Analysis

  • max time kernel
    87s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2023 19:26

General

  • Target

    fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985.exe

  • Size

    781KB

  • MD5

    8775139de783151827b9809b7d02ef5d

  • SHA1

    dc418295992dcebb28b77c6d73431ae85eaae614

  • SHA256

    fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985

  • SHA512

    c07182e2e1200cb6e30489136d8f17c115e4bb102dcd393ff66ff0a8a4c4440442db5f2583babf387739efd244433d72fde1732b095e5c54cfd80ee5ff942f08

  • SSDEEP

    24576:tyO01DymUlO9DShS/oE4EL34gZSfT7xnH57:IBDymUuJL3lWT

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985.exe
    "C:\Users\Admin\AppData\Local\Temp\fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe

    Filesize

    177KB

    MD5

    e5a6c2e51c88c34329468d35843130da

    SHA1

    7b3f5d4f9e21eda2ebb8315bb4af15c88edec39b

    SHA256

    717e81d764366a82c780a7dfc0031326cd32dbc7885f973777f28ac46c59cb15

    SHA512

    3f5361a92b0be08f362153d9509bd90c65699c5748b4f8d6c018f272245805137b00e2aebdbc6475b9f4c2c75e7bfee0695fda9cfc25fc77fff89810788b3a88

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe

    Filesize

    177KB

    MD5

    e5a6c2e51c88c34329468d35843130da

    SHA1

    7b3f5d4f9e21eda2ebb8315bb4af15c88edec39b

    SHA256

    717e81d764366a82c780a7dfc0031326cd32dbc7885f973777f28ac46c59cb15

    SHA512

    3f5361a92b0be08f362153d9509bd90c65699c5748b4f8d6c018f272245805137b00e2aebdbc6475b9f4c2c75e7bfee0695fda9cfc25fc77fff89810788b3a88

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe

    Filesize

    576KB

    MD5

    e92a4070bf4d5fc8b73921275539d270

    SHA1

    85a79b4b0f929a8f28e6992a4428d08af5b4c9fb

    SHA256

    176c5fac8ed5d5672d51402c5f26270d6eb42fda621b8ff4f0d779693ba9e95c

    SHA512

    0b4ddbfadae7345462ce2df638f7f1375498ca2ece83d4fd1de115041855433520192b216f415235d82cc5a9d8c5ff12ab62161931310160aff756a6358c3ab4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe

    Filesize

    576KB

    MD5

    e92a4070bf4d5fc8b73921275539d270

    SHA1

    85a79b4b0f929a8f28e6992a4428d08af5b4c9fb

    SHA256

    176c5fac8ed5d5672d51402c5f26270d6eb42fda621b8ff4f0d779693ba9e95c

    SHA512

    0b4ddbfadae7345462ce2df638f7f1375498ca2ece83d4fd1de115041855433520192b216f415235d82cc5a9d8c5ff12ab62161931310160aff756a6358c3ab4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

    Filesize

    574KB

    MD5

    3c53d43b4fbff190dfbcd1fde747dffb

    SHA1

    91bab36c550c9bccd69be5c14874a32de0036fd2

    SHA256

    5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

    SHA512

    2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

    Filesize

    574KB

    MD5

    3c53d43b4fbff190dfbcd1fde747dffb

    SHA1

    91bab36c550c9bccd69be5c14874a32de0036fd2

    SHA256

    5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

    SHA512

    2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

    Filesize

    574KB

    MD5

    3c53d43b4fbff190dfbcd1fde747dffb

    SHA1

    91bab36c550c9bccd69be5c14874a32de0036fd2

    SHA256

    5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

    SHA512

    2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe

    Filesize

    171KB

    MD5

    c7afae88b68f0ab63143ee7c42c59ec7

    SHA1

    d4f5fc84cc8a7c53a37a08d36e845e6d98a12581

    SHA256

    aec3a2c637ff8f7f77dbf84cbadd62a76172aae3760e013811c517684b60fb9f

    SHA512

    9f6e5bfbbc12722d02ed42bbbd6500cf58bcc2eb361017b77b643d90e4d808a2f2dfa52742c7160ccd03891be934b777a55a0cdd2dd3f8c4407706af0ea78b47

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe

    Filesize

    171KB

    MD5

    c7afae88b68f0ab63143ee7c42c59ec7

    SHA1

    d4f5fc84cc8a7c53a37a08d36e845e6d98a12581

    SHA256

    aec3a2c637ff8f7f77dbf84cbadd62a76172aae3760e013811c517684b60fb9f

    SHA512

    9f6e5bfbbc12722d02ed42bbbd6500cf58bcc2eb361017b77b643d90e4d808a2f2dfa52742c7160ccd03891be934b777a55a0cdd2dd3f8c4407706af0ea78b47

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe

    Filesize

    177KB

    MD5

    e5a6c2e51c88c34329468d35843130da

    SHA1

    7b3f5d4f9e21eda2ebb8315bb4af15c88edec39b

    SHA256

    717e81d764366a82c780a7dfc0031326cd32dbc7885f973777f28ac46c59cb15

    SHA512

    3f5361a92b0be08f362153d9509bd90c65699c5748b4f8d6c018f272245805137b00e2aebdbc6475b9f4c2c75e7bfee0695fda9cfc25fc77fff89810788b3a88

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe

    Filesize

    177KB

    MD5

    e5a6c2e51c88c34329468d35843130da

    SHA1

    7b3f5d4f9e21eda2ebb8315bb4af15c88edec39b

    SHA256

    717e81d764366a82c780a7dfc0031326cd32dbc7885f973777f28ac46c59cb15

    SHA512

    3f5361a92b0be08f362153d9509bd90c65699c5748b4f8d6c018f272245805137b00e2aebdbc6475b9f4c2c75e7bfee0695fda9cfc25fc77fff89810788b3a88

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe

    Filesize

    576KB

    MD5

    e92a4070bf4d5fc8b73921275539d270

    SHA1

    85a79b4b0f929a8f28e6992a4428d08af5b4c9fb

    SHA256

    176c5fac8ed5d5672d51402c5f26270d6eb42fda621b8ff4f0d779693ba9e95c

    SHA512

    0b4ddbfadae7345462ce2df638f7f1375498ca2ece83d4fd1de115041855433520192b216f415235d82cc5a9d8c5ff12ab62161931310160aff756a6358c3ab4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe

    Filesize

    576KB

    MD5

    e92a4070bf4d5fc8b73921275539d270

    SHA1

    85a79b4b0f929a8f28e6992a4428d08af5b4c9fb

    SHA256

    176c5fac8ed5d5672d51402c5f26270d6eb42fda621b8ff4f0d779693ba9e95c

    SHA512

    0b4ddbfadae7345462ce2df638f7f1375498ca2ece83d4fd1de115041855433520192b216f415235d82cc5a9d8c5ff12ab62161931310160aff756a6358c3ab4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

    Filesize

    574KB

    MD5

    3c53d43b4fbff190dfbcd1fde747dffb

    SHA1

    91bab36c550c9bccd69be5c14874a32de0036fd2

    SHA256

    5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

    SHA512

    2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

    Filesize

    574KB

    MD5

    3c53d43b4fbff190dfbcd1fde747dffb

    SHA1

    91bab36c550c9bccd69be5c14874a32de0036fd2

    SHA256

    5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

    SHA512

    2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

    Filesize

    574KB

    MD5

    3c53d43b4fbff190dfbcd1fde747dffb

    SHA1

    91bab36c550c9bccd69be5c14874a32de0036fd2

    SHA256

    5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

    SHA512

    2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe

    Filesize

    171KB

    MD5

    c7afae88b68f0ab63143ee7c42c59ec7

    SHA1

    d4f5fc84cc8a7c53a37a08d36e845e6d98a12581

    SHA256

    aec3a2c637ff8f7f77dbf84cbadd62a76172aae3760e013811c517684b60fb9f

    SHA512

    9f6e5bfbbc12722d02ed42bbbd6500cf58bcc2eb361017b77b643d90e4d808a2f2dfa52742c7160ccd03891be934b777a55a0cdd2dd3f8c4407706af0ea78b47

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe

    Filesize

    171KB

    MD5

    c7afae88b68f0ab63143ee7c42c59ec7

    SHA1

    d4f5fc84cc8a7c53a37a08d36e845e6d98a12581

    SHA256

    aec3a2c637ff8f7f77dbf84cbadd62a76172aae3760e013811c517684b60fb9f

    SHA512

    9f6e5bfbbc12722d02ed42bbbd6500cf58bcc2eb361017b77b643d90e4d808a2f2dfa52742c7160ccd03891be934b777a55a0cdd2dd3f8c4407706af0ea78b47

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1148-2262-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/1148-2263-0x00000000007A0000-0x00000000007B8000-memory.dmp

    Filesize

    96KB

  • memory/1148-2292-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/1148-2293-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/1148-2294-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/1376-2251-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1376-2252-0x0000000004D00000-0x0000000004D40000-memory.dmp

    Filesize

    256KB

  • memory/1376-2250-0x0000000000070000-0x00000000000A0000-memory.dmp

    Filesize

    192KB

  • memory/1376-2254-0x0000000004D00000-0x0000000004D40000-memory.dmp

    Filesize

    256KB

  • memory/1496-93-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-111-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-121-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-123-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-125-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-127-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-130-0x00000000003A0000-0x00000000003FB000-memory.dmp

    Filesize

    364KB

  • memory/1496-129-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-132-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1496-134-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1496-133-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-137-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-136-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1496-139-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-141-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-143-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-147-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-145-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-2231-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1496-2232-0x0000000002630000-0x0000000002662000-memory.dmp

    Filesize

    200KB

  • memory/1496-117-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-119-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-113-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-115-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-78-0x00000000023F0000-0x0000000002458000-memory.dmp

    Filesize

    416KB

  • memory/1496-109-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-99-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-101-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-103-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-107-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-79-0x00000000025D0000-0x0000000002636000-memory.dmp

    Filesize

    408KB

  • memory/1496-105-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-97-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-80-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-95-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-81-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-89-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-91-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-87-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-85-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1496-83-0x00000000025D0000-0x0000000002630000-memory.dmp

    Filesize

    384KB

  • memory/1988-2255-0x0000000000750000-0x0000000000790000-memory.dmp

    Filesize

    256KB

  • memory/1988-2253-0x0000000000750000-0x0000000000790000-memory.dmp

    Filesize

    256KB

  • memory/1988-2247-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/1988-2242-0x0000000000100000-0x000000000012E000-memory.dmp

    Filesize

    184KB