Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2023 17:53

General

  • Target

    f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe

  • Size

    580KB

  • MD5

    f3fbaa2c30aa294221f9e77ad7149ece

  • SHA1

    8c1dc1662db19b6b0f8928405ec75913282af1f9

  • SHA256

    f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631

  • SHA512

    42091043a3d7c6288784d950a2b9e4c5c2b8a50d49fe4b250a1841c49172ad0bc679b21425ec314540433e003b1f9f89712c9741a2282c2a100ed1cc9b3f6e94

  • SSDEEP

    12288:EMr7y909OMnflICTw8ZEuhg2ePw4Wx7vZuqyZZAEfhxg:nyRMflRNhgHP1WxzP8g

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe
    "C:\Users\Admin\AppData\Local\Temp\f1d6e1ee58614de34c9fea8c2b7598f17d5f71d788784f3a3624401cef1bf631.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605331.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605331.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1248436.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1248436.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2439304.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2439304.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3452
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4413564.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4413564.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605331.exe

    Filesize

    377KB

    MD5

    6aacc672cf6562abe3b4c9e7097580f3

    SHA1

    e7117268ec38fe84d539be03c000d1a2947e10bb

    SHA256

    6d9db29f8271ffdb7742c4d781c75544d41a43c5bbc5b3e5c6af6ad1df9397e9

    SHA512

    c487ada36da738d4d00974ba7e42efe32eaa3dc7331b47981596b59d449140886b4529a93913f161301fd0633148d1358abbf51eb78696ae0bcbc1adc0c3295c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1605331.exe

    Filesize

    377KB

    MD5

    6aacc672cf6562abe3b4c9e7097580f3

    SHA1

    e7117268ec38fe84d539be03c000d1a2947e10bb

    SHA256

    6d9db29f8271ffdb7742c4d781c75544d41a43c5bbc5b3e5c6af6ad1df9397e9

    SHA512

    c487ada36da738d4d00974ba7e42efe32eaa3dc7331b47981596b59d449140886b4529a93913f161301fd0633148d1358abbf51eb78696ae0bcbc1adc0c3295c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1248436.exe

    Filesize

    206KB

    MD5

    890815c21f3af170704979ae013b51b0

    SHA1

    46116759df8bfeec215700e086da7bb17e3b68d1

    SHA256

    65928afe5723308993d39e24380613b83801c85094d925c813114503bb9c4529

    SHA512

    df9ec2bdbebf290ecf11b40aac8676d0de5f877c4c9cb397ea00d62244d29177fc6254747b368e786cadcfdc49ddf0307970f61ed65667c23675e6836e5bc21b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1248436.exe

    Filesize

    206KB

    MD5

    890815c21f3af170704979ae013b51b0

    SHA1

    46116759df8bfeec215700e086da7bb17e3b68d1

    SHA256

    65928afe5723308993d39e24380613b83801c85094d925c813114503bb9c4529

    SHA512

    df9ec2bdbebf290ecf11b40aac8676d0de5f877c4c9cb397ea00d62244d29177fc6254747b368e786cadcfdc49ddf0307970f61ed65667c23675e6836e5bc21b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2439304.exe

    Filesize

    11KB

    MD5

    f3f7d21db806df8ffa070e03f92944f6

    SHA1

    27017a2c245744d64a5ef716da3a85a8799add5f

    SHA256

    4f0a4b96086b2bc45032f0e6b04e6878a70bfa9c9b8eea4298f10cc7a36df6d5

    SHA512

    ed935ace54ad21541655dc45494e0b09bd075c6556a51bbf506d54099d91d36c5948f474b6a25ff84245782348d939a886028ccfcec97f31f41019a302073b16

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2439304.exe

    Filesize

    11KB

    MD5

    f3f7d21db806df8ffa070e03f92944f6

    SHA1

    27017a2c245744d64a5ef716da3a85a8799add5f

    SHA256

    4f0a4b96086b2bc45032f0e6b04e6878a70bfa9c9b8eea4298f10cc7a36df6d5

    SHA512

    ed935ace54ad21541655dc45494e0b09bd075c6556a51bbf506d54099d91d36c5948f474b6a25ff84245782348d939a886028ccfcec97f31f41019a302073b16

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4413564.exe

    Filesize

    172KB

    MD5

    4ad9fa9323c4d313c8c479ecc3aa9565

    SHA1

    4f35fd4d3832533636e8835af84804cc85c1b1af

    SHA256

    0d6639e9f03bf886eb02ae7ac50f4808e914eba80388f0031a219ada50e553e5

    SHA512

    9c7dfcba66164760a9d360e95ea81d1bb0487696826e95c909f583e0a060df92bdf6956eb10e0ea9f0b73c74426632e51a1a9e3744781f2fc428025deba9000c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4413564.exe

    Filesize

    172KB

    MD5

    4ad9fa9323c4d313c8c479ecc3aa9565

    SHA1

    4f35fd4d3832533636e8835af84804cc85c1b1af

    SHA256

    0d6639e9f03bf886eb02ae7ac50f4808e914eba80388f0031a219ada50e553e5

    SHA512

    9c7dfcba66164760a9d360e95ea81d1bb0487696826e95c909f583e0a060df92bdf6956eb10e0ea9f0b73c74426632e51a1a9e3744781f2fc428025deba9000c

  • memory/1432-160-0x000000000AE40000-0x000000000B458000-memory.dmp

    Filesize

    6.1MB

  • memory/1432-165-0x000000000ACD0000-0x000000000AD46000-memory.dmp

    Filesize

    472KB

  • memory/1432-172-0x0000000005390000-0x00000000053A0000-memory.dmp

    Filesize

    64KB

  • memory/1432-161-0x000000000A930000-0x000000000AA3A000-memory.dmp

    Filesize

    1.0MB

  • memory/1432-163-0x000000000A860000-0x000000000A872000-memory.dmp

    Filesize

    72KB

  • memory/1432-162-0x0000000005390000-0x00000000053A0000-memory.dmp

    Filesize

    64KB

  • memory/1432-164-0x000000000A8C0000-0x000000000A8FC000-memory.dmp

    Filesize

    240KB

  • memory/1432-159-0x00000000009A0000-0x00000000009D0000-memory.dmp

    Filesize

    192KB

  • memory/1432-166-0x000000000B460000-0x000000000B4F2000-memory.dmp

    Filesize

    584KB

  • memory/1432-167-0x000000000BAB0000-0x000000000C054000-memory.dmp

    Filesize

    5.6MB

  • memory/1432-168-0x000000000ADC0000-0x000000000AE26000-memory.dmp

    Filesize

    408KB

  • memory/1432-169-0x000000000B8D0000-0x000000000B920000-memory.dmp

    Filesize

    320KB

  • memory/1432-170-0x000000000C330000-0x000000000C4F2000-memory.dmp

    Filesize

    1.8MB

  • memory/1432-171-0x000000000CA30000-0x000000000CF5C000-memory.dmp

    Filesize

    5.2MB

  • memory/3452-154-0x0000000000B20000-0x0000000000B2A000-memory.dmp

    Filesize

    40KB