Analysis

  • max time kernel
    54s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2023, 10:34

General

  • Target

    2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102.exe

  • Size

    528KB

  • MD5

    38d0a603b47656510ee5a6f43f357ea7

  • SHA1

    01df5ef71c6f1991eb6ff9f1fbd0f507436bc1b7

  • SHA256

    2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102

  • SHA512

    768d1e471b924fdead96f3b0f101eb990a39d1837810d43fb3901f2fef639875fd1ba2d1661856ade2617160e6cbfe1fda3369712f97519726016a15d1cc32d5

  • SSDEEP

    12288:EMrky90pI6HDDhdizNnZKrETGXMvgD1se79lrLVOSm1eyJ6:4yoWZsEicvgnZ951

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102.exe
    "C:\Users\Admin\AppData\Local\Temp\2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:968

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe

          Filesize

          424KB

          MD5

          5e12ca7819c6446fc6475448a5d55630

          SHA1

          98b7f790664b354ed1d619060965787a9b28dad0

          SHA256

          6ff725e04d4a1701090310296e0a2a0b6a4a90f54b4c6abd8caa886f919e8468

          SHA512

          20c9e6d4314ced963fb687ebb9ff6cde7811a5228fced14664958fc0137a1ee3c48effa1d8c393c030806ebc5e0b99eb638b357f4efcd385c3bc3cb3d0b0c729

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe

          Filesize

          424KB

          MD5

          5e12ca7819c6446fc6475448a5d55630

          SHA1

          98b7f790664b354ed1d619060965787a9b28dad0

          SHA256

          6ff725e04d4a1701090310296e0a2a0b6a4a90f54b4c6abd8caa886f919e8468

          SHA512

          20c9e6d4314ced963fb687ebb9ff6cde7811a5228fced14664958fc0137a1ee3c48effa1d8c393c030806ebc5e0b99eb638b357f4efcd385c3bc3cb3d0b0c729

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe

          Filesize

          278KB

          MD5

          5e7ad96227ac97ea047c202bab0a79dd

          SHA1

          700c285600d0d8324660dac5326eaae1b1891645

          SHA256

          1e55c8ff6e68cb300f581fd5003dd36f35835d00f9c8938a3a0eb9b7cded4875

          SHA512

          27af17d76db10679b00a15ef754ebc41e830bc4fbcd93073d1cfba416824e800da10e636bd44ce8f177281c4a706c41c9af58ea82e9db54c81d038d7b18af08f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe

          Filesize

          278KB

          MD5

          5e7ad96227ac97ea047c202bab0a79dd

          SHA1

          700c285600d0d8324660dac5326eaae1b1891645

          SHA256

          1e55c8ff6e68cb300f581fd5003dd36f35835d00f9c8938a3a0eb9b7cded4875

          SHA512

          27af17d76db10679b00a15ef754ebc41e830bc4fbcd93073d1cfba416824e800da10e636bd44ce8f177281c4a706c41c9af58ea82e9db54c81d038d7b18af08f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • memory/968-409-0x0000000000B50000-0x0000000000B5A000-memory.dmp

          Filesize

          40KB

        • memory/2124-176-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-180-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-178-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-177-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-175-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-174-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-173-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-172-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-179-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-171-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-170-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-168-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-167-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-166-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-165-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-164-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-163-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2124-181-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2504-271-0x0000000000A12000-0x0000000000A41000-memory.dmp

          Filesize

          188KB

        • memory/2504-319-0x0000000000400000-0x0000000000763000-memory.dmp

          Filesize

          3.4MB

        • memory/2504-318-0x0000000000A12000-0x0000000000A41000-memory.dmp

          Filesize

          188KB

        • memory/2504-313-0x0000000000A12000-0x0000000000A41000-memory.dmp

          Filesize

          188KB

        • memory/2504-310-0x0000000006A40000-0x0000000006F6C000-memory.dmp

          Filesize

          5.2MB

        • memory/2504-309-0x0000000006850000-0x0000000006A12000-memory.dmp

          Filesize

          1.8MB

        • memory/2504-308-0x0000000006690000-0x00000000066E0000-memory.dmp

          Filesize

          320KB

        • memory/2504-307-0x0000000006600000-0x0000000006676000-memory.dmp

          Filesize

          472KB

        • memory/2504-299-0x0000000005920000-0x0000000005986000-memory.dmp

          Filesize

          408KB

        • memory/2504-297-0x0000000005880000-0x0000000005912000-memory.dmp

          Filesize

          584KB

        • memory/2504-293-0x00000000056F0000-0x000000000573B000-memory.dmp

          Filesize

          300KB

        • memory/2504-291-0x0000000004F80000-0x0000000004FBE000-memory.dmp

          Filesize

          248KB

        • memory/2504-289-0x0000000004F60000-0x0000000004F72000-memory.dmp

          Filesize

          72KB

        • memory/2504-287-0x00000000054D0000-0x00000000055DA000-memory.dmp

          Filesize

          1.0MB

        • memory/2504-286-0x0000000005AE0000-0x00000000060E6000-memory.dmp

          Filesize

          6.0MB

        • memory/2504-274-0x0000000004E80000-0x0000000004EC4000-memory.dmp

          Filesize

          272KB

        • memory/2504-275-0x0000000000400000-0x0000000000763000-memory.dmp

          Filesize

          3.4MB

        • memory/2504-273-0x00000000022B0000-0x00000000022FB000-memory.dmp

          Filesize

          300KB

        • memory/2504-270-0x0000000004FD0000-0x00000000054CE000-memory.dmp

          Filesize

          5.0MB

        • memory/2504-266-0x0000000004E00000-0x0000000004E46000-memory.dmp

          Filesize

          280KB

        • memory/2728-143-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-160-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-138-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-137-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-136-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-135-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-134-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-133-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-132-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-131-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-130-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-129-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-128-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-127-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-126-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-125-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-124-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-140-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-123-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-122-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-141-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-142-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-115-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-145-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-144-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-139-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-159-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-158-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-157-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-156-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-153-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-155-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-154-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-152-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-151-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-150-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-149-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-148-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-147-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-146-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-116-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-121-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-120-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-117-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-118-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/2728-119-0x0000000077100000-0x000000007728E000-memory.dmp

          Filesize

          1.6MB

        • memory/3660-386-0x0000000004A90000-0x0000000004ADB000-memory.dmp

          Filesize

          300KB

        • memory/3660-370-0x0000000000040000-0x0000000000072000-memory.dmp

          Filesize

          200KB