Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 02:12

General

  • Target

    0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe

  • Size

    686KB

  • MD5

    a9f1d139268416c799550a0741aeadbb

  • SHA1

    a2c3f3ff9443023114b94add4f7a30c165edd50c

  • SHA256

    0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55

  • SHA512

    98c777aad810b357603e82505fa13681ebe777f71cdf6d4a94a7272f9516429d3b338f3256b12d9d41855725f73964866db227bef6cb18c69bb3e8e377ce59d8

  • SSDEEP

    12288:9MrQy903BCHk07CUdCa9RW4mTc73ZR+OYmMJuH64N4k4kk+B6q9wcK:Ny5XeU00+JuiiDDK

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
    "C:\Users\Admin\AppData\Local\Temp\0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe

    Filesize

    175KB

    MD5

    2bf222e554ef91aa5164f6939ff97f4b

    SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

    SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

    SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe

    Filesize

    175KB

    MD5

    2bf222e554ef91aa5164f6939ff97f4b

    SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

    SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

    SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe

    Filesize

    544KB

    MD5

    69d2c7e7ea6c689537148803cac81c1b

    SHA1

    659e093e72513e2d97b677814318c34c65ea9ad7

    SHA256

    fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b

    SHA512

    9b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe

    Filesize

    544KB

    MD5

    69d2c7e7ea6c689537148803cac81c1b

    SHA1

    659e093e72513e2d97b677814318c34c65ea9ad7

    SHA256

    fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b

    SHA512

    9b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe

    Filesize

    175KB

    MD5

    2bf222e554ef91aa5164f6939ff97f4b

    SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

    SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

    SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe

    Filesize

    175KB

    MD5

    2bf222e554ef91aa5164f6939ff97f4b

    SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

    SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

    SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe

    Filesize

    544KB

    MD5

    69d2c7e7ea6c689537148803cac81c1b

    SHA1

    659e093e72513e2d97b677814318c34c65ea9ad7

    SHA256

    fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b

    SHA512

    9b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe

    Filesize

    544KB

    MD5

    69d2c7e7ea6c689537148803cac81c1b

    SHA1

    659e093e72513e2d97b677814318c34c65ea9ad7

    SHA256

    fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b

    SHA512

    9b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • memory/900-143-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-149-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-1034-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/900-161-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-159-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-157-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-155-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-153-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-151-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-147-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-145-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-141-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-139-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-137-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-135-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-131-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-133-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/900-132-0x0000000007230000-0x0000000007270000-memory.dmp

    Filesize

    256KB

  • memory/900-123-0x0000000003260000-0x00000000032A6000-memory.dmp

    Filesize

    280KB

  • memory/900-124-0x00000000048A0000-0x00000000048E4000-memory.dmp

    Filesize

    272KB

  • memory/900-125-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-126-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-128-0x00000000048A0000-0x00000000048DF000-memory.dmp

    Filesize

    252KB

  • memory/900-129-0x0000000000380000-0x00000000003CB000-memory.dmp

    Filesize

    300KB

  • memory/1100-1043-0x0000000000050000-0x0000000000082000-memory.dmp

    Filesize

    200KB

  • memory/1100-1044-0x0000000000880000-0x00000000008C0000-memory.dmp

    Filesize

    256KB

  • memory/1296-108-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-92-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-106-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-94-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-112-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/1296-82-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-111-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/1296-109-0x0000000007470000-0x00000000074B0000-memory.dmp

    Filesize

    256KB

  • memory/1296-104-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-110-0x0000000007470000-0x00000000074B0000-memory.dmp

    Filesize

    256KB

  • memory/1296-86-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-90-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-96-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-102-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-100-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-98-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-81-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-80-0x0000000003170000-0x0000000003188000-memory.dmp

    Filesize

    96KB

  • memory/1296-79-0x0000000003130000-0x000000000314A000-memory.dmp

    Filesize

    104KB

  • memory/1296-78-0x00000000002D0000-0x00000000002FD000-memory.dmp

    Filesize

    180KB

  • memory/1296-88-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB

  • memory/1296-84-0x0000000003170000-0x0000000003182000-memory.dmp

    Filesize

    72KB