Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/02/2023, 10:57

General

  • Target

    846d189c1ca3e1cd2bd2f6741ac066c1d7ac3f6fd7a4f5846cb98c9071028f52.exe

  • Size

    817KB

  • MD5

    57a05297ed5a3f532264544412706d6c

  • SHA1

    b4c06eccf5078014d185cd93703bfd99cffd5d4b

  • SHA256

    846d189c1ca3e1cd2bd2f6741ac066c1d7ac3f6fd7a4f5846cb98c9071028f52

  • SHA512

    15195a811cd6400a1874962f9d0e947065326f7bf38f763b9a13af53122c4eb5132ca18bf87cfd3564573ba2474f696554fce558ed4da5313cff92cda776f4b4

  • SSDEEP

    24576:dyjxZVfpFVAjVxtd3/q494zE7cp/0jGehkYZTWV:4jxZFpFut/qhzEU7ehkY

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\846d189c1ca3e1cd2bd2f6741ac066c1d7ac3f6fd7a4f5846cb98c9071028f52.exe
    "C:\Users\Admin\AppData\Local\Temp\846d189c1ca3e1cd2bd2f6741ac066c1d7ac3f6fd7a4f5846cb98c9071028f52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgI8801.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgI8801.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\viA7489.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\viA7489.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNv8179.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNv8179.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4492
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\scP0061.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\scP0061.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuS77qD.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuS77qD.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usO30bw.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usO30bw.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:304

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usO30bw.exe

          Filesize

          303KB

          MD5

          8986c2447fdfca98d3f1c070d630c7ff

          SHA1

          1e702de1fb37ddeae99f0e68706e81e8fc4cb8e1

          SHA256

          cd9cb483be92c3e56111bffc913c5e6e616f69cd484bab5fe13ba10eb03bf3e5

          SHA512

          6ef6913f1e18ad831fb8e1db19fd5eeaee50caa87877f701819d6fd2ba305b06f4abde6b5d387c4b522e3edf4f2ebaebc0c95af26e520158c54e27ccb740a185

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usO30bw.exe

          Filesize

          303KB

          MD5

          8986c2447fdfca98d3f1c070d630c7ff

          SHA1

          1e702de1fb37ddeae99f0e68706e81e8fc4cb8e1

          SHA256

          cd9cb483be92c3e56111bffc913c5e6e616f69cd484bab5fe13ba10eb03bf3e5

          SHA512

          6ef6913f1e18ad831fb8e1db19fd5eeaee50caa87877f701819d6fd2ba305b06f4abde6b5d387c4b522e3edf4f2ebaebc0c95af26e520158c54e27ccb740a185

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgI8801.exe

          Filesize

          482KB

          MD5

          92481156a74a7e34f8a15b9208b53aba

          SHA1

          ab5cf45f16d69f004b48ca453c89ae4684e26dd5

          SHA256

          54635518ed2c9d7031f9c9d129d8f719a618a682d5c476302702053315c5db01

          SHA512

          bedd9ca3f593735ba7ecd4cd5507c5ae67224c0f809536de7c197ca21478a9de6f1bba2bb3cf820ec116f6616e009c7f1ee1631b8a292cd7fa8b6f37e0cb7e5b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgI8801.exe

          Filesize

          482KB

          MD5

          92481156a74a7e34f8a15b9208b53aba

          SHA1

          ab5cf45f16d69f004b48ca453c89ae4684e26dd5

          SHA256

          54635518ed2c9d7031f9c9d129d8f719a618a682d5c476302702053315c5db01

          SHA512

          bedd9ca3f593735ba7ecd4cd5507c5ae67224c0f809536de7c197ca21478a9de6f1bba2bb3cf820ec116f6616e009c7f1ee1631b8a292cd7fa8b6f37e0cb7e5b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuS77qD.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuS77qD.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\viA7489.exe

          Filesize

          337KB

          MD5

          a0441f500cad8ed05f5072c75bca9935

          SHA1

          2cc0f84ec5f0191391843ba49fbbf48492be7c97

          SHA256

          2c852e71aa325504af739a3063da7d8bff43c4dc06dd7b2e60f848b859ed1b31

          SHA512

          7b96df6e20e3d58d0118ece62c731c7488c9b95881c7e4ddbdd8211393d7c76c03eb154e86e81b62e78d3e319eb4261e187fdd7b93f898d1575d1617d9a54611

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\viA7489.exe

          Filesize

          337KB

          MD5

          a0441f500cad8ed05f5072c75bca9935

          SHA1

          2cc0f84ec5f0191391843ba49fbbf48492be7c97

          SHA256

          2c852e71aa325504af739a3063da7d8bff43c4dc06dd7b2e60f848b859ed1b31

          SHA512

          7b96df6e20e3d58d0118ece62c731c7488c9b95881c7e4ddbdd8211393d7c76c03eb154e86e81b62e78d3e319eb4261e187fdd7b93f898d1575d1617d9a54611

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNv8179.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNv8179.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\scP0061.exe

          Filesize

          246KB

          MD5

          5689d82e0bb0b6c738220f0e2d50f757

          SHA1

          1f1c0b8fceb6cb706866f2e32338a661af642e24

          SHA256

          7cb1ef101075ff5d838a237ac29decc694606f34c102e4ec189b2f47780b60dd

          SHA512

          dc16bef6fc2aee37df075e0db1e278889d6228d6979d2f680a88286fb6f90bf77249871cf9db4746e343f3ae4672d518873732ed04aedb3e5ea9947bbeb6f96b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\scP0061.exe

          Filesize

          246KB

          MD5

          5689d82e0bb0b6c738220f0e2d50f757

          SHA1

          1f1c0b8fceb6cb706866f2e32338a661af642e24

          SHA256

          7cb1ef101075ff5d838a237ac29decc694606f34c102e4ec189b2f47780b60dd

          SHA512

          dc16bef6fc2aee37df075e0db1e278889d6228d6979d2f680a88286fb6f90bf77249871cf9db4746e343f3ae4672d518873732ed04aedb3e5ea9947bbeb6f96b

        • memory/304-495-0x0000000000400000-0x000000000057D000-memory.dmp

          Filesize

          1.5MB

        • memory/304-510-0x00000000059E0000-0x0000000005A2B000-memory.dmp

          Filesize

          300KB

        • memory/304-524-0x0000000000822000-0x0000000000850000-memory.dmp

          Filesize

          184KB

        • memory/304-496-0x0000000002500000-0x0000000002544000-memory.dmp

          Filesize

          272KB

        • memory/304-491-0x0000000000822000-0x0000000000850000-memory.dmp

          Filesize

          184KB

        • memory/304-488-0x0000000002360000-0x00000000023A6000-memory.dmp

          Filesize

          280KB

        • memory/304-493-0x0000000000650000-0x000000000069B000-memory.dmp

          Filesize

          300KB

        • memory/304-530-0x0000000000400000-0x000000000057D000-memory.dmp

          Filesize

          1.5MB

        • memory/304-529-0x0000000000822000-0x0000000000850000-memory.dmp

          Filesize

          184KB

        • memory/2000-180-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-173-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-179-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-178-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-182-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-177-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-176-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-175-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-174-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-181-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-172-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-171-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-168-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-169-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-167-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-166-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-165-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/2000-164-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-144-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-131-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-159-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-160-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-161-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-157-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-156-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-155-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-154-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-153-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-152-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-151-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-150-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-149-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-148-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-147-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-146-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-145-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-116-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-143-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-142-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-141-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-140-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-139-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-138-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-137-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-136-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-117-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-135-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-118-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-134-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-133-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-119-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-120-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-132-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-158-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-121-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-122-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-123-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-124-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-125-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-126-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-127-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-128-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-129-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3520-130-0x0000000077A00000-0x0000000077B8E000-memory.dmp

          Filesize

          1.6MB

        • memory/3716-427-0x0000000006970000-0x00000000069C0000-memory.dmp

          Filesize

          320KB

        • memory/3716-411-0x0000000005180000-0x00000000051E6000-memory.dmp

          Filesize

          408KB

        • memory/3716-400-0x0000000004EE0000-0x0000000004FEA000-memory.dmp

          Filesize

          1.0MB

        • memory/3716-402-0x0000000004E00000-0x0000000004E12000-memory.dmp

          Filesize

          72KB

        • memory/3716-404-0x0000000004E80000-0x0000000004EBE000-memory.dmp

          Filesize

          248KB

        • memory/3716-406-0x0000000004FF0000-0x000000000503B000-memory.dmp

          Filesize

          300KB

        • memory/3716-419-0x0000000005D50000-0x0000000005DE2000-memory.dmp

          Filesize

          584KB

        • memory/3716-421-0x0000000005FE0000-0x00000000061A2000-memory.dmp

          Filesize

          1.8MB

        • memory/3716-422-0x0000000006D20000-0x000000000724C000-memory.dmp

          Filesize

          5.2MB

        • memory/3716-399-0x00000000053A0000-0x00000000059A6000-memory.dmp

          Filesize

          6.0MB

        • memory/3716-426-0x00000000068F0000-0x0000000006966000-memory.dmp

          Filesize

          472KB

        • memory/3716-386-0x00000000005A0000-0x00000000005D2000-memory.dmp

          Filesize

          200KB

        • memory/4204-333-0x0000000000630000-0x000000000077A000-memory.dmp

          Filesize

          1.3MB

        • memory/4204-330-0x0000000000400000-0x000000000056F000-memory.dmp

          Filesize

          1.4MB

        • memory/4204-329-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4204-335-0x0000000000400000-0x000000000056F000-memory.dmp

          Filesize

          1.4MB

        • memory/4204-328-0x0000000000630000-0x000000000077A000-memory.dmp

          Filesize

          1.3MB

        • memory/4204-325-0x0000000004CE0000-0x00000000051DE000-memory.dmp

          Filesize

          5.0MB

        • memory/4204-321-0x0000000002160000-0x000000000217A000-memory.dmp

          Filesize

          104KB

        • memory/4204-327-0x0000000002440000-0x0000000002458000-memory.dmp

          Filesize

          96KB

        • memory/4492-263-0x00000000006D0000-0x00000000006DA000-memory.dmp

          Filesize

          40KB