Analysis

  • max time kernel
    86s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:12

General

  • Target

    0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe

  • Size

    686KB

  • MD5

    a9f1d139268416c799550a0741aeadbb

  • SHA1

    a2c3f3ff9443023114b94add4f7a30c165edd50c

  • SHA256

    0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55

  • SHA512

    98c777aad810b357603e82505fa13681ebe777f71cdf6d4a94a7272f9516429d3b338f3256b12d9d41855725f73964866db227bef6cb18c69bb3e8e377ce59d8

  • SSDEEP

    12288:9MrQy903BCHk07CUdCa9RW4mTc73ZR+OYmMJuH64N4k4kk+B6q9wcK:Ny5XeU00+JuiiDDK

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
    "C:\Users\Admin\AppData\Local\Temp\0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe

    Filesize

    175KB

    MD5

    2bf222e554ef91aa5164f6939ff97f4b

    SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

    SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

    SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657032.exe

    Filesize

    175KB

    MD5

    2bf222e554ef91aa5164f6939ff97f4b

    SHA1

    6f9ff75bc7226b6f443959f6687e0807e8f878fd

    SHA256

    c0f85885c32b21daba984eb3702115b9fc51f521967bb26c5aa8d0c31b7bda5e

    SHA512

    36bc5169436cfd2826c95b25fca98c61f28bb3ee7586845ea6d2337834445b3fceab43067595c10cb75aad58626fcebecce8c4841fc4f6260d0df71519049cd7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe

    Filesize

    544KB

    MD5

    69d2c7e7ea6c689537148803cac81c1b

    SHA1

    659e093e72513e2d97b677814318c34c65ea9ad7

    SHA256

    fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b

    SHA512

    9b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595980.exe

    Filesize

    544KB

    MD5

    69d2c7e7ea6c689537148803cac81c1b

    SHA1

    659e093e72513e2d97b677814318c34c65ea9ad7

    SHA256

    fcfba73e7556e540a132846702b6fcd9d9a6413792bb6a51016ce62ac9cc142b

    SHA512

    9b559f96767faddfdabb4afd919b6f5352fc6636ef8cdaaa4a9c04e1bde1c2d57a3ec10c1136c94817b353a7f1ba03515baf4464bd0dc5e2182f475383496ba1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8040.exe

    Filesize

    325KB

    MD5

    68a953b4ff629715b2af924533868e74

    SHA1

    ebaae606c35abff022e31dc7a837caefbe1643bc

    SHA256

    3d95a4d67ddac1ff9da5bcac088b92c37ca0dac25511c50437ce56ec2ca1938c

    SHA512

    194d6eba6ae4ee4a4f6abbfb311c23f65e4463365f02fdd45a06f76a6886add3f885e6f82e4c60cd28e014bf063b405d7b0f4fec289f9777272638cba7f21261

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6243.exe

    Filesize

    384KB

    MD5

    a679124bde8474a989fc64ba0afe6736

    SHA1

    16d715362070afec5a39dd72b92362c2b48fbd04

    SHA256

    01d6b0c952579896a12d8d3b2561dbd5123cfd2c2a7d382cbacf47974a783a40

    SHA512

    5bafbc0c604472ddde4e9997c0edddb66ac3f05e94b5b195cbd4d844dcecbd7b414ce733fda01ccc4188bbe036507d4ff8963fc77f48cea0fa6a60a19d181597

  • memory/2968-1102-0x0000000007FB0000-0x00000000080BA000-memory.dmp

    Filesize

    1.0MB

  • memory/2968-1101-0x0000000007990000-0x0000000007FA8000-memory.dmp

    Filesize

    6.1MB

  • memory/2968-216-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-214-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-203-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-202-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-1115-0x00000000091D0000-0x00000000096FC000-memory.dmp

    Filesize

    5.2MB

  • memory/2968-1114-0x0000000009000000-0x00000000091C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2968-1113-0x0000000008FA0000-0x0000000008FF0000-memory.dmp

    Filesize

    320KB

  • memory/2968-1112-0x0000000008F00000-0x0000000008F76000-memory.dmp

    Filesize

    472KB

  • memory/2968-204-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-1111-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-1110-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-1109-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-1108-0x0000000008460000-0x00000000084C6000-memory.dmp

    Filesize

    408KB

  • memory/2968-1107-0x00000000083C0000-0x0000000008452000-memory.dmp

    Filesize

    584KB

  • memory/2968-1105-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-1104-0x00000000080E0000-0x000000000811C000-memory.dmp

    Filesize

    240KB

  • memory/2968-1103-0x00000000080C0000-0x00000000080D2000-memory.dmp

    Filesize

    72KB

  • memory/2968-218-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-228-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-226-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-224-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-191-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-192-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-194-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-196-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-198-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-201-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-199-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/2968-222-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-1116-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2968-220-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-206-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-208-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-210-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/2968-212-0x00000000049C0000-0x00000000049FF000-memory.dmp

    Filesize

    252KB

  • memory/3832-1122-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/3832-1123-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/5092-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/5092-170-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-148-0x00000000072F0000-0x0000000007894000-memory.dmp

    Filesize

    5.6MB

  • memory/5092-152-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/5092-150-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/5092-186-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/5092-184-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/5092-151-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/5092-183-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/5092-182-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/5092-154-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-180-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-178-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-176-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-174-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-172-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-168-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-166-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-164-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-162-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-160-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-149-0x0000000002B80000-0x0000000002BAD000-memory.dmp

    Filesize

    180KB

  • memory/5092-158-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-156-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/5092-153-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB