Analysis

  • max time kernel
    70s
  • max time network
    76s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-02-2023 17:21

General

  • Target

    4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe

  • Size

    765KB

  • MD5

    0dc4d3569b05bee985c4e21c3326a173

  • SHA1

    b13cb82f1a5a1a9fc26a006d717e2d904342d555

  • SHA256

    4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4

  • SHA512

    572087c94e7ca67235239f3b671ac1113705c2e62954656a415e32a5998484306360f0f5655cbf30d07ede77d0e807f7882003d6c49138bab2328703d8f1fbb9

  • SSDEEP

    12288:qMr7y90us6wjlGS1raZGPM7CS+CAJZhrI3b/fcNJiZUZX8bicp/JPOr:5y7srTU+SpAbiriiZlWkE

Malware Config

Extracted

Family

redline

Botnet

dubna

C2

193.233.20.11:4131

Attributes
  • auth_value

    f324b1269094b7462e56bab025f032f4

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

redline

Botnet

crypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    407e05c9b3a74d99a20f90b091547bd6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe
    "C:\Users\Admin\AppData\Local\Temp\4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4992
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4476

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exe
    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exe
    Filesize

    283KB

    MD5

    457dcca2cfa8e1592521e4bc580d2097

    SHA1

    de855fa7934126fd1cde834b752999ebe79e367f

    SHA256

    54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc

    SHA512

    d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exe
    Filesize

    533KB

    MD5

    4fdb1646e1be2707a648ade5ecce2be9

    SHA1

    20ad7f971edb06cd6b8be5490753f27df5f42d02

    SHA256

    bc6fbe057f891bd88f9fdabcf77a71054037bd4c4b24afdb1d08f6a6b254c4d6

    SHA512

    19d0d96fcc612fa9f2728754d560ab9874f4e15fae3ebd998525d230dfdfb63e8a7b15cb23d5154c26a227828abee58a630529fb4950205ffb6afc841c157e34

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exe
    Filesize

    533KB

    MD5

    4fdb1646e1be2707a648ade5ecce2be9

    SHA1

    20ad7f971edb06cd6b8be5490753f27df5f42d02

    SHA256

    bc6fbe057f891bd88f9fdabcf77a71054037bd4c4b24afdb1d08f6a6b254c4d6

    SHA512

    19d0d96fcc612fa9f2728754d560ab9874f4e15fae3ebd998525d230dfdfb63e8a7b15cb23d5154c26a227828abee58a630529fb4950205ffb6afc841c157e34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exe
    Filesize

    294KB

    MD5

    9cb6d089c5dbcb55ff923bd6284fbcb7

    SHA1

    8c7b12dba74c380b009a0709ecc916bd724b2958

    SHA256

    b574767f81c77eee3e648805547b525692645f122b6bfd2461790c506ba7e339

    SHA512

    f9cdc7f8272ab230056534c587de70ecd41e62814c44f6861b50218237ab0142a3d2451cd1ab9058866eca5ca29db4558b76d2bbc668a333043b8e31bee5dfe3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exe
    Filesize

    294KB

    MD5

    9cb6d089c5dbcb55ff923bd6284fbcb7

    SHA1

    8c7b12dba74c380b009a0709ecc916bd724b2958

    SHA256

    b574767f81c77eee3e648805547b525692645f122b6bfd2461790c506ba7e339

    SHA512

    f9cdc7f8272ab230056534c587de70ecd41e62814c44f6861b50218237ab0142a3d2451cd1ab9058866eca5ca29db4558b76d2bbc668a333043b8e31bee5dfe3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exe
    Filesize

    202KB

    MD5

    936d51b27c2ed3bfbac86bf9c8677bea

    SHA1

    eed290215f5961deb6d9b2a6cba4bf5ddb783966

    SHA256

    7b0c00adc9ca219fe1f1fc749194370b49e180eb61e54f3becaeed9bb0c4f03e

    SHA512

    efbf4df5d9621cb272a9ca442c976a4f7c57e37c252318acbb0411d1075972b25e9d460254ca6db82be4c4db7eec272763d84b06e7838b863b39f3636e674819

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exe
    Filesize

    202KB

    MD5

    936d51b27c2ed3bfbac86bf9c8677bea

    SHA1

    eed290215f5961deb6d9b2a6cba4bf5ddb783966

    SHA256

    7b0c00adc9ca219fe1f1fc749194370b49e180eb61e54f3becaeed9bb0c4f03e

    SHA512

    efbf4df5d9621cb272a9ca442c976a4f7c57e37c252318acbb0411d1075972b25e9d460254ca6db82be4c4db7eec272763d84b06e7838b863b39f3636e674819

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exe
    Filesize

    175KB

    MD5

    ef8079cf160510d0da7162bc08f753d8

    SHA1

    e786cc8bee83e4a37433ddccf9d3540e1f6533fe

    SHA256

    a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6

    SHA512

    959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exe
    Filesize

    175KB

    MD5

    ef8079cf160510d0da7162bc08f753d8

    SHA1

    e786cc8bee83e4a37433ddccf9d3540e1f6533fe

    SHA256

    a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6

    SHA512

    959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3

  • memory/1204-460-0x0000000000000000-mapping.dmp
  • memory/1372-211-0x0000000000000000-mapping.dmp
  • memory/3752-181-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-172-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-164-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-165-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-166-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-167-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-162-0x0000000000000000-mapping.dmp
  • memory/3752-168-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-182-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-169-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-180-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-179-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-178-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-177-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-176-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-175-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-171-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-174-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3752-173-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/3980-454-0x0000000000580000-0x000000000062E000-memory.dmp
    Filesize

    696KB

  • memory/3980-459-0x0000000000400000-0x0000000000579000-memory.dmp
    Filesize

    1.5MB

  • memory/3980-426-0x0000000004B00000-0x0000000004B44000-memory.dmp
    Filesize

    272KB

  • memory/3980-416-0x0000000000400000-0x0000000000579000-memory.dmp
    Filesize

    1.5MB

  • memory/3980-413-0x0000000000580000-0x000000000062E000-memory.dmp
    Filesize

    696KB

  • memory/3980-415-0x00000000007B0000-0x00000000007FB000-memory.dmp
    Filesize

    300KB

  • memory/3980-440-0x00000000053D0000-0x000000000541B000-memory.dmp
    Filesize

    300KB

  • memory/3980-361-0x0000000000000000-mapping.dmp
  • memory/3980-421-0x0000000004A80000-0x0000000004AC6000-memory.dmp
    Filesize

    280KB

  • memory/4124-149-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-131-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-160-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-161-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-158-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-157-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-156-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-154-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-155-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-132-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-136-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-140-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-143-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-145-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-147-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-148-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-152-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-153-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-150-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-151-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-116-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-146-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-144-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-142-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-141-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-139-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-138-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-137-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-117-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-135-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-134-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-118-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-119-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-133-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-159-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-120-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-121-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-122-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-123-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-124-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-125-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-126-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-127-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-128-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-129-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-130-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4292-332-0x00000000055F0000-0x000000000562E000-memory.dmp
    Filesize

    248KB

  • memory/4292-264-0x0000000000000000-mapping.dmp
  • memory/4292-355-0x0000000007DF0000-0x0000000007E66000-memory.dmp
    Filesize

    472KB

  • memory/4292-350-0x0000000007ED0000-0x0000000008092000-memory.dmp
    Filesize

    1.8MB

  • memory/4292-342-0x0000000005A30000-0x0000000005A96000-memory.dmp
    Filesize

    408KB

  • memory/4292-339-0x0000000006660000-0x0000000006B5E000-memory.dmp
    Filesize

    5.0MB

  • memory/4292-338-0x0000000005920000-0x00000000059B2000-memory.dmp
    Filesize

    584KB

  • memory/4292-334-0x0000000005760000-0x00000000057AB000-memory.dmp
    Filesize

    300KB

  • memory/4292-351-0x00000000085D0000-0x0000000008AFC000-memory.dmp
    Filesize

    5.2MB

  • memory/4292-330-0x0000000005570000-0x0000000005582000-memory.dmp
    Filesize

    72KB

  • memory/4292-327-0x0000000005B50000-0x0000000006156000-memory.dmp
    Filesize

    6.0MB

  • memory/4292-328-0x0000000005650000-0x000000000575A000-memory.dmp
    Filesize

    1.0MB

  • memory/4292-314-0x0000000000BD0000-0x0000000000C02000-memory.dmp
    Filesize

    200KB

  • memory/4292-356-0x0000000007E70000-0x0000000007EC0000-memory.dmp
    Filesize

    320KB

  • memory/4476-506-0x000000000041B592-mapping.dmp
  • memory/4476-558-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/4476-574-0x0000000008E70000-0x0000000008EBB000-memory.dmp
    Filesize

    300KB

  • memory/4992-263-0x0000000000CC0000-0x0000000000CCA000-memory.dmp
    Filesize

    40KB

  • memory/4992-260-0x0000000000000000-mapping.dmp