Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 01:19

General

  • Target

    1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe

  • Size

    685KB

  • MD5

    354c85a42efa4053b0dcaec9feb41be3

  • SHA1

    4f05959c72e73ed28d40436010218f72b46ffdbe

  • SHA256

    1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926

  • SHA512

    138b18137a879633b2bf4603e1b86005c2fa7b0b6f6dc70e57181b7f0ea32184480d0583e3e3bcf8c9a379e10f75c695c9f880d4aa25c30fd6ca7ac005846d8a

  • SSDEEP

    12288:pMrSy90t6ss+VnNqL4GEjlX8eoNK6xR4O2UtcL:Tya6vmpFuDS

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
    "C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe

    Filesize

    175KB

    MD5

    e9f9779e92165c69a7112053119e75b4

    SHA1

    87b846a405f18401d20d4c7f304268978a275b81

    SHA256

    6ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80

    SHA512

    bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe

    Filesize

    175KB

    MD5

    e9f9779e92165c69a7112053119e75b4

    SHA1

    87b846a405f18401d20d4c7f304268978a275b81

    SHA256

    6ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80

    SHA512

    bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe

    Filesize

    543KB

    MD5

    633a9200ed34ce8e7a729c20afc19bb5

    SHA1

    02de5622d86a8eb7da44f2b402f6f619d4292237

    SHA256

    a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba

    SHA512

    a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe

    Filesize

    543KB

    MD5

    633a9200ed34ce8e7a729c20afc19bb5

    SHA1

    02de5622d86a8eb7da44f2b402f6f619d4292237

    SHA256

    a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba

    SHA512

    a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe

    Filesize

    175KB

    MD5

    e9f9779e92165c69a7112053119e75b4

    SHA1

    87b846a405f18401d20d4c7f304268978a275b81

    SHA256

    6ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80

    SHA512

    bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe

    Filesize

    175KB

    MD5

    e9f9779e92165c69a7112053119e75b4

    SHA1

    87b846a405f18401d20d4c7f304268978a275b81

    SHA256

    6ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80

    SHA512

    bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe

    Filesize

    543KB

    MD5

    633a9200ed34ce8e7a729c20afc19bb5

    SHA1

    02de5622d86a8eb7da44f2b402f6f619d4292237

    SHA256

    a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba

    SHA512

    a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe

    Filesize

    543KB

    MD5

    633a9200ed34ce8e7a729c20afc19bb5

    SHA1

    02de5622d86a8eb7da44f2b402f6f619d4292237

    SHA256

    a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba

    SHA512

    a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • memory/768-1043-0x0000000000FD0000-0x0000000001002000-memory.dmp

    Filesize

    200KB

  • memory/768-1044-0x0000000004F10000-0x0000000004F50000-memory.dmp

    Filesize

    256KB

  • memory/924-89-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-99-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-97-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-93-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-91-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-108-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/924-109-0x00000000049E0000-0x0000000004A20000-memory.dmp

    Filesize

    256KB

  • memory/924-110-0x00000000049E0000-0x0000000004A20000-memory.dmp

    Filesize

    256KB

  • memory/924-111-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/924-112-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/924-101-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-105-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-107-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-103-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-95-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-87-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-78-0x00000000003C0000-0x00000000003DA000-memory.dmp

    Filesize

    104KB

  • memory/924-79-0x0000000002CB0000-0x0000000002CC8000-memory.dmp

    Filesize

    96KB

  • memory/924-80-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-81-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-83-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/924-85-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

    Filesize

    72KB

  • memory/1548-134-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-154-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-138-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-140-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-142-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-136-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-144-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-146-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-148-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-150-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-152-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-132-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-156-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-158-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-229-0x0000000000240000-0x000000000028B000-memory.dmp

    Filesize

    300KB

  • memory/1548-232-0x0000000007180000-0x00000000071C0000-memory.dmp

    Filesize

    256KB

  • memory/1548-234-0x0000000007180000-0x00000000071C0000-memory.dmp

    Filesize

    256KB

  • memory/1548-1034-0x0000000007180000-0x00000000071C0000-memory.dmp

    Filesize

    256KB

  • memory/1548-130-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-126-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-128-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-125-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/1548-124-0x0000000004BD0000-0x0000000004C14000-memory.dmp

    Filesize

    272KB

  • memory/1548-123-0x0000000004A80000-0x0000000004AC6000-memory.dmp

    Filesize

    280KB