Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/02/2023, 03:49

General

  • Target

    b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe

  • Size

    467KB

  • MD5

    3ca81762a23e5f80839d9554e04b4c2c

  • SHA1

    9b8a296dd5a5e9a855db33cbc9a59c6e4ead20d3

  • SHA256

    b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2

  • SHA512

    a696369ae3e2bf23e6544592fa379d9fb634f323a15f3179be7a66d739226c9fe043bd3486246723a75a69f7b80a05d02ff29bfd58b1ddae0d6d4cf991b38e8f

  • SSDEEP

    12288:YMrwy90lXHHnz+/0jsNEK9PVDf7X0YL/K:YycHHnhsttJy

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

redline

Botnet

crnn

C2

176.113.115.17:4132

Attributes
  • auth_value

    6dfbf5eac3db7046d55dfd3f6608be3f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe
    "C:\Users\Admin\AppData\Local\Temp\b7e4bd1543ad859716be03a0a7fb60bd06c3f59ade8684ca46e447652ef587e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrO29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrO29.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQj81.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQj81.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cwI00Tb.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cwI00Tb.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhh21.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhh21.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhh21.exe

    Filesize

    222KB

    MD5

    7b54906621ec5e810b4f7ea3033f4314

    SHA1

    c30d8ab49d25c434b3052ce462f39566f256fc9f

    SHA256

    a2e02dd24df4d967d05af67ab37bfa4dd21eafad8c93833e03478a3bdee76cbc

    SHA512

    6b3ad3bd78c2204dc41f83641038da6a988719cf3d8ba951de11d0a50ece1c4724b7a0911bde9f96b912ba52e72dcc7b88db78e225de94c269c460967856d700

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhh21.exe

    Filesize

    222KB

    MD5

    7b54906621ec5e810b4f7ea3033f4314

    SHA1

    c30d8ab49d25c434b3052ce462f39566f256fc9f

    SHA256

    a2e02dd24df4d967d05af67ab37bfa4dd21eafad8c93833e03478a3bdee76cbc

    SHA512

    6b3ad3bd78c2204dc41f83641038da6a988719cf3d8ba951de11d0a50ece1c4724b7a0911bde9f96b912ba52e72dcc7b88db78e225de94c269c460967856d700

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrO29.exe

    Filesize

    200KB

    MD5

    0f89a6e48b62f880545b08316a3364bd

    SHA1

    5d82116153aa4d431ebe6a886934b0b1610739f3

    SHA256

    b784c4f6c187b636d281046f2538df68c785ce5bdd18035cd3c5f084b95b9b4c

    SHA512

    bbb51d86d4421378078aaabe157b95900355dcb8f5deffc99b609447b4e3aa287fc5bfb08381dff089f5198622fcf764e631f4b32c17c206cf364ec5582f1a73

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrO29.exe

    Filesize

    200KB

    MD5

    0f89a6e48b62f880545b08316a3364bd

    SHA1

    5d82116153aa4d431ebe6a886934b0b1610739f3

    SHA256

    b784c4f6c187b636d281046f2538df68c785ce5bdd18035cd3c5f084b95b9b4c

    SHA512

    bbb51d86d4421378078aaabe157b95900355dcb8f5deffc99b609447b4e3aa287fc5bfb08381dff089f5198622fcf764e631f4b32c17c206cf364ec5582f1a73

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQj81.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bQj81.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cwI00Tb.exe

    Filesize

    175KB

    MD5

    062a3c73b1aaf076abefd71633b66de5

    SHA1

    e4b7e004c32d673fd61b1669c797dc4b207d8445

    SHA256

    f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881

    SHA512

    6bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cwI00Tb.exe

    Filesize

    175KB

    MD5

    062a3c73b1aaf076abefd71633b66de5

    SHA1

    e4b7e004c32d673fd61b1669c797dc4b207d8445

    SHA256

    f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881

    SHA512

    6bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3

  • memory/1052-290-0x0000000005C00000-0x00000000060FE000-memory.dmp

    Filesize

    5.0MB

  • memory/1052-279-0x0000000004BF0000-0x0000000004CFA000-memory.dmp

    Filesize

    1.0MB

  • memory/1052-301-0x0000000005B50000-0x0000000005BC6000-memory.dmp

    Filesize

    472KB

  • memory/1052-289-0x0000000004E90000-0x0000000004F22000-memory.dmp

    Filesize

    584KB

  • memory/1052-285-0x0000000004B80000-0x0000000004BCB000-memory.dmp

    Filesize

    300KB

  • memory/1052-283-0x0000000004B40000-0x0000000004B7E000-memory.dmp

    Filesize

    248KB

  • memory/1052-281-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

    Filesize

    72KB

  • memory/1052-293-0x0000000004F30000-0x0000000004F96000-memory.dmp

    Filesize

    408KB

  • memory/1052-278-0x00000000050F0000-0x00000000056F6000-memory.dmp

    Filesize

    6.0MB

  • memory/1052-265-0x0000000000280000-0x00000000002B2000-memory.dmp

    Filesize

    200KB

  • memory/1052-302-0x0000000005AD0000-0x0000000005B20000-memory.dmp

    Filesize

    320KB

  • memory/1052-303-0x00000000062D0000-0x0000000006492000-memory.dmp

    Filesize

    1.8MB

  • memory/1052-304-0x00000000069D0000-0x0000000006EFC000-memory.dmp

    Filesize

    5.2MB

  • memory/1748-151-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-130-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-120-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-153-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-155-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-157-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-156-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-154-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-152-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-150-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-149-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-147-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-144-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-142-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-138-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-135-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-158-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-159-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-160-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-161-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-162-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-163-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-164-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-165-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-121-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-146-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-122-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-123-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-124-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-125-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-126-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-127-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-145-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-129-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-128-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-148-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-131-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-132-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-133-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-134-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-136-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-137-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-139-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-140-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-141-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/1748-143-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-171-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-177-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-184-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-183-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-182-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-181-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-180-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-178-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-179-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-168-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-176-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-175-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-173-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-172-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-185-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-170-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-186-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/3908-169-0x0000000076F50000-0x00000000770DE000-memory.dmp

    Filesize

    1.6MB

  • memory/4556-452-0x0000000000890000-0x00000000009DA000-memory.dmp

    Filesize

    1.3MB

  • memory/4556-453-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4556-455-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/4556-457-0x00000000023E0000-0x00000000023FA000-memory.dmp

    Filesize

    104KB

  • memory/4556-462-0x0000000004CC0000-0x0000000004CD8000-memory.dmp

    Filesize

    96KB

  • memory/4556-465-0x0000000000890000-0x00000000009DA000-memory.dmp

    Filesize

    1.3MB

  • memory/4556-467-0x0000000000400000-0x0000000000793000-memory.dmp

    Filesize

    3.6MB

  • memory/4956-362-0x00000000007F0000-0x0000000000822000-memory.dmp

    Filesize

    200KB