Analysis

  • max time kernel
    47s
  • max time network
    178s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-02-2023 04:48

General

  • Target

    a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe

  • Size

    550KB

  • MD5

    f2b4f55b10f1b93f69a69f6a7a7ee052

  • SHA1

    703df74d9b2f3a068e55a923abcfcbc4f82a2062

  • SHA256

    a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c

  • SHA512

    c45dc7b155dc1868f58a26a11f4aeb83c53c26320e9846ad4c4c5745223930c873cdba2e9a8af8d4bf249e51fe1b2ff0ad1b224a685d4e81bcb479dc1c9b7244

  • SSDEEP

    12288:QMrIy90vhozQN1NRm+WbGjhVZRfCh5PMO+9q0dhM3WjBWC:IyChooOTbGZ45P4f+W9WC

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

redline

Botnet

nocrypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    4fc7cda1ab5883a6197f20f517ce2a8c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe
    "C:\Users\Admin\AppData\Local\Temp\a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWJ52.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWJ52.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bEL62.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bEL62.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvv40QP.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvv40QP.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCu87.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCu87.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCu87.exe

    Filesize

    427KB

    MD5

    23257501015b3d427b1d6a92ae250445

    SHA1

    83e3e4a159318286539795be53dc31b652a99d45

    SHA256

    f8ee1e826db5ed90144a6a46b88b89b2e1efddd9b6af331386dfc3ceb054985d

    SHA512

    1a67fb05b7ec8031b1d32a230525c813ad56cf2be0428c3dcf3ae431ec1e01fb7fc602155f19fe0ec79dea9aa9ae539678cccf6d7f734b5d6e1b5238f4b572b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dCu87.exe

    Filesize

    427KB

    MD5

    23257501015b3d427b1d6a92ae250445

    SHA1

    83e3e4a159318286539795be53dc31b652a99d45

    SHA256

    f8ee1e826db5ed90144a6a46b88b89b2e1efddd9b6af331386dfc3ceb054985d

    SHA512

    1a67fb05b7ec8031b1d32a230525c813ad56cf2be0428c3dcf3ae431ec1e01fb7fc602155f19fe0ec79dea9aa9ae539678cccf6d7f734b5d6e1b5238f4b572b5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWJ52.exe

    Filesize

    202KB

    MD5

    73b44e75461c53d3667242037cad5dbb

    SHA1

    ee95e6e754c936c6522e991d3fa268275ba5a5a6

    SHA256

    aa90c4ff4d3da4237743445441d5d5c9ce636e26d8040201aeff479e165185cc

    SHA512

    b0424eab99c785bcb2cd56e6f6f156bf30f814455f940dceab6eae938874193be1bed0359e5c3dbe9bb328a5bf314c400c7e36477e1e3cdb386039726af4c614

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nWJ52.exe

    Filesize

    202KB

    MD5

    73b44e75461c53d3667242037cad5dbb

    SHA1

    ee95e6e754c936c6522e991d3fa268275ba5a5a6

    SHA256

    aa90c4ff4d3da4237743445441d5d5c9ce636e26d8040201aeff479e165185cc

    SHA512

    b0424eab99c785bcb2cd56e6f6f156bf30f814455f940dceab6eae938874193be1bed0359e5c3dbe9bb328a5bf314c400c7e36477e1e3cdb386039726af4c614

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bEL62.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bEL62.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvv40QP.exe

    Filesize

    175KB

    MD5

    30132c45c2305b287d96a3ad8158e9e3

    SHA1

    c89477868792dbfc6abeb3016e4fcc542b01bea1

    SHA256

    0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

    SHA512

    1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cvv40QP.exe

    Filesize

    175KB

    MD5

    30132c45c2305b287d96a3ad8158e9e3

    SHA1

    c89477868792dbfc6abeb3016e4fcc542b01bea1

    SHA256

    0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

    SHA512

    1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

  • memory/3052-162-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-150-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-126-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-125-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-130-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-131-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-133-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-134-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-132-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-135-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-129-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-136-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-138-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-137-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-140-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-141-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-142-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-145-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-146-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-159-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-144-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-143-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-148-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-139-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-149-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-120-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-151-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-152-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-153-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-154-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-156-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-155-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-158-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-157-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-160-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-161-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-119-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-121-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-117-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-122-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-127-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-118-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-147-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-128-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-124-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3052-123-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/3200-462-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/3200-464-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/3200-460-0x00000000004E0000-0x000000000058E000-memory.dmp

    Filesize

    696KB

  • memory/3200-461-0x0000000001FD0000-0x0000000001FFD000-memory.dmp

    Filesize

    180KB

  • memory/3200-457-0x0000000004F10000-0x0000000004F28000-memory.dmp

    Filesize

    96KB

  • memory/3200-452-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/3200-394-0x0000000000000000-mapping.dmp

  • memory/4216-359-0x0000000000140000-0x0000000000172000-memory.dmp

    Filesize

    200KB

  • memory/4216-309-0x0000000000000000-mapping.dmp

  • memory/4412-170-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-175-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-174-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-168-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-180-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-176-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-167-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-178-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-173-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-166-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-172-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-177-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-179-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-169-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-181-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-163-0x0000000000000000-mapping.dmp

  • memory/4412-183-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-165-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/4412-182-0x0000000077470000-0x00000000775FE000-memory.dmp

    Filesize

    1.6MB

  • memory/5044-276-0x0000000005250000-0x000000000535A000-memory.dmp

    Filesize

    1.0MB

  • memory/5044-304-0x00000000064D0000-0x0000000006520000-memory.dmp

    Filesize

    320KB

  • memory/5044-303-0x0000000006450000-0x00000000064C6000-memory.dmp

    Filesize

    472KB

  • memory/5044-299-0x0000000007220000-0x000000000774C000-memory.dmp

    Filesize

    5.2MB

  • memory/5044-298-0x0000000006B20000-0x0000000006CE2000-memory.dmp

    Filesize

    1.8MB

  • memory/5044-296-0x0000000006620000-0x0000000006B1E000-memory.dmp

    Filesize

    5.0MB

  • memory/5044-295-0x0000000006080000-0x0000000006112000-memory.dmp

    Filesize

    584KB

  • memory/5044-287-0x0000000005560000-0x00000000055C6000-memory.dmp

    Filesize

    408KB

  • memory/5044-212-0x0000000000000000-mapping.dmp

  • memory/5044-275-0x00000000056D0000-0x0000000005CD6000-memory.dmp

    Filesize

    6.0MB

  • memory/5044-262-0x0000000000920000-0x0000000000952000-memory.dmp

    Filesize

    200KB

  • memory/5044-280-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/5044-278-0x0000000005180000-0x0000000005192000-memory.dmp

    Filesize

    72KB

  • memory/5044-282-0x0000000005360000-0x00000000053AB000-memory.dmp

    Filesize

    300KB