Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-05-2023 22:47

General

  • Target

    84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe

  • Size

    890KB

  • MD5

    c7b11512b935231da032058e1c7fe4d3

  • SHA1

    ae35c7fec289072d36b5b9835392ffbfb19dd08a

  • SHA256

    84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21

  • SHA512

    968f56a9b3ea8e04f76923d1d57791a2f6a690e1c022bb22e5aaa660d09882e70ea6361ace743f3fff1faea915ffe09134c50ae85512dc7958ef9b1b3f9ea83a

  • SSDEEP

    12288:4y90CxYWJKHagfrN/55AqlQR+Uy6NUTo85X9ngA9FzN804nvZENlw33z9ukT0:4yrYGK6mJnAxj+rngA9FyvZAmzo00

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe
    "C:\Users\Admin\AppData\Local\Temp\84deb4d8d09a84288de4cdca1cd0a1eed78e0274461c11239db1507361a89a21.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88413588.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88413588.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p04431087.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p04431087.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10217544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10217544.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s74998023.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s74998023.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s74998023.exe

    Filesize

    344KB

    MD5

    669efc675cfa589709988babe58a3809

    SHA1

    2413f181c1bcc85d5ffc917d7cb67b9726472039

    SHA256

    63bfcdb346576792eaea78941b0bc4530838c8a743359cf3357b96cae0c6cde3

    SHA512

    c1d759d0860ffd1a7046ef11b72e1667704c0678ad9b2f1a209495aee949abe7c6bfb59c4044af76acc4ce2c49f4912fde355cd4db8fa630e66e42b48a8ed05e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s74998023.exe

    Filesize

    344KB

    MD5

    669efc675cfa589709988babe58a3809

    SHA1

    2413f181c1bcc85d5ffc917d7cb67b9726472039

    SHA256

    63bfcdb346576792eaea78941b0bc4530838c8a743359cf3357b96cae0c6cde3

    SHA512

    c1d759d0860ffd1a7046ef11b72e1667704c0678ad9b2f1a209495aee949abe7c6bfb59c4044af76acc4ce2c49f4912fde355cd4db8fa630e66e42b48a8ed05e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88413588.exe

    Filesize

    590KB

    MD5

    9bcfd9b31737bf900ad1e15216c8d8ff

    SHA1

    dc5f533f78315f00cd341142104ddf9dc63abe58

    SHA256

    d9246266b422d208bfa1e213d5cec17b6e2ce6a11630025613c3d5fe7b058817

    SHA512

    0b4650fc6c665435efcf1c73e4f0d61c260ec8828f2f4e7e0cfd38e49659f9b1ad04e74183e4aaa348cc31da63a580144868cbb7bc8d36e8705aa57b1825295d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88413588.exe

    Filesize

    590KB

    MD5

    9bcfd9b31737bf900ad1e15216c8d8ff

    SHA1

    dc5f533f78315f00cd341142104ddf9dc63abe58

    SHA256

    d9246266b422d208bfa1e213d5cec17b6e2ce6a11630025613c3d5fe7b058817

    SHA512

    0b4650fc6c665435efcf1c73e4f0d61c260ec8828f2f4e7e0cfd38e49659f9b1ad04e74183e4aaa348cc31da63a580144868cbb7bc8d36e8705aa57b1825295d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p04431087.exe

    Filesize

    530KB

    MD5

    8efe9db6782b75bb716a889c987ae588

    SHA1

    98d7bc829d5259c393d8fb42a2f440fce59de4f8

    SHA256

    730810098d50b326cebb4d9b6d875b49ffa137cd0761637b024f33e9d7cf3c50

    SHA512

    f9ccc00de67d14def4b510e9fe58726206ace671dc1a7a113620e508ead8635b92ce06ea5984c6dfc75c2f3e722d4162fd60985fe6fe6deca14daba396af2bdb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p04431087.exe

    Filesize

    530KB

    MD5

    8efe9db6782b75bb716a889c987ae588

    SHA1

    98d7bc829d5259c393d8fb42a2f440fce59de4f8

    SHA256

    730810098d50b326cebb4d9b6d875b49ffa137cd0761637b024f33e9d7cf3c50

    SHA512

    f9ccc00de67d14def4b510e9fe58726206ace671dc1a7a113620e508ead8635b92ce06ea5984c6dfc75c2f3e722d4162fd60985fe6fe6deca14daba396af2bdb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10217544.exe

    Filesize

    168KB

    MD5

    641ded0bf2aab2858dee9b10e68e0533

    SHA1

    849f9f0b0a690e7abe232a8c3ebfca81da37fcf4

    SHA256

    d1634ac362cf4f6b0548c81895b039d8e0761277a906c929bedd056f4a87b48b

    SHA512

    94609bf0ed02777639822bb579100439e4cc35f60a3e8880cf452be397e99d82cb880f92d86ea0c7079d6717823c8855f190a0afe9d9c2d6a7b7c7f225ac147b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r10217544.exe

    Filesize

    168KB

    MD5

    641ded0bf2aab2858dee9b10e68e0533

    SHA1

    849f9f0b0a690e7abe232a8c3ebfca81da37fcf4

    SHA256

    d1634ac362cf4f6b0548c81895b039d8e0761277a906c929bedd056f4a87b48b

    SHA512

    94609bf0ed02777639822bb579100439e4cc35f60a3e8880cf452be397e99d82cb880f92d86ea0c7079d6717823c8855f190a0afe9d9c2d6a7b7c7f225ac147b

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/2252-2296-0x0000000002F50000-0x0000000002F56000-memory.dmp

    Filesize

    24KB

  • memory/2252-2297-0x000000000B230000-0x000000000B836000-memory.dmp

    Filesize

    6.0MB

  • memory/2252-2309-0x000000000C410000-0x000000000C460000-memory.dmp

    Filesize

    320KB

  • memory/2252-2303-0x0000000005790000-0x00000000057A0000-memory.dmp

    Filesize

    64KB

  • memory/2252-2307-0x000000000C510000-0x000000000C6D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2252-2306-0x000000000B940000-0x000000000B9A6000-memory.dmp

    Filesize

    408KB

  • memory/2252-2305-0x000000000B130000-0x000000000B1C2000-memory.dmp

    Filesize

    584KB

  • memory/2252-2301-0x000000000AE70000-0x000000000AEBB000-memory.dmp

    Filesize

    300KB

  • memory/2252-2294-0x0000000000F60000-0x0000000000F90000-memory.dmp

    Filesize

    192KB

  • memory/2268-2298-0x0000000004EF0000-0x0000000004FFA000-memory.dmp

    Filesize

    1.0MB

  • memory/2268-2295-0x0000000000C50000-0x0000000000C56000-memory.dmp

    Filesize

    24KB

  • memory/2268-2304-0x0000000005260000-0x00000000052D6000-memory.dmp

    Filesize

    472KB

  • memory/2268-2300-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/2268-2299-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

    Filesize

    72KB

  • memory/2268-2308-0x0000000008690000-0x0000000008BBC000-memory.dmp

    Filesize

    5.2MB

  • memory/2268-2290-0x00000000004D0000-0x00000000004FE000-memory.dmp

    Filesize

    184KB

  • memory/2268-2302-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2764-2317-0x0000000002A00000-0x0000000002A18000-memory.dmp

    Filesize

    96KB

  • memory/2764-2346-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2764-2347-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2764-2348-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2764-2316-0x0000000000ED0000-0x0000000000EEA000-memory.dmp

    Filesize

    104KB

  • memory/2764-2349-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/4960-153-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-165-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-187-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-189-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-191-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-193-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-195-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-197-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-199-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-2282-0x00000000058B0000-0x00000000058E2000-memory.dmp

    Filesize

    200KB

  • memory/4960-183-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-181-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-179-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-177-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-175-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-173-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-171-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-169-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-167-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-185-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-163-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-161-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-159-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-157-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-155-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-151-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-149-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-147-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-145-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-143-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-141-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-137-0x0000000002870000-0x0000000002880000-memory.dmp

    Filesize

    64KB

  • memory/4960-139-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-136-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-135-0x00000000056E0000-0x0000000005740000-memory.dmp

    Filesize

    384KB

  • memory/4960-134-0x00000000056E0000-0x0000000005746000-memory.dmp

    Filesize

    408KB

  • memory/4960-133-0x00000000051E0000-0x00000000056DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4960-132-0x0000000005170000-0x00000000051D8000-memory.dmp

    Filesize

    416KB

  • memory/4960-131-0x0000000000CB0000-0x0000000000D0B000-memory.dmp

    Filesize

    364KB