Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 18:32

General

  • Target

    7654b7b139d02caf594e3bb76024b436.exe

  • Size

    480KB

  • MD5

    7654b7b139d02caf594e3bb76024b436

  • SHA1

    9ab0d7bc3a1e5f69dc0c15074f4ba85a7a907144

  • SHA256

    1503129c1499aee0902cfcfa2d78d909e0f5117d9f7091134309eb05564a2e8f

  • SHA512

    7a824318084704b92ade92267de286503ce2f111c85097e1a0a2cd65e65f29140e5df45e987482a440d21678ad4ba45b03e7d1bb40dbab42a6bc351b30738356

  • SSDEEP

    12288:WMruy90sAoIpon4xyFZaP5xW5VYY2vrARptcjsVmC58pIr3:MyrIon4xynAsd48Rzrb+Or3

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7654b7b139d02caf594e3bb76024b436.exe
    "C:\Users\Admin\AppData\Local\Temp\7654b7b139d02caf594e3bb76024b436.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe

    Filesize

    308KB

    MD5

    0c8c5816f58bb7cc9df5093b60df7211

    SHA1

    ef729dd2ee538acb8f84621bdc960f7fc1529ca3

    SHA256

    a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf

    SHA512

    5e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe

    Filesize

    308KB

    MD5

    0c8c5816f58bb7cc9df5093b60df7211

    SHA1

    ef729dd2ee538acb8f84621bdc960f7fc1529ca3

    SHA256

    a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf

    SHA512

    5e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe

    Filesize

    168KB

    MD5

    24d9df908e3542b85f406248da09bccd

    SHA1

    f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65

    SHA256

    20488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1

    SHA512

    8ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe

    Filesize

    168KB

    MD5

    24d9df908e3542b85f406248da09bccd

    SHA1

    f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65

    SHA256

    20488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1

    SHA512

    8ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe

    Filesize

    179KB

    MD5

    0948e18c3e62fcdd93b18c56279d10c9

    SHA1

    8ffba5e073e62488e75f846477922b3d81c118bf

    SHA256

    c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3

    SHA512

    4fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe

    Filesize

    179KB

    MD5

    0948e18c3e62fcdd93b18c56279d10c9

    SHA1

    8ffba5e073e62488e75f846477922b3d81c118bf

    SHA256

    c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3

    SHA512

    4fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe

    Filesize

    308KB

    MD5

    0c8c5816f58bb7cc9df5093b60df7211

    SHA1

    ef729dd2ee538acb8f84621bdc960f7fc1529ca3

    SHA256

    a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf

    SHA512

    5e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y3085576.exe

    Filesize

    308KB

    MD5

    0c8c5816f58bb7cc9df5093b60df7211

    SHA1

    ef729dd2ee538acb8f84621bdc960f7fc1529ca3

    SHA256

    a00c0f9cccc086e259d21ede9f2129f6c618ce96cf2e544b827715666b04efbf

    SHA512

    5e89ca9984ad454ac55e2214c3f8467eed6f68c611d4ee7968b63a3b94d262a450949e839e383ecf102e4a1ac05d7ff5387ccf4eb3b67c90fde6861b02b4ed1d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe

    Filesize

    168KB

    MD5

    24d9df908e3542b85f406248da09bccd

    SHA1

    f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65

    SHA256

    20488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1

    SHA512

    8ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k5575547.exe

    Filesize

    168KB

    MD5

    24d9df908e3542b85f406248da09bccd

    SHA1

    f6619e6b403e4889f4946ae5f7b8bb0e1d3bff65

    SHA256

    20488d08992718b3bf98a8375d0b79efdee7bf402db9f57f4efdaedb8bd223f1

    SHA512

    8ee8f0ddbe30ed2ed10df18f9041278de77c0ea57e7c22e16e720cb4a5466d702a7ef5e23820acdc4aeba1ca2eff56203f5ed0273b3f2018457b293440e77838

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe

    Filesize

    179KB

    MD5

    0948e18c3e62fcdd93b18c56279d10c9

    SHA1

    8ffba5e073e62488e75f846477922b3d81c118bf

    SHA256

    c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3

    SHA512

    4fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\l4489086.exe

    Filesize

    179KB

    MD5

    0948e18c3e62fcdd93b18c56279d10c9

    SHA1

    8ffba5e073e62488e75f846477922b3d81c118bf

    SHA256

    c4d65b3bc20562810bc1eeffe5a2af50464f274d3d69d634e5d0c13b21a658c3

    SHA512

    4fa1beeca911d3cdbf6620ae7890c920f9a63942cfdd2df2b5ece1c27788a19cd780df90381ac437e10a64f1df39fda76418a638d1aa71e94f967639ea7fa6eb

  • memory/1768-102-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-94-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-104-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-110-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-84-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/1768-85-0x0000000000560000-0x000000000057A000-memory.dmp

    Filesize

    104KB

  • memory/1768-86-0x00000000021E0000-0x00000000021F8000-memory.dmp

    Filesize

    96KB

  • memory/1768-87-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/1768-88-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/1768-89-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-90-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-112-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-92-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-98-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-96-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-114-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-100-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-106-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-108-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/1768-116-0x00000000021E0000-0x00000000021F2000-memory.dmp

    Filesize

    72KB

  • memory/2004-74-0x0000000000850000-0x000000000087E000-memory.dmp

    Filesize

    184KB

  • memory/2004-77-0x0000000004CE0000-0x0000000004D20000-memory.dmp

    Filesize

    256KB

  • memory/2004-75-0x00000000003B0000-0x00000000003B6000-memory.dmp

    Filesize

    24KB

  • memory/2004-76-0x0000000004CE0000-0x0000000004D20000-memory.dmp

    Filesize

    256KB