Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2023, 10:10

General

  • Target

    aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe

  • Size

    774KB

  • MD5

    9c6685cde5c9fb41a71275efb3815a3a

  • SHA1

    854be14ec473807518ee0ecd397b02320167702a

  • SHA256

    aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902

  • SHA512

    c42cf077e510828dbb124eb5266c70a9b76996cd9cdc33f60369316b1904c4f763e8958cedc8d8f59da5f3c6833f7f09e1e87333f4f3e191ba0a3dcb8642a8d9

  • SSDEEP

    24576:wy++WqfKt0SSNSo5G98kahDfxF/xOHYffR:3P3SAM989hLz/EYf

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe
    "C:\Users\Admin\AppData\Local\Temp\aad674ee7cb1795ac4e338b39a564fa0de8b080fa9312f18e77ecd5d79b10902.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x28767044.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x28767044.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m27489873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m27489873.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n03966812.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n03966812.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o22711051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o22711051.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2312

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o22711051.exe

          Filesize

          177KB

          MD5

          eeda211952ef613a0b8595ba99dabd11

          SHA1

          ed84d555df2e27dc4711eb7c48ce2f877599548e

          SHA256

          8abc3cb78ce94c85bb9159695d3788559879a15730a7e978f3a0b7f75b83e44f

          SHA512

          6d6a3d559821c10ca8b7c4254b9700ae1cafba9ea2882e5ca142d628f89b0c3da8c0dc578e79802c620a384474886034cdfc91ca60365eef0aa4102464c432c5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o22711051.exe

          Filesize

          177KB

          MD5

          eeda211952ef613a0b8595ba99dabd11

          SHA1

          ed84d555df2e27dc4711eb7c48ce2f877599548e

          SHA256

          8abc3cb78ce94c85bb9159695d3788559879a15730a7e978f3a0b7f75b83e44f

          SHA512

          6d6a3d559821c10ca8b7c4254b9700ae1cafba9ea2882e5ca142d628f89b0c3da8c0dc578e79802c620a384474886034cdfc91ca60365eef0aa4102464c432c5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x28767044.exe

          Filesize

          570KB

          MD5

          6c15f3d62b6ad8a4907113c5cdad57d6

          SHA1

          f67031ef6ef5af1d8c97ec147a9c09b508173d4d

          SHA256

          1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7

          SHA512

          640e99c4561a80a62dfe745c0690b2437c9a218d4172bebe88aa5ae812c85b77a3c12af7c953d16b4b901692827f9ba5d80a3ec5f91cdc8f0f2ba7f82866880c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x28767044.exe

          Filesize

          570KB

          MD5

          6c15f3d62b6ad8a4907113c5cdad57d6

          SHA1

          f67031ef6ef5af1d8c97ec147a9c09b508173d4d

          SHA256

          1d53e9ffce0a07dac0c5d78b6f85f736ae2cf90d680583d7a7e7a4d477deaac7

          SHA512

          640e99c4561a80a62dfe745c0690b2437c9a218d4172bebe88aa5ae812c85b77a3c12af7c953d16b4b901692827f9ba5d80a3ec5f91cdc8f0f2ba7f82866880c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m27489873.exe

          Filesize

          476KB

          MD5

          4e2542b4e8701d76ad726f81cc310752

          SHA1

          b5e069ecb22ecc919a488050354d7a4bed689c82

          SHA256

          4ec03d945ee04b5ee844b0483d773ee408fe0668cef6e0021782153cbb41b833

          SHA512

          071f4b8632a9ad5c0587d530dfee4a86a88a5b481cf62798b5c975ebb44564f328222b2b4487313738d6b034e340230cd61810bdcc19282ab620cf0d7695be8d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m27489873.exe

          Filesize

          476KB

          MD5

          4e2542b4e8701d76ad726f81cc310752

          SHA1

          b5e069ecb22ecc919a488050354d7a4bed689c82

          SHA256

          4ec03d945ee04b5ee844b0483d773ee408fe0668cef6e0021782153cbb41b833

          SHA512

          071f4b8632a9ad5c0587d530dfee4a86a88a5b481cf62798b5c975ebb44564f328222b2b4487313738d6b034e340230cd61810bdcc19282ab620cf0d7695be8d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n03966812.exe

          Filesize

          169KB

          MD5

          be12ae9f77acc227d2d7bd475d3fecfb

          SHA1

          ddb5d3a1d7efc620d56c9f2481f6804abc184d47

          SHA256

          b92cbbe170189e09fe3c66ed7efd6b883c3b7d3c98b11213b1026b8e2c22102c

          SHA512

          4cf5d7fc2faa9f0ae52e23bbd03cad69e904ae62bebdb9221c8f0f12d56ae39cc5d8ea2cfd43ea10d521e632613cc615dd684cd5552da6b079750b596b10839a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n03966812.exe

          Filesize

          169KB

          MD5

          be12ae9f77acc227d2d7bd475d3fecfb

          SHA1

          ddb5d3a1d7efc620d56c9f2481f6804abc184d47

          SHA256

          b92cbbe170189e09fe3c66ed7efd6b883c3b7d3c98b11213b1026b8e2c22102c

          SHA512

          4cf5d7fc2faa9f0ae52e23bbd03cad69e904ae62bebdb9221c8f0f12d56ae39cc5d8ea2cfd43ea10d521e632613cc615dd684cd5552da6b079750b596b10839a

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          f16fb63d4e551d3808e8f01f2671b57e

          SHA1

          781153ad6235a1152da112de1fb39a6f2d063575

          SHA256

          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

          SHA512

          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          f16fb63d4e551d3808e8f01f2671b57e

          SHA1

          781153ad6235a1152da112de1fb39a6f2d063575

          SHA256

          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

          SHA512

          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          f16fb63d4e551d3808e8f01f2671b57e

          SHA1

          781153ad6235a1152da112de1fb39a6f2d063575

          SHA256

          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

          SHA512

          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

        • memory/1872-2327-0x0000000006400000-0x0000000006450000-memory.dmp

          Filesize

          320KB

        • memory/1872-2322-0x0000000005170000-0x0000000005180000-memory.dmp

          Filesize

          64KB

        • memory/1872-2313-0x00000000007F0000-0x000000000081E000-memory.dmp

          Filesize

          184KB

        • memory/1872-2320-0x0000000005130000-0x0000000005142000-memory.dmp

          Filesize

          72KB

        • memory/2312-2364-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2312-2365-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2312-2366-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/3092-2325-0x0000000004E60000-0x0000000004EF2000-memory.dmp

          Filesize

          584KB

        • memory/3092-2321-0x0000000004A40000-0x0000000004A7C000-memory.dmp

          Filesize

          240KB

        • memory/3092-2323-0x00000000049F0000-0x0000000004A00000-memory.dmp

          Filesize

          64KB

        • memory/3092-2319-0x0000000004B10000-0x0000000004C1A000-memory.dmp

          Filesize

          1.0MB

        • memory/3092-2318-0x0000000005020000-0x0000000005638000-memory.dmp

          Filesize

          6.1MB

        • memory/3092-2317-0x0000000000080000-0x00000000000B0000-memory.dmp

          Filesize

          192KB

        • memory/3092-2324-0x0000000004D40000-0x0000000004DB6000-memory.dmp

          Filesize

          472KB

        • memory/3092-2326-0x0000000004DC0000-0x0000000004E26000-memory.dmp

          Filesize

          408KB

        • memory/3092-2328-0x0000000005EF0000-0x00000000060B2000-memory.dmp

          Filesize

          1.8MB

        • memory/3092-2329-0x00000000082B0000-0x00000000087DC000-memory.dmp

          Filesize

          5.2MB

        • memory/3092-2331-0x00000000049F0000-0x0000000004A00000-memory.dmp

          Filesize

          64KB

        • memory/3480-168-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-182-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-196-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-198-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-200-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-202-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-204-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-206-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-208-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-210-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-212-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-214-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-216-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-2301-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3480-192-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-190-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-188-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-186-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-184-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-194-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-180-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-178-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-176-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-174-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-172-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-170-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-166-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-164-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-162-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-159-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3480-160-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-158-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3480-155-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-156-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3480-153-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-151-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-150-0x00000000054E0000-0x0000000005540000-memory.dmp

          Filesize

          384KB

        • memory/3480-149-0x0000000004EF0000-0x0000000005494000-memory.dmp

          Filesize

          5.6MB

        • memory/3480-148-0x0000000000700000-0x000000000075B000-memory.dmp

          Filesize

          364KB