256

    04057838eef9b9ccfd786bf0dca3656a2f157035644f52f071989b19da01e078

    SHA512

    b090ab981bb91466b7cd5ec0437abc5708cdbcd63dc9c89d24ef49418d9932373d208170b4d0d77677577c5b9655f465a963a23b2adf4bb72da1682a3e5b9f0c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKo9964.exe

    Filesize

    410KB

    MD5

    99acbff6a0d9d84d3fb0cdd2280b9a7e

    SHA1

    5626f25f41a9844f3da6e010c527d0893e18cdef

    SHA256

    330c5223d8454abf7f92052b113a480ffee816426240b2c8e1218b2a8336d1d3

    SHA512

    3be4c385ad1954fe2c57150cec65c832aafea72861f5c49b41da7ab1027e1ccba4e1e2bb03f6297118d41475d02c22c713c9a0d5bbdde8a10f04930095dfa3c8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKo9964.exe

    Filesize

    410KB

    MD5

    99acbff6a0d9d84d3fb0cdd2280b9a7e

    SHA1

    5626f25f41a9844f3da6e010c527d0893e18cdef

    SHA256

    330c5223d8454abf7f92052b113a480ffee816426240b2c8e1218b2a8336d1d3

    SHA512

    3be4c385ad1954fe2c57150cec65c832aafea72861f5c49b41da7ab1027e1ccba4e1e2bb03f6297118d41475d02c22c713c9a0d5bbdde8a10f04930095dfa3c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr134897.exe

    Filesize

    11KB

    MD5

    7d2cfcff3ca68fcc3095f17a1c88dab2

    SHA1

    40d0d506888ee124c6165f52680604988fe6a403

    SHA256

    41164d42beb746ade5ed1304a5c48494b3f59c440644cc15940e9dec33d9e3b9

    SHA512

    4e8cb9ed743e39b1ab652e882304e4fe9806437d6f4cb36443b455bd3f0340cc9b3109bc16f3bcb3226db4835f1a29c81d72baf1e6daaf39182d133d6beeabff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr134897.exe

    Filesize

    11KB

    MD5

    7d2cfcff3ca68fcc3095f17a1c88dab2

    SHA1

    40d0d506888ee124c6165f52680604988fe6a403

    SHA256

    41164d42beb746ade5ed1304a5c48494b3f59c440644cc15940e9dec33d9e3b9

    SHA512

    4e8cb9ed743e39b1ab652e882304e4fe9806437d6f4cb36443b455bd3f0340cc9b3109bc16f3bcb3226db4835f1a29c81d72baf1e6daaf39182d133d6beeabff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku898866.exe

    Filesize

    384KB

    MD5

    a79fcdfaa6a4a5013a511132afe0e250

    SHA1

    f0bd92a79445f73a5ff8225179598105ce440684

    SHA256

    8b5f44671f7b976ecb13b500bffd2cc0270bddc6276050be3e7168caa0bf7b41

    SHA512

    40708f8f00c92aaa70db9856399fd61cd065a4da6c82a8d0ec70f13c62da3b83251e96bf2862578f1f5d5d16dcd663b97406f0e3fcea9d5f190df5b54480bc2e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku898866.exe

    Filesize

    384KB

    MD5

    a79fcdfaa6a4a5013a511132afe0e250

    SHA1

    f0bd92a79445f73a5ff8225179598105ce440684

    SHA256

    8b5f44671f7b976ecb13b500bffd2cc0270bddc6276050be3e7168caa0bf7b41

    SHA512

    40708f8f00c92aaa70db9856399fd61cd065a4da6c82a8d0ec70f13c62da3b83251e96bf2862578f1f5d5d16dcd663b97406f0e3fcea9d5f190df5b54480bc2e

  • memory/1012-130-0x00000000068A0000-0x000000000692B000-memory.dmp

    Filesize

    556KB

  • memory/1012-140-0x0000000000400000-0x0000000002BE1000-memory.dmp

    Filesize

    39.9MB

  • memory/2696-139-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/3908-186-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-198-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-149-0x0000000007120000-0x0000000007164000-memory.dmp

    Filesize

    272KB

  • memory/3908-150-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-151-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-152-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-154-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-153-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-156-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-158-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-160-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-162-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-164-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-166-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-168-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-170-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-172-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-174-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-176-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-178-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-180-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-182-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-184-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-147-0x0000000004830000-0x0000000004876000-memory.dmp

    Filesize

    280KB

  • memory/3908-188-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-190-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-192-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-194-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-196-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-148-0x00000000071D0000-0x00000000076CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3908-200-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-202-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-204-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-206-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-208-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-210-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-212-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-214-0x0000000007120000-0x000000000715F000-memory.dmp

    Filesize

    252KB

  • memory/3908-1059-0x0000000007CE0000-0x00000000082E6000-memory.dmp

    Filesize

    6.0MB

  • memory/3908-1060-0x0000000007720000-0x000000000782A000-memory.dmp

    Filesize

    1.0MB

  • memory/3908-1061-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/3908-1062-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/3908-1063-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/3908-1064-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-1067-0x0000000007B60000-0x0000000007BF2000-memory.dmp

    Filesize

    584KB

  • memory/3908-1068-0x0000000007C00000-0x0000000007C66000-memory.dmp

    Filesize

    408KB

  • memory/3908-1069-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-1070-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-1071-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/3908-1072-0x0000000006C40000-0x0000000006CB6000-memory.dmp

    Filesize

    472KB

  • memory/3908-1073-0x000000000AE90000-0x000000000AEE0000-memory.dmp

    Filesize

    320KB

  • memory/3908-1074-0x000000000AEE0000-0x000000000B0A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3908-146-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/3908-1075-0x000000000B0B0000-0x000000000B5DC000-memory.dmp

    Filesize

    5.2MB

  • memory/4856-1081-0x00000000002C0000-0x00000000002F2000-memory.dmp

    Filesize

    200KB

  • memory/4856-1083-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/4856-1084-0x0000000004CF0000-0x0000000004D3B000-memory.dmp

    Filesize

    300KB