Analysis

  • max time kernel
    64s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/02/2023, 10:29

General

  • Target

    1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe

  • Size

    826KB

  • MD5

    b2e80c9bfbe99cace95bc69777ccccf1

  • SHA1

    f5d9be5e472cdc78b5a2886fb16b75e9a8aa0c9b

  • SHA256

    1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd

  • SHA512

    f2f3de98cc8b0add503bb461cdcd81f980d325fcdd1653046caa42016093ce0510f047d1d0156334eb7b6a5eb803c16453cb36c9b010e8315e7aabe9215b11a1

  • SSDEEP

    12288:sMrwy90CkFGQhtySMW2BNRTWiUOQw6NH12RQvHMbbvaBByrndv3zSNTG:EyjkFXhtzMRBNRTWOLKvuWzyxv31

Malware Config

Extracted

Family

redline

Botnet

dubna

C2

193.233.20.11:4131

Attributes
  • auth_value

    f324b1269094b7462e56bab025f032f4

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe
    "C:\Users\Admin\AppData\Local\Temp\1814e09d69bd0f0492f24d6caec07990ec1d16cca8aeef57194ced484e0771cd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbZ54.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbZ54.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIf16.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIf16.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aSe35.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aSe35.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bde55.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bde55.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cDy09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cDy09.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkX64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkX64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbZ54.exe

    Filesize

    596KB

    MD5

    190dda039c96bc8c780ab5d0e505ce02

    SHA1

    84443bbffaf71290b21cf9b3502924fa7ae1c104

    SHA256

    f02d642278a334bfe673c1c530100eb6240857104d5c13c2ff636c4f760a75a8

    SHA512

    f4f47d257fef88af0e137cbb32410d17ec37a8e6eddafc7f37d2ba462af79b6ef7de8b256781d826d724e4937c07a27bff09b3ddd283a6893024b91510d42c5e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbZ54.exe

    Filesize

    596KB

    MD5

    190dda039c96bc8c780ab5d0e505ce02

    SHA1

    84443bbffaf71290b21cf9b3502924fa7ae1c104

    SHA256

    f02d642278a334bfe673c1c530100eb6240857104d5c13c2ff636c4f760a75a8

    SHA512

    f4f47d257fef88af0e137cbb32410d17ec37a8e6eddafc7f37d2ba462af79b6ef7de8b256781d826d724e4937c07a27bff09b3ddd283a6893024b91510d42c5e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkX64.exe

    Filesize

    277KB

    MD5

    3bc6ecb7d1f35f3171383f88879659b7

    SHA1

    e82887b3d6ab38ae3b8880d6c904244495dcf0cc

    SHA256

    c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

    SHA512

    709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dkX64.exe

    Filesize

    277KB

    MD5

    3bc6ecb7d1f35f3171383f88879659b7

    SHA1

    e82887b3d6ab38ae3b8880d6c904244495dcf0cc

    SHA256

    c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

    SHA512

    709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cDy09.exe

    Filesize

    456KB

    MD5

    38843698815444b78bb8a73cb2a55e1c

    SHA1

    823d3bca57c0ef79b64b736e0b856b15eb8a1427

    SHA256

    d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3

    SHA512

    86ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cDy09.exe

    Filesize

    456KB

    MD5

    38843698815444b78bb8a73cb2a55e1c

    SHA1

    823d3bca57c0ef79b64b736e0b856b15eb8a1427

    SHA256

    d08806d5eb85a075c3ca96312bc79db64be887550a4a66d9faa89317ad9beff3

    SHA512

    86ec0f5bc0fed715b9e9298c6c75ac97fca05e9cee217f9452c50dc54eda35c7099fa2cd751a501036068d1455632d86d5e33b126767626bafd641e4b9d0b57f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIf16.exe

    Filesize

    202KB

    MD5

    14be906e10b84153cbc67b2e18e16657

    SHA1

    6cab4c50453fefdf416af9c783a4eed0b150d1b9

    SHA256

    bf8b687385453562669fa10e758adf58138a9ca473a1348fa9e94d2224e57258

    SHA512

    c679a5f7bec77cb8b973d6aad3133c973cc28b02368ea46f88e6301f77b5edee147bb91202221508e400cad49045f6550456f9185dd403a7cd71b5a8d2b8bbc7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dIf16.exe

    Filesize

    202KB

    MD5

    14be906e10b84153cbc67b2e18e16657

    SHA1

    6cab4c50453fefdf416af9c783a4eed0b150d1b9

    SHA256

    bf8b687385453562669fa10e758adf58138a9ca473a1348fa9e94d2224e57258

    SHA512

    c679a5f7bec77cb8b973d6aad3133c973cc28b02368ea46f88e6301f77b5edee147bb91202221508e400cad49045f6550456f9185dd403a7cd71b5a8d2b8bbc7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aSe35.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aSe35.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bde55.exe

    Filesize

    175KB

    MD5

    ef8079cf160510d0da7162bc08f753d8

    SHA1

    e786cc8bee83e4a37433ddccf9d3540e1f6533fe

    SHA256

    a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6

    SHA512

    959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bde55.exe

    Filesize

    175KB

    MD5

    ef8079cf160510d0da7162bc08f753d8

    SHA1

    e786cc8bee83e4a37433ddccf9d3540e1f6533fe

    SHA256

    a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6

    SHA512

    959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3

  • memory/2372-562-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2372-578-0x0000000009460000-0x00000000094AB000-memory.dmp

    Filesize

    300KB

  • memory/2692-148-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-155-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-134-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-135-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-136-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-137-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-138-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-139-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-140-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-141-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-142-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-143-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-144-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-146-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-145-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-132-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-147-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-149-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-151-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-150-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-153-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-152-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-154-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-133-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-156-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-157-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-158-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-160-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-159-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-161-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-162-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-164-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-165-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-163-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-131-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-130-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-129-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-128-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-127-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-126-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-125-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-124-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-123-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-122-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-121-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-120-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3148-267-0x00000000004B0000-0x00000000004BA000-memory.dmp

    Filesize

    40KB

  • memory/3292-182-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-186-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-185-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-184-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-180-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-178-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-177-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-175-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-168-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-183-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-181-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-169-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-170-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-171-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-172-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-173-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-176-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/3292-179-0x0000000077890000-0x0000000077A1E000-memory.dmp

    Filesize

    1.6MB

  • memory/4576-354-0x00000000065C0000-0x0000000006636000-memory.dmp

    Filesize

    472KB

  • memory/4576-342-0x0000000005EC0000-0x00000000063BE000-memory.dmp

    Filesize

    5.0MB

  • memory/4576-343-0x00000000051D0000-0x0000000005262000-memory.dmp

    Filesize

    584KB

  • memory/4576-355-0x0000000005E70000-0x0000000005EC0000-memory.dmp

    Filesize

    320KB

  • memory/4576-356-0x0000000006810000-0x00000000069D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4576-357-0x0000000006F10000-0x000000000743C000-memory.dmp

    Filesize

    5.2MB

  • memory/4576-346-0x0000000005270000-0x00000000052D6000-memory.dmp

    Filesize

    408KB

  • memory/4576-336-0x0000000004E90000-0x0000000004ECE000-memory.dmp

    Filesize

    248KB

  • memory/4576-338-0x0000000004E30000-0x0000000004E7B000-memory.dmp

    Filesize

    300KB

  • memory/4576-318-0x00000000005B0000-0x00000000005E2000-memory.dmp

    Filesize

    200KB

  • memory/4576-331-0x00000000053B0000-0x00000000059B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4576-332-0x0000000004EE0000-0x0000000004FEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4576-334-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/4688-463-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/4688-445-0x0000000005900000-0x000000000594B000-memory.dmp

    Filesize

    300KB

  • memory/4688-444-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/4688-442-0x00000000004A0000-0x000000000054E000-memory.dmp

    Filesize

    696KB

  • memory/4688-441-0x00000000004A0000-0x00000000005EA000-memory.dmp

    Filesize

    1.3MB

  • memory/4688-428-0x0000000002310000-0x0000000002354000-memory.dmp

    Filesize

    272KB

  • memory/4688-423-0x0000000002180000-0x00000000021C6000-memory.dmp

    Filesize

    280KB