Analysis

  • max time kernel
    56s
  • max time network
    102s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-04-2023 05:18

General

  • Target

    eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe

  • Size

    1.2MB

  • MD5

    011763591f8c51fea5468dfe23979425

  • SHA1

    a89ba6bb9ba4001cc2eeb848d83098e80350a4df

  • SHA256

    eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b

  • SHA512

    d917b3619cf6770e6bbdc848bceb9c2a81260cb9320e7ffe043eb6a6f81ebadb62d5bbdd0f0fe6f6ab46a4a776073b3fe529a032044cfd2f2055b80934c9f013

  • SSDEEP

    24576:kyUVd7Ilh+TZnE1Km5OEzFaj3IIABRxD3aFqFDYyWJ8gCKrM6VFqrXa:zGpIlh+t+55OEuIIAB/D3aFqhYz6nCrq

Malware Config

Extracted

Family

redline

Botnet

soft

C2

77.91.124.146:4121

Attributes
  • auth_value

    e65663e455bca3c5699650b66e76ceaa

Extracted

Family

redline

Botnet

lenor

C2

77.91.124.146:4121

Attributes
  • auth_value

    e10993d8b80b7caba480ad0cca8e09d7

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe
    "C:\Users\Admin\AppData\Local\Temp\eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za957394.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za957394.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za892303.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za892303.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za238737.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za238737.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4472
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8812.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8812.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1366pY.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1366pY.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2836
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w90kb32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w90kb32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4072
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRrIq86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRrIq86.exe
        3⤵
        • Executes dropped EXE
        PID:1792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 956
          4⤵
          • Program crash
          PID:2612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za957394.exe

    Filesize

    1.0MB

    MD5

    8fcd21d4a208a85a6869b13b04eb0f0d

    SHA1

    76bab41a1732079a01a1d25a4675b3ac9f69bb6c

    SHA256

    5ca41ccc1a3f2180bd72060c5e300d9d36fcf522ab261a4cb237a284ef908e18

    SHA512

    0407786cffe9ce416c47fa7e16ef97092004a20a159ccf920710d929bf01eec442270f79e3b926d0fc0be05eacec89593c3336880ab673f49e1014feccd95cf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za957394.exe

    Filesize

    1.0MB

    MD5

    8fcd21d4a208a85a6869b13b04eb0f0d

    SHA1

    76bab41a1732079a01a1d25a4675b3ac9f69bb6c

    SHA256

    5ca41ccc1a3f2180bd72060c5e300d9d36fcf522ab261a4cb237a284ef908e18

    SHA512

    0407786cffe9ce416c47fa7e16ef97092004a20a159ccf920710d929bf01eec442270f79e3b926d0fc0be05eacec89593c3336880ab673f49e1014feccd95cf8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRrIq86.exe

    Filesize

    168KB

    MD5

    70f5d14a5d83abef0423bd9b249e1441

    SHA1

    81063b136fbcccadc5a12eede03569e20f69aab8

    SHA256

    8a3fd457cafac3b2c57f2a33c34d0e19429ebe4d0126139d725d508848fe116e

    SHA512

    bfd4308da8a89f0375c339f1b6e29d1786b7ca389d4d2ddffb41cbe88406e02fad2c1df1ca1f7d7b0b2ee0bbb2106ec53f6a39dd765f7fb9073464179a60706d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRrIq86.exe

    Filesize

    168KB

    MD5

    70f5d14a5d83abef0423bd9b249e1441

    SHA1

    81063b136fbcccadc5a12eede03569e20f69aab8

    SHA256

    8a3fd457cafac3b2c57f2a33c34d0e19429ebe4d0126139d725d508848fe116e

    SHA512

    bfd4308da8a89f0375c339f1b6e29d1786b7ca389d4d2ddffb41cbe88406e02fad2c1df1ca1f7d7b0b2ee0bbb2106ec53f6a39dd765f7fb9073464179a60706d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za892303.exe

    Filesize

    904KB

    MD5

    8ce532759c9feefc14b166e6e4cc65be

    SHA1

    66de13ef491e95ba2feb0e04feac6cc812ca0f1a

    SHA256

    c1a3c6d0dba3da7b6b679264ee19b156c3f54dd01e699ddf2f8461d54f387571

    SHA512

    bebba8a32b98e8d772dae50b6c940acd6b76eb94f5ab558754d309819a47d864ca76132e9cdf19c2476aa069c038893581a815813588c39d25e6497855f21d4b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za892303.exe

    Filesize

    904KB

    MD5

    8ce532759c9feefc14b166e6e4cc65be

    SHA1

    66de13ef491e95ba2feb0e04feac6cc812ca0f1a

    SHA256

    c1a3c6d0dba3da7b6b679264ee19b156c3f54dd01e699ddf2f8461d54f387571

    SHA512

    bebba8a32b98e8d772dae50b6c940acd6b76eb94f5ab558754d309819a47d864ca76132e9cdf19c2476aa069c038893581a815813588c39d25e6497855f21d4b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w90kb32.exe

    Filesize

    588KB

    MD5

    e336ef40bb19e52c73e334f1b7785664

    SHA1

    a06de7644ba306c1e1a742278da49bf9f373b063

    SHA256

    ce65e8ad6c35db1bd297b7bd894e9387802471e0c2cca21d8f35939441ffd617

    SHA512

    3b9066325ce21ea915fc387413e21b13b9eeafee2915929c59d59c6e6a062b39ccd9c2d38334e13cdb87d5a2b0b64019bce0da696a9267650f0a86b286b367fe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w90kb32.exe

    Filesize

    588KB

    MD5

    e336ef40bb19e52c73e334f1b7785664

    SHA1

    a06de7644ba306c1e1a742278da49bf9f373b063

    SHA256

    ce65e8ad6c35db1bd297b7bd894e9387802471e0c2cca21d8f35939441ffd617

    SHA512

    3b9066325ce21ea915fc387413e21b13b9eeafee2915929c59d59c6e6a062b39ccd9c2d38334e13cdb87d5a2b0b64019bce0da696a9267650f0a86b286b367fe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za238737.exe

    Filesize

    386KB

    MD5

    555ab5fe6976df57e808d207c27a684d

    SHA1

    b8b4662a9cc9c3e3c079e220b84ebd03c245c107

    SHA256

    f0ddfca65408b9e21b484438eb0702d200dc90bcb5c152c0aff49860603250d6

    SHA512

    d50d927a76ef16ecbf8bfdbb2e2cd37fa6e690d185258b42529c204bb1cd17ad4cc71a001813b48d123f3f14408b059b5aa0a838e1a17f819bad41caf61d8aa9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za238737.exe

    Filesize

    386KB

    MD5

    555ab5fe6976df57e808d207c27a684d

    SHA1

    b8b4662a9cc9c3e3c079e220b84ebd03c245c107

    SHA256

    f0ddfca65408b9e21b484438eb0702d200dc90bcb5c152c0aff49860603250d6

    SHA512

    d50d927a76ef16ecbf8bfdbb2e2cd37fa6e690d185258b42529c204bb1cd17ad4cc71a001813b48d123f3f14408b059b5aa0a838e1a17f819bad41caf61d8aa9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8812.exe

    Filesize

    11KB

    MD5

    b56255d57ccfa39a05f39a20ee60cc0a

    SHA1

    af80c1eecfabcdd48fece68cec63d3e15fb20b80

    SHA256

    288ed88964e563607ae87c0e8f825e2cf64f1b3378cf2cba47c2d72d9a484055

    SHA512

    b861b16a21c5abb6d6afd1949a80f0c2179eed779fb768fa3ba6868b0f50da0c4f75c3515662cba0e591c503d5ca2c68ae8c1f40e7570aebe9e280288d88060f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8812.exe

    Filesize

    11KB

    MD5

    b56255d57ccfa39a05f39a20ee60cc0a

    SHA1

    af80c1eecfabcdd48fece68cec63d3e15fb20b80

    SHA256

    288ed88964e563607ae87c0e8f825e2cf64f1b3378cf2cba47c2d72d9a484055

    SHA512

    b861b16a21c5abb6d6afd1949a80f0c2179eed779fb768fa3ba6868b0f50da0c4f75c3515662cba0e591c503d5ca2c68ae8c1f40e7570aebe9e280288d88060f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1366pY.exe

    Filesize

    403KB

    MD5

    baa45aee087c288af18bd62f1d2957e0

    SHA1

    ef725179ae1fbd99acdfda0fbd9f5610f3c6acc4

    SHA256

    c39ce88176c38a832836a4dba307c2b90d2d04bc774ea3553bc780fd3ed503d0

    SHA512

    6cdf97c6bb89e81b2aaed81bb852d55de48c0caabe2b734bb5411d2c5bb8fa81867995c26983719554d765b4236eb6caa4bd9e5cefc0d445685ad969e8300552

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1366pY.exe

    Filesize

    403KB

    MD5

    baa45aee087c288af18bd62f1d2957e0

    SHA1

    ef725179ae1fbd99acdfda0fbd9f5610f3c6acc4

    SHA256

    c39ce88176c38a832836a4dba307c2b90d2d04bc774ea3553bc780fd3ed503d0

    SHA512

    6cdf97c6bb89e81b2aaed81bb852d55de48c0caabe2b734bb5411d2c5bb8fa81867995c26983719554d765b4236eb6caa4bd9e5cefc0d445685ad969e8300552

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    1eed54a048b387471d40ab1094221ef1

    SHA1

    5004d555d2e74a72b07a7fe1e512cb8f8ee5ba98

    SHA256

    c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19

    SHA512

    e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    1eed54a048b387471d40ab1094221ef1

    SHA1

    5004d555d2e74a72b07a7fe1e512cb8f8ee5ba98

    SHA256

    c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19

    SHA512

    e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13

  • memory/1792-2347-0x0000000000190000-0x00000000001BE000-memory.dmp

    Filesize

    184KB

  • memory/2836-163-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-179-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-160-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/2836-161-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/2836-162-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-158-0x0000000002520000-0x0000000002538000-memory.dmp

    Filesize

    96KB

  • memory/2836-165-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-167-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-169-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-171-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-173-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-175-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-177-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-159-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/2836-181-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-183-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-185-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-187-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-189-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2836-190-0x0000000000400000-0x0000000000809000-memory.dmp

    Filesize

    4.0MB

  • memory/2836-191-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/2836-192-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/2836-193-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/2836-195-0x0000000000400000-0x0000000000809000-memory.dmp

    Filesize

    4.0MB

  • memory/2836-157-0x0000000005000000-0x00000000054FE000-memory.dmp

    Filesize

    5.0MB

  • memory/2836-156-0x00000000024C0000-0x00000000024DA000-memory.dmp

    Filesize

    104KB

  • memory/2836-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4072-201-0x00000000054A0000-0x0000000005506000-memory.dmp

    Filesize

    408KB

  • memory/4072-2334-0x0000000002AA0000-0x0000000002AD2000-memory.dmp

    Filesize

    200KB

  • memory/4072-207-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-209-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-212-0x00000000023B0000-0x000000000240B000-memory.dmp

    Filesize

    364KB

  • memory/4072-211-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-215-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-216-0x00000000027E0000-0x00000000027F0000-memory.dmp

    Filesize

    64KB

  • memory/4072-214-0x00000000027E0000-0x00000000027F0000-memory.dmp

    Filesize

    64KB

  • memory/4072-219-0x00000000027E0000-0x00000000027F0000-memory.dmp

    Filesize

    64KB

  • memory/4072-218-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-221-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-223-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-225-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-227-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-229-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-231-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-233-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-235-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-237-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-239-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-205-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-200-0x0000000004F30000-0x0000000004F98000-memory.dmp

    Filesize

    416KB

  • memory/4072-203-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4072-202-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/4452-2346-0x0000000000B80000-0x0000000000B86000-memory.dmp

    Filesize

    24KB

  • memory/4452-2342-0x0000000000200000-0x000000000022E000-memory.dmp

    Filesize

    184KB

  • memory/4452-2348-0x0000000005180000-0x0000000005786000-memory.dmp

    Filesize

    6.0MB

  • memory/4452-2349-0x0000000004C80000-0x0000000004D8A000-memory.dmp

    Filesize

    1.0MB

  • memory/4452-2350-0x0000000004B10000-0x0000000004B22000-memory.dmp

    Filesize

    72KB

  • memory/4452-2351-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/4452-2352-0x0000000004BF0000-0x0000000004C3B000-memory.dmp

    Filesize

    300KB

  • memory/4452-2353-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4452-2354-0x0000000004E90000-0x0000000004F06000-memory.dmp

    Filesize

    472KB

  • memory/4452-2355-0x0000000004FB0000-0x0000000005042000-memory.dmp

    Filesize

    584KB

  • memory/4452-2356-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/4452-2357-0x0000000005F70000-0x0000000006132000-memory.dmp

    Filesize

    1.8MB

  • memory/4452-2358-0x0000000006EF0000-0x000000000741C000-memory.dmp

    Filesize

    5.2MB

  • memory/4452-2359-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4452-2360-0x0000000006140000-0x0000000006190000-memory.dmp

    Filesize

    320KB

  • memory/5068-149-0x0000000000800000-0x000000000080A000-memory.dmp

    Filesize

    40KB