Analysis

  • max time kernel
    193s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 09:45

General

  • Target

    e812fdd2f0f65129eb658b9ff857631fe58e9758c460115533ad28885daf1afe.exe

  • Size

    535KB

  • MD5

    840ee901949ed1f92fc1693d5dea8f6d

  • SHA1

    e10aa69367b213452eb488e990297852a0572682

  • SHA256

    e812fdd2f0f65129eb658b9ff857631fe58e9758c460115533ad28885daf1afe

  • SHA512

    d65b2ff83e6bb30e71d0cfcefdfae57d9d68f12697cd8ebaf6639f68d41651c34559684e92cf824f23d2d449c21fcf58bbd7a46fa8b8300473d5902c7bb8c8a2

  • SSDEEP

    12288:1MrVy90wrDGCthpso3ZXdsXJPO11FIyl:kyrricpsqZXda4PF3

Malware Config

Extracted

Family

redline

Botnet

fuka

C2

193.233.20.11:4131

Attributes
  • auth_value

    90eef520554ef188793d77ecc34217bf

Extracted

Family

redline

Botnet

nocrypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    4fc7cda1ab5883a6197f20f517ce2a8c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e812fdd2f0f65129eb658b9ff857631fe58e9758c460115533ad28885daf1afe.exe
    "C:\Users\Admin\AppData\Local\Temp\e812fdd2f0f65129eb658b9ff857631fe58e9758c460115533ad28885daf1afe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnY94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnY94.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aZy76.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aZy76.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bzR99uk.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bzR99uk.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfy83.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfy83.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfy83.exe

    Filesize

    390KB

    MD5

    98e409e70fddff5f5e32265c983be0d7

    SHA1

    41d483bd96b019cf1e63baf6532bee31f8cf8f45

    SHA256

    359745ea7641f413cb1a1863b97eeed6200397e023707fcc9ec81ef900e6406e

    SHA512

    5668b8a4cdd159810f6eb51c702e26084fc9ae50ea3293625ac115da47f694e273a518f173e31d39bf5ae3d75846112dbb056d565390b78b098b6b40226ac0b1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfy83.exe

    Filesize

    390KB

    MD5

    98e409e70fddff5f5e32265c983be0d7

    SHA1

    41d483bd96b019cf1e63baf6532bee31f8cf8f45

    SHA256

    359745ea7641f413cb1a1863b97eeed6200397e023707fcc9ec81ef900e6406e

    SHA512

    5668b8a4cdd159810f6eb51c702e26084fc9ae50ea3293625ac115da47f694e273a518f173e31d39bf5ae3d75846112dbb056d565390b78b098b6b40226ac0b1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnY94.exe

    Filesize

    202KB

    MD5

    c7aac9c8477f480323b5fa95e9ae0cb7

    SHA1

    4b47d3e49c8fdc449709e2ff233bcf0c0dc47fff

    SHA256

    6fe5bf4aa5d5365ed7ca2f2515548077d0c2ce964560aa5c216080c031666053

    SHA512

    0f47f73edd83fee4ba04987ea3d21719daf9ada6b2795872f967922b52941b358142c68e55b54f9226d934d1be3710b8ca633cbb2131061fa1ec77c6bfeb9eac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnY94.exe

    Filesize

    202KB

    MD5

    c7aac9c8477f480323b5fa95e9ae0cb7

    SHA1

    4b47d3e49c8fdc449709e2ff233bcf0c0dc47fff

    SHA256

    6fe5bf4aa5d5365ed7ca2f2515548077d0c2ce964560aa5c216080c031666053

    SHA512

    0f47f73edd83fee4ba04987ea3d21719daf9ada6b2795872f967922b52941b358142c68e55b54f9226d934d1be3710b8ca633cbb2131061fa1ec77c6bfeb9eac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aZy76.exe

    Filesize

    175KB

    MD5

    4c35cfbd12826cedb7982ab4e1763a6a

    SHA1

    1496bd1d1981d8bf38cf98cdd4aa47020ffe9303

    SHA256

    8020580744f6861a611e99ba17e92751499e4b0f013d66a103fb38c5f256bbb2

    SHA512

    5e55022ab3b5a49ba3695062b7db3fa920aa9e3653e52e5a556caeed2d8f217457ae472eb2cf3da32f4332fba52b9b1d4e8b42e09793c1f3bf970dcbce35566c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aZy76.exe

    Filesize

    175KB

    MD5

    4c35cfbd12826cedb7982ab4e1763a6a

    SHA1

    1496bd1d1981d8bf38cf98cdd4aa47020ffe9303

    SHA256

    8020580744f6861a611e99ba17e92751499e4b0f013d66a103fb38c5f256bbb2

    SHA512

    5e55022ab3b5a49ba3695062b7db3fa920aa9e3653e52e5a556caeed2d8f217457ae472eb2cf3da32f4332fba52b9b1d4e8b42e09793c1f3bf970dcbce35566c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bzR99uk.exe

    Filesize

    175KB

    MD5

    30132c45c2305b287d96a3ad8158e9e3

    SHA1

    c89477868792dbfc6abeb3016e4fcc542b01bea1

    SHA256

    0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

    SHA512

    1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bzR99uk.exe

    Filesize

    175KB

    MD5

    30132c45c2305b287d96a3ad8158e9e3

    SHA1

    c89477868792dbfc6abeb3016e4fcc542b01bea1

    SHA256

    0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

    SHA512

    1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

  • memory/1048-153-0x0000000000AB0000-0x0000000000AE2000-memory.dmp

    Filesize

    200KB

  • memory/2132-139-0x0000000005DF0000-0x0000000006408000-memory.dmp

    Filesize

    6.1MB

  • memory/2132-141-0x00000000058A0000-0x00000000058B2000-memory.dmp

    Filesize

    72KB

  • memory/2132-144-0x00000000067F0000-0x0000000006882000-memory.dmp

    Filesize

    584KB

  • memory/2132-145-0x0000000006750000-0x00000000067B6000-memory.dmp

    Filesize

    408KB

  • memory/2132-146-0x0000000007380000-0x0000000007542000-memory.dmp

    Filesize

    1.8MB

  • memory/2132-147-0x0000000007A80000-0x0000000007FAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2132-148-0x00000000072B0000-0x0000000007326000-memory.dmp

    Filesize

    472KB

  • memory/2132-149-0x0000000007330000-0x0000000007380000-memory.dmp

    Filesize

    320KB

  • memory/2132-142-0x0000000005900000-0x000000000593C000-memory.dmp

    Filesize

    240KB

  • memory/2132-143-0x0000000006C00000-0x00000000071A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2132-140-0x0000000005970000-0x0000000005A7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2132-138-0x0000000000ED0000-0x0000000000F02000-memory.dmp

    Filesize

    200KB

  • memory/2204-157-0x0000000000644000-0x0000000000664000-memory.dmp

    Filesize

    128KB

  • memory/2204-158-0x00000000005F0000-0x000000000061D000-memory.dmp

    Filesize

    180KB

  • memory/2204-159-0x0000000000400000-0x00000000005A2000-memory.dmp

    Filesize

    1.6MB

  • memory/2204-160-0x0000000000644000-0x0000000000664000-memory.dmp

    Filesize

    128KB