Analysis

  • max time kernel
    58s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/02/2023, 09:54

General

  • Target

    833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe

  • Size

    861KB

  • MD5

    8be103cbbac919ed79f30e410fbabd5f

  • SHA1

    e162ab167d980ca70ac8d038814a64cfb1e57790

  • SHA256

    833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52

  • SHA512

    0039776beac61ce9ac77bd334d89805c829d42db71796007680f67da294630bee2c6503b6a162a75db3d83db07a9a0fa545e72a6dccc69b8ba6ecb40e1170884

  • SSDEEP

    24576:PyoJVzpqGGJ+1DAjDJ7Lze4bQmJculZEJSTC:aEHqGKgUauQqcaE

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe
    "C:\Users\Admin\AppData\Local\Temp\833bc2719d026c922e9d91d926cccf348f8cd34920807c90b2cc0eda7215be52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\did5824.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\did5824.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvY2412.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvY2412.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4204
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mgQ99Rb.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mgQ99Rb.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4756
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\njo23aP.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\njo23aP.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oPd60Ff.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oPd60Ff.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pGf05uI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pGf05uI.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2796

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\did5824.exe

          Filesize

          717KB

          MD5

          22e119297508e8fe3f312ecb394beeed

          SHA1

          39caf5df5ae3144a0a896b55e695d2cb8526ecc1

          SHA256

          45aef075b0fd144a8e7b395446954c8e28c2e5029c27872647d939b04d2f3fd2

          SHA512

          819012e90b9ad8674753f6656e96a28a01128fe193047664311b85df30107d0bf4caa778631b442aa2ebaf3e9ddcb49a5b3aaa928327e724f763528954ab706f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\did5824.exe

          Filesize

          717KB

          MD5

          22e119297508e8fe3f312ecb394beeed

          SHA1

          39caf5df5ae3144a0a896b55e695d2cb8526ecc1

          SHA256

          45aef075b0fd144a8e7b395446954c8e28c2e5029c27872647d939b04d2f3fd2

          SHA512

          819012e90b9ad8674753f6656e96a28a01128fe193047664311b85df30107d0bf4caa778631b442aa2ebaf3e9ddcb49a5b3aaa928327e724f763528954ab706f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pGf05uI.exe

          Filesize

          175KB

          MD5

          ce5ef6aac94fdb2af40da676f6cab58f

          SHA1

          c393f24b1550955a686ee39067f20813415af95f

          SHA256

          ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

          SHA512

          2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pGf05uI.exe

          Filesize

          175KB

          MD5

          ce5ef6aac94fdb2af40da676f6cab58f

          SHA1

          c393f24b1550955a686ee39067f20813415af95f

          SHA256

          ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

          SHA512

          2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvY2412.exe

          Filesize

          379KB

          MD5

          2656c33472609ae0e00f05f563aa8276

          SHA1

          b49faa9b02b3aa7d7a92c6ebca816282d648c30a

          SHA256

          718e93adfea4a2c46e146720cdd3287a3ee9a5aa7c1e24f621038619f2a3860a

          SHA512

          16e1d6b177c13d969496ef5ee378914145155e795a58179cceb3d1c2da4fb1f996f1d0e3f687db08390e7a4c0e705e588e7494ab4d31128c382f6cea7735367e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvY2412.exe

          Filesize

          379KB

          MD5

          2656c33472609ae0e00f05f563aa8276

          SHA1

          b49faa9b02b3aa7d7a92c6ebca816282d648c30a

          SHA256

          718e93adfea4a2c46e146720cdd3287a3ee9a5aa7c1e24f621038619f2a3860a

          SHA512

          16e1d6b177c13d969496ef5ee378914145155e795a58179cceb3d1c2da4fb1f996f1d0e3f687db08390e7a4c0e705e588e7494ab4d31128c382f6cea7735367e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oPd60Ff.exe

          Filesize

          306KB

          MD5

          0bdf7901be49e053cb6b88e9e1d4a805

          SHA1

          80bb92261e5405f2a100740673d365251e70f9a6

          SHA256

          ceae18ce869f741fb9f5cf755cc5e79c0b2d509aef739236ff5bc24662a74a9a

          SHA512

          8fed6f65db29f0c1ab4cb36e83f003c241ed601a67fd8c520f3e7a13c6192a778e461dc827df6ec91454f562f7d70e4bf00dc945cf214fb22aa5acffb8813428

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oPd60Ff.exe

          Filesize

          306KB

          MD5

          0bdf7901be49e053cb6b88e9e1d4a805

          SHA1

          80bb92261e5405f2a100740673d365251e70f9a6

          SHA256

          ceae18ce869f741fb9f5cf755cc5e79c0b2d509aef739236ff5bc24662a74a9a

          SHA512

          8fed6f65db29f0c1ab4cb36e83f003c241ed601a67fd8c520f3e7a13c6192a778e461dc827df6ec91454f562f7d70e4bf00dc945cf214fb22aa5acffb8813428

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mgQ99Rb.exe

          Filesize

          248KB

          MD5

          9821f24e5aa2c1312d1b025f18ed5e03

          SHA1

          63bf2524ee14b19cd323e77f9e2d96e10d949fb6

          SHA256

          87be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4

          SHA512

          5c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mgQ99Rb.exe

          Filesize

          248KB

          MD5

          9821f24e5aa2c1312d1b025f18ed5e03

          SHA1

          63bf2524ee14b19cd323e77f9e2d96e10d949fb6

          SHA256

          87be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4

          SHA512

          5c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\njo23aP.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\njo23aP.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • memory/2704-132-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-160-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-140-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-138-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-141-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-143-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-144-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-145-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-146-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-147-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-149-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-151-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-152-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-150-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-154-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-155-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-153-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-156-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-148-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-157-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-142-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-135-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-137-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-130-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-128-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-127-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-159-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-139-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-161-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-158-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-163-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-165-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-164-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-162-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-121-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-136-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-134-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-122-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-123-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-124-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-125-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-126-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-120-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-129-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-131-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2704-133-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/2796-580-0x0000000000060000-0x0000000000092000-memory.dmp

          Filesize

          200KB

        • memory/3336-489-0x00000000021E0000-0x0000000002226000-memory.dmp

          Filesize

          280KB

        • memory/3336-492-0x0000000000680000-0x00000000007CA000-memory.dmp

          Filesize

          1.3MB

        • memory/3336-493-0x0000000000680000-0x00000000007CA000-memory.dmp

          Filesize

          1.3MB

        • memory/3336-495-0x0000000000400000-0x000000000057F000-memory.dmp

          Filesize

          1.5MB

        • memory/3336-497-0x00000000024C0000-0x0000000002504000-memory.dmp

          Filesize

          272KB

        • memory/3336-511-0x00000000053C0000-0x000000000540B000-memory.dmp

          Filesize

          300KB

        • memory/3336-529-0x0000000000400000-0x000000000057F000-memory.dmp

          Filesize

          1.5MB

        • memory/3732-184-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-182-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-168-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-169-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-170-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-172-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-176-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-179-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-175-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-185-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-177-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-186-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-183-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-171-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-180-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-173-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-181-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/3732-178-0x00000000773D0000-0x000000007755E000-memory.dmp

          Filesize

          1.6MB

        • memory/4756-332-0x00000000007A2000-0x00000000007C2000-memory.dmp

          Filesize

          128KB

        • memory/4756-335-0x0000000000400000-0x0000000000570000-memory.dmp

          Filesize

          1.4MB

        • memory/4756-316-0x00000000007A2000-0x00000000007C2000-memory.dmp

          Filesize

          128KB

        • memory/4756-317-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4756-318-0x0000000000400000-0x0000000000570000-memory.dmp

          Filesize

          1.4MB

        • memory/4756-323-0x00000000020A0000-0x00000000020BA000-memory.dmp

          Filesize

          104KB

        • memory/4756-327-0x0000000004C70000-0x000000000516E000-memory.dmp

          Filesize

          5.0MB

        • memory/4756-329-0x0000000002650000-0x0000000002668000-memory.dmp

          Filesize

          96KB

        • memory/4756-334-0x00000000007A2000-0x00000000007C2000-memory.dmp

          Filesize

          128KB

        • memory/4864-422-0x0000000006610000-0x0000000006660000-memory.dmp

          Filesize

          320KB

        • memory/4864-399-0x0000000005AC0000-0x00000000060C6000-memory.dmp

          Filesize

          6.0MB

        • memory/4864-386-0x0000000000D10000-0x0000000000D42000-memory.dmp

          Filesize

          200KB

        • memory/4864-400-0x0000000005640000-0x000000000574A000-memory.dmp

          Filesize

          1.0MB

        • memory/4864-402-0x0000000005570000-0x0000000005582000-memory.dmp

          Filesize

          72KB

        • memory/4864-424-0x0000000007510000-0x0000000007A3C000-memory.dmp

          Filesize

          5.2MB

        • memory/4864-423-0x0000000006E10000-0x0000000006FD2000-memory.dmp

          Filesize

          1.8MB

        • memory/4864-404-0x00000000055D0000-0x000000000560E000-memory.dmp

          Filesize

          248KB

        • memory/4864-421-0x0000000006590000-0x0000000006606000-memory.dmp

          Filesize

          472KB

        • memory/4864-419-0x0000000006370000-0x0000000006402000-memory.dmp

          Filesize

          584KB

        • memory/4864-411-0x0000000005910000-0x0000000005976000-memory.dmp

          Filesize

          408KB

        • memory/4864-406-0x0000000005750000-0x000000000579B000-memory.dmp

          Filesize

          300KB