Analysis

  • max time kernel
    57s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/02/2023, 07:14

General

  • Target

    1f642850a74d22610a6fc6e23f42ea5004ebe62c6d3596c03216fd192ef6afb6.exe

  • Size

    839KB

  • MD5

    62868d5a7d908a412bd0a4775c663790

  • SHA1

    747fef599cf390b1f390bfe776d6e89bdc545364

  • SHA256

    1f642850a74d22610a6fc6e23f42ea5004ebe62c6d3596c03216fd192ef6afb6

  • SHA512

    4ff5548e1f536abb0a55a236bf367a20882180324422361cc189c91e8a1b39376ef401747bc84652b075b68d85fed3a6c32e5559f1d8ab8c001be238dd2f1509

  • SSDEEP

    12288:/MrCy90UDRcKHwpICNMkb7y1REz/gHwh4Dx54DQ1y+rwfnnZn/BfhZdsVLQh9pDM:Vy1MC1REzFiJcnZ/NhUYp1Aoi

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f642850a74d22610a6fc6e23f42ea5004ebe62c6d3596c03216fd192ef6afb6.exe
    "C:\Users\Admin\AppData\Local\Temp\1f642850a74d22610a6fc6e23f42ea5004ebe62c6d3596c03216fd192ef6afb6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtQ83.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtQ83.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vlw79.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vlw79.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dpD70.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dpD70.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4424
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lOe25.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lOe25.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4736
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nhC60.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nhC60.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sBZ04.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sBZ04.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sBZ04.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sBZ04.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtQ83.exe

          Filesize

          735KB

          MD5

          c70f9ff5d58c8b087ccfb56971bc85bb

          SHA1

          cbaa686f51165f127e191aae2344be5a6a0de4e3

          SHA256

          b9cddc9f4d66eb2dc1f4291824e65f481256b3c5b790f4d617c6e8b9222405a3

          SHA512

          14408048c4a092a90eecf85a4a69f798fa1e59469b71aa4f8d5e52f40f90a407a13933a4f48dbe1b981bfa7f32da09093e5a8e03d40797f8601e1bf11e9f5182

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtQ83.exe

          Filesize

          735KB

          MD5

          c70f9ff5d58c8b087ccfb56971bc85bb

          SHA1

          cbaa686f51165f127e191aae2344be5a6a0de4e3

          SHA256

          b9cddc9f4d66eb2dc1f4291824e65f481256b3c5b790f4d617c6e8b9222405a3

          SHA512

          14408048c4a092a90eecf85a4a69f798fa1e59469b71aa4f8d5e52f40f90a407a13933a4f48dbe1b981bfa7f32da09093e5a8e03d40797f8601e1bf11e9f5182

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nhC60.exe

          Filesize

          175KB

          MD5

          69f79e05d0c83aee310d9adfe5aa7f2b

          SHA1

          485c490180380051a14316564fbda07723be11b1

          SHA256

          c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

          SHA512

          f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nhC60.exe

          Filesize

          175KB

          MD5

          69f79e05d0c83aee310d9adfe5aa7f2b

          SHA1

          485c490180380051a14316564fbda07723be11b1

          SHA256

          c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

          SHA512

          f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vlw79.exe

          Filesize

          589KB

          MD5

          2d3e8a94479d4dd6305e1092790a3cac

          SHA1

          2d2ef8d5c8674b183ea95dd882bd9b1472c8ef3d

          SHA256

          9545a0b1c43dea42276b19e8472b170760a0212b57bb1e9aa94a72feb21d5332

          SHA512

          a7e78590afe349296fe428aa7cf671ad71be146177fd69546854a4a7e253405064aa142aa6210b2887e2f0400a85a8e7a4bcbbe9384268ce4fef4af7b9e6171e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vlw79.exe

          Filesize

          589KB

          MD5

          2d3e8a94479d4dd6305e1092790a3cac

          SHA1

          2d2ef8d5c8674b183ea95dd882bd9b1472c8ef3d

          SHA256

          9545a0b1c43dea42276b19e8472b170760a0212b57bb1e9aa94a72feb21d5332

          SHA512

          a7e78590afe349296fe428aa7cf671ad71be146177fd69546854a4a7e253405064aa142aa6210b2887e2f0400a85a8e7a4bcbbe9384268ce4fef4af7b9e6171e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dpD70.exe

          Filesize

          481KB

          MD5

          cad110ca2f60ecd3c9c16e973b59d3f1

          SHA1

          93c455fbd0f645c6cf56208eb34489f889866913

          SHA256

          4e6f291cfe31f835aa30b7df5078c5ecd6cd758104b8a8a8e40cbd7257ed6ba5

          SHA512

          3bf5bd8c9ce7f45d8c517e28df9bee44a4521d942ccfe44153ff8b4b1e55137e76c229a0a04c5b77a93ee13b397fd59883fec06ac81d93bb82645af6ee6af983

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dpD70.exe

          Filesize

          481KB

          MD5

          cad110ca2f60ecd3c9c16e973b59d3f1

          SHA1

          93c455fbd0f645c6cf56208eb34489f889866913

          SHA256

          4e6f291cfe31f835aa30b7df5078c5ecd6cd758104b8a8a8e40cbd7257ed6ba5

          SHA512

          3bf5bd8c9ce7f45d8c517e28df9bee44a4521d942ccfe44153ff8b4b1e55137e76c229a0a04c5b77a93ee13b397fd59883fec06ac81d93bb82645af6ee6af983

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lOe25.exe

          Filesize

          277KB

          MD5

          3bc6ecb7d1f35f3171383f88879659b7

          SHA1

          e82887b3d6ab38ae3b8880d6c904244495dcf0cc

          SHA256

          c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

          SHA512

          709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lOe25.exe

          Filesize

          277KB

          MD5

          3bc6ecb7d1f35f3171383f88879659b7

          SHA1

          e82887b3d6ab38ae3b8880d6c904244495dcf0cc

          SHA256

          c95f1ca2230edb615f3365e4c3ad09e4e1940a2c554eaf27c0df2d5bc4fc1068

          SHA512

          709eb1c1c322c70a2a377324fa1766bfff9a3e1d37db04da240aaab36317d813b6f32f5c0d0a3f8d30f196f132985fce0ec030d5783df3c7bff76a4ccfb4431c

        • memory/396-177-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-178-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-169-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-180-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-186-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-184-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-185-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-183-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-182-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-181-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-179-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-170-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-168-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-176-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-173-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-175-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-171-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/396-172-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/1012-523-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2376-934-0x0000000000290000-0x000000000029A000-memory.dmp

          Filesize

          40KB

        • memory/2792-147-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-131-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-156-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-159-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-160-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-158-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-162-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-161-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-164-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-163-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-165-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-155-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-154-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-153-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-152-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-151-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-150-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-149-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-148-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-120-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-146-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-145-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-144-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-143-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-142-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-141-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-139-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-140-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-138-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-137-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-136-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-135-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-121-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-134-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-133-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-122-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-132-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-157-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-123-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-124-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-125-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-126-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-127-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-128-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-129-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/2792-130-0x00000000772F0000-0x000000007747E000-memory.dmp

          Filesize

          1.6MB

        • memory/3352-556-0x00000000055E0000-0x000000000562B000-memory.dmp

          Filesize

          300KB

        • memory/3352-525-0x0000000000BA0000-0x0000000000BD2000-memory.dmp

          Filesize

          200KB

        • memory/4424-375-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/4424-341-0x0000000005720000-0x0000000005D26000-memory.dmp

          Filesize

          6.0MB

        • memory/4424-364-0x0000000006460000-0x0000000006622000-memory.dmp

          Filesize

          1.8MB

        • memory/4424-363-0x0000000000813000-0x0000000000842000-memory.dmp

          Filesize

          188KB

        • memory/4424-365-0x0000000006630000-0x0000000006B5C000-memory.dmp

          Filesize

          5.2MB

        • memory/4424-368-0x0000000006C80000-0x0000000006CF6000-memory.dmp

          Filesize

          472KB

        • memory/4424-369-0x0000000006D10000-0x0000000006D60000-memory.dmp

          Filesize

          320KB

        • memory/4424-374-0x0000000000813000-0x0000000000842000-memory.dmp

          Filesize

          188KB

        • memory/4424-344-0x00000000052A0000-0x00000000052B2000-memory.dmp

          Filesize

          72KB

        • memory/4424-346-0x00000000052C0000-0x00000000052FE000-memory.dmp

          Filesize

          248KB

        • memory/4424-342-0x0000000005160000-0x000000000526A000-memory.dmp

          Filesize

          1.0MB

        • memory/4424-362-0x00000000062A0000-0x0000000006332000-memory.dmp

          Filesize

          584KB

        • memory/4424-330-0x0000000004B40000-0x0000000004B84000-memory.dmp

          Filesize

          272KB

        • memory/4424-361-0x0000000000490000-0x00000000005DA000-memory.dmp

          Filesize

          1.3MB

        • memory/4424-328-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/4424-327-0x0000000004C10000-0x000000000510E000-memory.dmp

          Filesize

          5.0MB

        • memory/4424-323-0x0000000002140000-0x0000000002186000-memory.dmp

          Filesize

          280KB

        • memory/4424-353-0x00000000055A0000-0x0000000005606000-memory.dmp

          Filesize

          408KB

        • memory/4424-348-0x0000000005410000-0x000000000545B000-memory.dmp

          Filesize

          300KB

        • memory/4424-311-0x0000000000490000-0x00000000005DA000-memory.dmp

          Filesize

          1.3MB

        • memory/4424-309-0x0000000000813000-0x0000000000842000-memory.dmp

          Filesize

          188KB