Analysis

  • max time kernel
    54s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/02/2023, 19:43

General

  • Target

    e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe

  • Size

    477KB

  • MD5

    14c8d645441d383eff9da8e77eca166c

  • SHA1

    8b4647eed3d707b28384a126462b1a7c31f6e5b8

  • SHA256

    e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23

  • SHA512

    09d4e37fafd0703362e6e77f8940ad70386a8646cd0243737f6f99ea53f6585f55f3f8f43ddbdec6fed3bcfb634662f3df075cda76d951ad561f845bebfecb31

  • SSDEEP

    12288:dMrVy90Ll04Q7Qv5CPl9AtUJ3NwYAP+ZuGIDnbuLQ:Ey/4PxYliE3FIGISQ

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe
    "C:\Users\Admin\AppData\Local\Temp\e804647333540ab93e3635585e2738c973509f568ff0d6b666b80b16a2176d23.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrk97Lo.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrk97Lo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bgY38II.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bgY38II.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhz78xn.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhz78xn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lhL79db.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lhL79db.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4480

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lhL79db.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lhL79db.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrk97Lo.exe

          Filesize

          373KB

          MD5

          5e291838b031220f1a714a08487f72b9

          SHA1

          b0b4aa6c2e46727eb6888918fd02040f887ac8d0

          SHA256

          098c382f0f15231a7ae3a0b3a783f8be2800e51b83b364cd66898bdd2527fb94

          SHA512

          c30c2bdbb5e8a0f71aadb9652ea5137005bc76294d0bca225f8d695b4550d8c80bee098a41bb999545152760ec3ae3042c62dee484488469b15d7f8f6bb9694c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nrk97Lo.exe

          Filesize

          373KB

          MD5

          5e291838b031220f1a714a08487f72b9

          SHA1

          b0b4aa6c2e46727eb6888918fd02040f887ac8d0

          SHA256

          098c382f0f15231a7ae3a0b3a783f8be2800e51b83b364cd66898bdd2527fb94

          SHA512

          c30c2bdbb5e8a0f71aadb9652ea5137005bc76294d0bca225f8d695b4550d8c80bee098a41bb999545152760ec3ae3042c62dee484488469b15d7f8f6bb9694c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bgY38II.exe

          Filesize

          235KB

          MD5

          a3c28043de92114046cdc2a3d86c58f6

          SHA1

          64b3fdeee29433f0bb8a75c4fc4e8abdf1254ee9

          SHA256

          78d2576aedb85a49ec767f0bb9fa0e3c9570d5ed034e50e87a3ca8484a16f0e5

          SHA512

          6b0b37d54b82ff9c69f9d254ded3d07cfe5d13e8bef7849204035d564c9e1bd1bf2b505e03cade39286627d4617b7da19742199997487be7d3428a43f12ae0c0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bgY38II.exe

          Filesize

          235KB

          MD5

          a3c28043de92114046cdc2a3d86c58f6

          SHA1

          64b3fdeee29433f0bb8a75c4fc4e8abdf1254ee9

          SHA256

          78d2576aedb85a49ec767f0bb9fa0e3c9570d5ed034e50e87a3ca8484a16f0e5

          SHA512

          6b0b37d54b82ff9c69f9d254ded3d07cfe5d13e8bef7849204035d564c9e1bd1bf2b505e03cade39286627d4617b7da19742199997487be7d3428a43f12ae0c0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhz78xn.exe

          Filesize

          175KB

          MD5

          da6f3bef8abc85bd09f50783059964e3

          SHA1

          a0f25f60ec1896c4c920ea397f40e6ce29724322

          SHA256

          e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

          SHA512

          4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhz78xn.exe

          Filesize

          175KB

          MD5

          da6f3bef8abc85bd09f50783059964e3

          SHA1

          a0f25f60ec1896c4c920ea397f40e6ce29724322

          SHA256

          e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

          SHA512

          4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

        • memory/1772-180-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-176-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-182-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-181-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-179-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-178-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-177-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-184-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-183-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-175-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-174-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-172-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-171-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-170-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-169-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-168-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-167-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1772-185-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2976-276-0x0000000002170000-0x0000000002188000-memory.dmp

          Filesize

          96KB

        • memory/2976-270-0x0000000000820000-0x000000000083A000-memory.dmp

          Filesize

          104KB

        • memory/2976-274-0x0000000004F50000-0x000000000544E000-memory.dmp

          Filesize

          5.0MB

        • memory/2976-277-0x00000000008B2000-0x00000000008D2000-memory.dmp

          Filesize

          128KB

        • memory/2976-278-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2976-279-0x0000000000400000-0x000000000056B000-memory.dmp

          Filesize

          1.4MB

        • memory/2976-283-0x00000000008B2000-0x00000000008D2000-memory.dmp

          Filesize

          128KB

        • memory/2976-284-0x0000000000400000-0x000000000056B000-memory.dmp

          Filesize

          1.4MB

        • memory/4424-353-0x00000000055F0000-0x000000000562E000-memory.dmp

          Filesize

          248KB

        • memory/4424-359-0x0000000005950000-0x00000000059E2000-memory.dmp

          Filesize

          584KB

        • memory/4424-351-0x0000000005590000-0x00000000055A2000-memory.dmp

          Filesize

          72KB

        • memory/4424-349-0x0000000005660000-0x000000000576A000-memory.dmp

          Filesize

          1.0MB

        • memory/4424-348-0x0000000005AE0000-0x00000000060E6000-memory.dmp

          Filesize

          6.0MB

        • memory/4424-335-0x0000000000D30000-0x0000000000D62000-memory.dmp

          Filesize

          200KB

        • memory/4424-355-0x0000000005770000-0x00000000057BB000-memory.dmp

          Filesize

          300KB

        • memory/4424-362-0x00000000059F0000-0x0000000005A56000-memory.dmp

          Filesize

          408KB

        • memory/4424-370-0x0000000006B70000-0x0000000006BE6000-memory.dmp

          Filesize

          472KB

        • memory/4424-371-0x0000000006BF0000-0x0000000006C40000-memory.dmp

          Filesize

          320KB

        • memory/4424-372-0x0000000006E10000-0x0000000006FD2000-memory.dmp

          Filesize

          1.8MB

        • memory/4424-373-0x0000000007510000-0x0000000007A3C000-memory.dmp

          Filesize

          5.2MB

        • memory/4480-384-0x00000000006F0000-0x00000000006FA000-memory.dmp

          Filesize

          40KB

        • memory/4696-130-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-145-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-139-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-137-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-138-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-136-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-135-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-134-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-133-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-132-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-131-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-147-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-129-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-128-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-127-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-126-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-141-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-125-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-124-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-142-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-143-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-119-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-144-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-140-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-146-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-164-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-163-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-123-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-162-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-122-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-161-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-159-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-160-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-158-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-157-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-156-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-155-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-154-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-153-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-152-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-151-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-150-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-149-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-120-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-121-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4696-148-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB