Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:19

General

  • Target

    1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe

  • Size

    685KB

  • MD5

    354c85a42efa4053b0dcaec9feb41be3

  • SHA1

    4f05959c72e73ed28d40436010218f72b46ffdbe

  • SHA256

    1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926

  • SHA512

    138b18137a879633b2bf4603e1b86005c2fa7b0b6f6dc70e57181b7f0ea32184480d0583e3e3bcf8c9a379e10f75c695c9f880d4aa25c30fd6ca7ac005846d8a

  • SSDEEP

    12288:pMrSy90t6ss+VnNqL4GEjlX8eoNK6xR4O2UtcL:Tya6vmpFuDS

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
    "C:\Users\Admin\AppData\Local\Temp\1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe

    Filesize

    175KB

    MD5

    e9f9779e92165c69a7112053119e75b4

    SHA1

    87b846a405f18401d20d4c7f304268978a275b81

    SHA256

    6ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80

    SHA512

    bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747782.exe

    Filesize

    175KB

    MD5

    e9f9779e92165c69a7112053119e75b4

    SHA1

    87b846a405f18401d20d4c7f304268978a275b81

    SHA256

    6ca76acde3dfbd859ee8b14216c6774a552f40343b5d6117a15b7a882f9caa80

    SHA512

    bf2af2abbfcd1c6b437120eab4465edb2fcb868e32233b043bd8beb411e19746f485cf7d4a01aaf91be8ecb5905141103fa0239547d6029cd0166ab0480ab588

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe

    Filesize

    543KB

    MD5

    633a9200ed34ce8e7a729c20afc19bb5

    SHA1

    02de5622d86a8eb7da44f2b402f6f619d4292237

    SHA256

    a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba

    SHA512

    a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367709.exe

    Filesize

    543KB

    MD5

    633a9200ed34ce8e7a729c20afc19bb5

    SHA1

    02de5622d86a8eb7da44f2b402f6f619d4292237

    SHA256

    a854e47dacf20c1058cf3b47ed691df6d33f45ddbc9419e6401120ef05c96fba

    SHA512

    a78cf34358ea25503f6854b6e4dc6feeb52072f0586f957fc3758f867cdac1108c6b2154efa1dc2890505f113a47fb3f2526a534e702b3fbac7c3fd29e806754

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6913.exe

    Filesize

    325KB

    MD5

    fb0039dd07a09f950d3e082befb74985

    SHA1

    52213dfee0e2214edf1b81ec7c7d04e8922f2e4b

    SHA256

    ead0f2c332e8aabb31c582ba4f014f198bc0258675a168bd961785a5b8d59467

    SHA512

    5ada663125d2c6f26cb3831289e505ba6399c2eb00f16d641cdf95fad1edfb3005efa591077f93095e19e62d15707fe652797e54df1330ecb19725b57598cd54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8195.exe

    Filesize

    384KB

    MD5

    99f1d755774dc0429dbbdf5b991c14b3

    SHA1

    0c29557ec7d0fbf1eed1d25eb9291a926c8ab3bd

    SHA256

    a151f27cd071336db42fa7ae7457b44ccccfab8c52b3d47c1e3c754767f7f6cb

    SHA512

    699e5653c10e0a21e044b633ecbb229c09ff8f5a803937775246872907596945b9f09e92dae1139cd3b87849baac98399444691e7298ed00ff48d3fc4c9bd0f1

  • memory/2160-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp

    Filesize

    180KB

  • memory/2160-149-0x0000000007250000-0x0000000007260000-memory.dmp

    Filesize

    64KB

  • memory/2160-150-0x0000000007260000-0x0000000007804000-memory.dmp

    Filesize

    5.6MB

  • memory/2160-151-0x0000000007250000-0x0000000007260000-memory.dmp

    Filesize

    64KB

  • memory/2160-152-0x0000000007250000-0x0000000007260000-memory.dmp

    Filesize

    64KB

  • memory/2160-153-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-154-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-156-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-158-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-160-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-162-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-164-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-166-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-168-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-170-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-172-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-174-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-176-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-178-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-180-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/2160-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/2160-182-0x0000000007250000-0x0000000007260000-memory.dmp

    Filesize

    64KB

  • memory/2160-183-0x0000000007250000-0x0000000007260000-memory.dmp

    Filesize

    64KB

  • memory/2160-185-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/3084-190-0x0000000002C70000-0x0000000002CBB000-memory.dmp

    Filesize

    300KB

  • memory/3084-191-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-192-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-193-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-194-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-196-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-198-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-200-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-202-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-204-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-206-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-208-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-210-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-212-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-214-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-216-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-218-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-220-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-224-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-226-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-222-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3084-240-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-1100-0x00000000079C0000-0x0000000007FD8000-memory.dmp

    Filesize

    6.1MB

  • memory/3084-1101-0x0000000007FE0000-0x00000000080EA000-memory.dmp

    Filesize

    1.0MB

  • memory/3084-1102-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/3084-1103-0x00000000080F0000-0x000000000812C000-memory.dmp

    Filesize

    240KB

  • memory/3084-1104-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-1106-0x00000000083C0000-0x0000000008452000-memory.dmp

    Filesize

    584KB

  • memory/3084-1107-0x0000000008460000-0x00000000084C6000-memory.dmp

    Filesize

    408KB

  • memory/3084-1108-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-1109-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-1110-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/3084-1111-0x0000000008F00000-0x0000000008F76000-memory.dmp

    Filesize

    472KB

  • memory/3084-1112-0x0000000008F90000-0x0000000008FE0000-memory.dmp

    Filesize

    320KB

  • memory/3084-1113-0x0000000009020000-0x00000000091E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3084-1114-0x00000000091F0000-0x000000000971C000-memory.dmp

    Filesize

    5.2MB

  • memory/3084-1117-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4984-1121-0x0000000000E90000-0x0000000000EC2000-memory.dmp

    Filesize

    200KB

  • memory/4984-1122-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

    Filesize

    64KB