Analysis

  • max time kernel
    54s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/02/2023, 21:21

General

  • Target

    4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe

  • Size

    763KB

  • MD5

    2eed6f34c26fd02b3435634d77a0ea21

  • SHA1

    a886b4026a662f8bc3a726f5e30c982b0370a341

  • SHA256

    4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342

  • SHA512

    839ef6e7ed538064a3ee74b32f5428bc95c2e62e8f955a913105da4b3536d14495e27a4a6b34f992efb6d57bf79cd9d1bb866af91ea5cd8fa9a88bf0e8809d54

  • SSDEEP

    12288:eMrJy90ktmEgitJZEZv8MqcWZFlp5wc60swa3sTB/4i6ca/H9Bd:Hy5Dt/iv8bp5Bn6iAZ/9Bd

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

redline

Botnet

cr2

C2

176.113.115.17:4132

Attributes
  • auth_value

    4bf573d6f5ab16f3b5e36da6855dc128

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe
    "C:\Users\Admin\AppData\Local\Temp\4c729081fe4f035d5e0dff8c6d141d996e5da4c872b0fa8210849845762ed342.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viB60.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viB60.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nWF41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nWF41.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\snF71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\snF71.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1556
  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjv69.exe
    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjv69.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVg46.exe
      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVg46.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2276
    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\luR93.exe
      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\luR93.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1504

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\snF71.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\snF71.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viB60.exe

          Filesize

          659KB

          MD5

          5ca0d776090a3f5c425764af2abf4002

          SHA1

          8132191b86fa8c83c4a186277eb99fcb5444aa8e

          SHA256

          d6dae9584b6700e459568060b26f117094ab3636fa82e750ab692d9260d4339b

          SHA512

          97eff5db9966edc7726115fcfaaafaaf0c171a5c59cd58f86b397b62f3fe1739ddb9c3c3842615a70abde99d166f550bcd4d03a14f46801613d60ecdbb1e9c55

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viB60.exe

          Filesize

          659KB

          MD5

          5ca0d776090a3f5c425764af2abf4002

          SHA1

          8132191b86fa8c83c4a186277eb99fcb5444aa8e

          SHA256

          d6dae9584b6700e459568060b26f117094ab3636fa82e750ab692d9260d4339b

          SHA512

          97eff5db9966edc7726115fcfaaafaaf0c171a5c59cd58f86b397b62f3fe1739ddb9c3c3842615a70abde99d166f550bcd4d03a14f46801613d60ecdbb1e9c55

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nWF41.exe

          Filesize

          175KB

          MD5

          69f79e05d0c83aee310d9adfe5aa7f2b

          SHA1

          485c490180380051a14316564fbda07723be11b1

          SHA256

          c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

          SHA512

          f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nWF41.exe

          Filesize

          175KB

          MD5

          69f79e05d0c83aee310d9adfe5aa7f2b

          SHA1

          485c490180380051a14316564fbda07723be11b1

          SHA256

          c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

          SHA512

          f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjv69.exe

          Filesize

          515KB

          MD5

          c4cb4a2e9e71a63939110093c77f978a

          SHA1

          5f1c9d084faa5cf4e1bca4918bc405710d7c7bd4

          SHA256

          518c16034b1d2592ac29c61c7b89ead1a790128c8ed67247ffb20ebdbbb4c7e8

          SHA512

          db3a29cf45dacd85f214cdae89f6768eb7434751b9122868ad98eb081d0b6093a71d67fe11db5566c06a257769673d39c064cf187985ca349eb77d8dda7bea7f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vjv69.exe

          Filesize

          515KB

          MD5

          c4cb4a2e9e71a63939110093c77f978a

          SHA1

          5f1c9d084faa5cf4e1bca4918bc405710d7c7bd4

          SHA256

          518c16034b1d2592ac29c61c7b89ead1a790128c8ed67247ffb20ebdbbb4c7e8

          SHA512

          db3a29cf45dacd85f214cdae89f6768eb7434751b9122868ad98eb081d0b6093a71d67fe11db5566c06a257769673d39c064cf187985ca349eb77d8dda7bea7f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVg46.exe

          Filesize

          292KB

          MD5

          d24ae9ef5f6e13b6661f299a1c1b1b60

          SHA1

          a9eb608a807806e5ce89d8fed55b9b267afe101b

          SHA256

          ce43f7268b5aa74fe55290ede0defc619d1474a38fff87f5077586f346b78f19

          SHA512

          395e34541f21e9128a7e61abd0eb6d7010e7bec526783b5e798c5185a27dba69a4b6a7c6afcc99c09e33f235673ad9b730b915c317ffc6f2d6ac2c7514f2bc15

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dVg46.exe

          Filesize

          292KB

          MD5

          d24ae9ef5f6e13b6661f299a1c1b1b60

          SHA1

          a9eb608a807806e5ce89d8fed55b9b267afe101b

          SHA256

          ce43f7268b5aa74fe55290ede0defc619d1474a38fff87f5077586f346b78f19

          SHA512

          395e34541f21e9128a7e61abd0eb6d7010e7bec526783b5e798c5185a27dba69a4b6a7c6afcc99c09e33f235673ad9b730b915c317ffc6f2d6ac2c7514f2bc15

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\luR93.exe

          Filesize

          281KB

          MD5

          4f7302c3f372c146e2dd87a7ea481f31

          SHA1

          c1f39c30a4138440399ae1c566cd414b2a4dd459

          SHA256

          6c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3

          SHA512

          a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\luR93.exe

          Filesize

          281KB

          MD5

          4f7302c3f372c146e2dd87a7ea481f31

          SHA1

          c1f39c30a4138440399ae1c566cd414b2a4dd459

          SHA256

          6c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3

          SHA512

          a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312

        • memory/1504-520-0x0000000000600000-0x0000000000632000-memory.dmp

          Filesize

          200KB

        • memory/1556-931-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

          Filesize

          40KB

        • memory/2276-357-0x0000000006360000-0x00000000063F2000-memory.dmp

          Filesize

          584KB

        • memory/2276-326-0x0000000000400000-0x000000000057B000-memory.dmp

          Filesize

          1.5MB

        • memory/2276-358-0x0000000006540000-0x0000000006702000-memory.dmp

          Filesize

          1.8MB

        • memory/2276-362-0x00000000005F0000-0x000000000069E000-memory.dmp

          Filesize

          696KB

        • memory/2276-349-0x0000000005CA0000-0x0000000005D06000-memory.dmp

          Filesize

          408KB

        • memory/2276-344-0x0000000005B30000-0x0000000005B7B000-memory.dmp

          Filesize

          300KB

        • memory/2276-342-0x0000000002950000-0x000000000298E000-memory.dmp

          Filesize

          248KB

        • memory/2276-340-0x0000000002930000-0x0000000002942000-memory.dmp

          Filesize

          72KB

        • memory/2276-338-0x0000000005920000-0x0000000005A2A000-memory.dmp

          Filesize

          1.0MB

        • memory/2276-337-0x0000000005310000-0x0000000005916000-memory.dmp

          Filesize

          6.0MB

        • memory/2276-325-0x0000000000580000-0x00000000005CB000-memory.dmp

          Filesize

          300KB

        • memory/2276-359-0x0000000006710000-0x0000000006C3C000-memory.dmp

          Filesize

          5.2MB

        • memory/2276-323-0x00000000005F0000-0x000000000069E000-memory.dmp

          Filesize

          696KB

        • memory/2276-324-0x0000000002580000-0x00000000025C4000-memory.dmp

          Filesize

          272KB

        • memory/2276-321-0x0000000004D10000-0x000000000520E000-memory.dmp

          Filesize

          5.0MB

        • memory/2276-317-0x0000000002220000-0x0000000002266000-memory.dmp

          Filesize

          280KB

        • memory/2276-363-0x0000000006EC0000-0x0000000006F36000-memory.dmp

          Filesize

          472KB

        • memory/2276-364-0x0000000006F40000-0x0000000006F90000-memory.dmp

          Filesize

          320KB

        • memory/2276-369-0x0000000000400000-0x000000000057B000-memory.dmp

          Filesize

          1.5MB

        • memory/4728-517-0x0000000000E30000-0x0000000000E62000-memory.dmp

          Filesize

          200KB

        • memory/4792-142-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-150-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-117-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-118-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-119-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-120-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-121-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-122-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-123-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-124-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-125-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-126-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-127-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-128-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-129-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-130-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-161-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-160-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-158-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-156-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-131-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-132-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-133-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-154-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-134-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-159-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-157-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-155-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-149-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-144-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-153-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-152-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-151-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-135-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-148-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-147-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-146-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-145-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-143-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-116-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-141-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-140-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-139-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-138-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-137-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4792-136-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-176-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-179-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-165-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-177-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-168-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-171-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-173-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-174-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-164-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-166-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-180-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-182-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-181-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-178-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-175-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-172-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-169-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB

        • memory/4856-167-0x00000000777D0000-0x000000007795E000-memory.dmp

          Filesize

          1.6MB