Analysis

  • max time kernel
    54s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2023, 14:04

General

  • Target

    597ecd3175523d6f845ce0c95b627162a6b4aa25628b904f374f73e6cb2eef8c.exe

  • Size

    529KB

  • MD5

    387ddc848df38a5780704b6d9aec707e

  • SHA1

    ba2e9adb255f5725cf40cbb0318c140d4e84254d

  • SHA256

    597ecd3175523d6f845ce0c95b627162a6b4aa25628b904f374f73e6cb2eef8c

  • SHA512

    b668906a91537a45da597a001a6608941314924d672369bdc6532cca690bcd835f96978e81b9a41c9047a78b7b3c2a20c6fad972ca9df8b426607e58eb304c97

  • SSDEEP

    12288:2MrCy90cL8+W+2n+7NcP2dBL3y7dJnPzMsCnp4IqtI:gyx8v+TL3y7r2pEI

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\597ecd3175523d6f845ce0c95b627162a6b4aa25628b904f374f73e6cb2eef8c.exe
    "C:\Users\Admin\AppData\Local\Temp\597ecd3175523d6f845ce0c95b627162a6b4aa25628b904f374f73e6cb2eef8c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFX47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFX47.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNs03.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNs03.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmL73Qw.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmL73Qw.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\syl31.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\syl31.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\syl31.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\syl31.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFX47.exe

    Filesize

    425KB

    MD5

    250d214a51b3ac0ad25c1d2c9ab89177

    SHA1

    77a0db5a0a6bb63b9736afd7e47fd05efdbfcd57

    SHA256

    58f9591b86951a0f7419aa4826500b4777e6a4d3315a18d19f831d37ba92d489

    SHA512

    937d19e0a11da948b8e50c43392e2085daf60b74a865fde9a4abbaa0587c479eeb6026e3bcee52d227aa4c47f22c4388f1e417152af1f8e3b6dbb6ba8583b78f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFX47.exe

    Filesize

    425KB

    MD5

    250d214a51b3ac0ad25c1d2c9ab89177

    SHA1

    77a0db5a0a6bb63b9736afd7e47fd05efdbfcd57

    SHA256

    58f9591b86951a0f7419aa4826500b4777e6a4d3315a18d19f831d37ba92d489

    SHA512

    937d19e0a11da948b8e50c43392e2085daf60b74a865fde9a4abbaa0587c479eeb6026e3bcee52d227aa4c47f22c4388f1e417152af1f8e3b6dbb6ba8583b78f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNs03.exe

    Filesize

    278KB

    MD5

    d8748bd07e7f282b21f60af22dbfe21e

    SHA1

    bb9a02188daf9b7a1452f7416a424593fd7a0eea

    SHA256

    6f1b87fa9b8038c2a9be20951850d9228d161864c62ddd613f02ea6b3125e041

    SHA512

    c72d2b335ccde3f43fcbe048bcedb75b5aea9993124f6b1a6489ff16c9f42d4d16b94f6566e4e3d29eee61c7bd4910006d84ef0858c1a5785b18125bd60f2065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dNs03.exe

    Filesize

    278KB

    MD5

    d8748bd07e7f282b21f60af22dbfe21e

    SHA1

    bb9a02188daf9b7a1452f7416a424593fd7a0eea

    SHA256

    6f1b87fa9b8038c2a9be20951850d9228d161864c62ddd613f02ea6b3125e041

    SHA512

    c72d2b335ccde3f43fcbe048bcedb75b5aea9993124f6b1a6489ff16c9f42d4d16b94f6566e4e3d29eee61c7bd4910006d84ef0858c1a5785b18125bd60f2065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmL73Qw.exe

    Filesize

    175KB

    MD5

    dd0c9e110c68ce1fa5308979ef718f7b

    SHA1

    473deb8069f0841d47b74b7f414dacc6f96eca78

    SHA256

    dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

    SHA512

    29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nmL73Qw.exe

    Filesize

    175KB

    MD5

    dd0c9e110c68ce1fa5308979ef718f7b

    SHA1

    473deb8069f0841d47b74b7f414dacc6f96eca78

    SHA256

    dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

    SHA512

    29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

  • memory/1016-414-0x0000000000C50000-0x0000000000C5A000-memory.dmp

    Filesize

    40KB

  • memory/2112-178-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-176-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-185-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-183-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-184-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-182-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-181-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-180-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-179-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-167-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-177-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-168-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-175-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-174-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-172-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-171-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-170-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2112-169-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2260-391-0x0000000005920000-0x000000000596B000-memory.dmp

    Filesize

    300KB

  • memory/2260-375-0x0000000000EE0000-0x0000000000F12000-memory.dmp

    Filesize

    200KB

  • memory/2696-147-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-132-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-146-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-143-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-140-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-138-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-158-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-157-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-159-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-160-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-161-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-162-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-163-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-164-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-150-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-153-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-155-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-156-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-154-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-152-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-151-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-149-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-119-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-145-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-144-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-142-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-141-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-139-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-137-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-136-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-135-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-134-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-133-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-148-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-131-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-120-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-130-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-129-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-121-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-122-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-123-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-124-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-125-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-126-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-127-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-128-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2996-319-0x0000000007020000-0x0000000007070000-memory.dmp

    Filesize

    320KB

  • memory/2996-324-0x0000000000400000-0x0000000000763000-memory.dmp

    Filesize

    3.4MB

  • memory/2996-298-0x0000000005D10000-0x0000000005D5B000-memory.dmp

    Filesize

    300KB

  • memory/2996-303-0x0000000005EA0000-0x0000000005F06000-memory.dmp

    Filesize

    408KB

  • memory/2996-311-0x0000000000820000-0x000000000096A000-memory.dmp

    Filesize

    1.3MB

  • memory/2996-312-0x0000000000400000-0x0000000000763000-memory.dmp

    Filesize

    3.4MB

  • memory/2996-313-0x0000000006590000-0x0000000006622000-memory.dmp

    Filesize

    584KB

  • memory/2996-314-0x0000000006660000-0x0000000006822000-memory.dmp

    Filesize

    1.8MB

  • memory/2996-315-0x0000000006830000-0x0000000006D5C000-memory.dmp

    Filesize

    5.2MB

  • memory/2996-318-0x0000000006FA0000-0x0000000007016000-memory.dmp

    Filesize

    472KB

  • memory/2996-296-0x0000000005BC0000-0x0000000005BFE000-memory.dmp

    Filesize

    248KB

  • memory/2996-292-0x0000000005A60000-0x0000000005B6A000-memory.dmp

    Filesize

    1.0MB

  • memory/2996-294-0x0000000005BA0000-0x0000000005BB2000-memory.dmp

    Filesize

    72KB

  • memory/2996-291-0x0000000005420000-0x0000000005A26000-memory.dmp

    Filesize

    6.0MB

  • memory/2996-280-0x00000000028F0000-0x0000000002934000-memory.dmp

    Filesize

    272KB

  • memory/2996-278-0x0000000004F20000-0x000000000541E000-memory.dmp

    Filesize

    5.0MB

  • memory/2996-274-0x0000000002650000-0x0000000002696000-memory.dmp

    Filesize

    280KB

  • memory/2996-264-0x0000000000400000-0x0000000000763000-memory.dmp

    Filesize

    3.4MB

  • memory/2996-263-0x00000000007B0000-0x00000000007FB000-memory.dmp

    Filesize

    300KB

  • memory/2996-261-0x0000000000820000-0x000000000096A000-memory.dmp

    Filesize

    1.3MB