Analysis

  • max time kernel
    47s
  • max time network
    62s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/02/2023, 01:00

General

  • Target

    f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9.exe

  • Size

    483KB

  • MD5

    df41b1217078bd6b12e68907a184519c

  • SHA1

    d0e36bff18324827374dbab4f786da81b18167ba

  • SHA256

    f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9

  • SHA512

    8121443ad68ca20ee9502ad864ee2582883b1af2da6d77ba37bbd29848f2dd1c069acef2f544c7792600c2b2490326e86bc53eac792e74850c5588d2cf5ba590

  • SSDEEP

    12288:JMrXy90WApFMu1iiKEjLzKl6bCSYZB7SZrj76Y:mygMucMM7Sd7N

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9.exe
    "C:\Users\Admin\AppData\Local\Temp\f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nIK35ya34.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nIK35ya34.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dfv57HE.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dfv57HE.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eqv42uh.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eqv42uh.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fGS78ds.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fGS78ds.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3432

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fGS78ds.exe

          Filesize

          175KB

          MD5

          a5f5c5d6291c7ae9e1d1b7ed1e551490

          SHA1

          3d06413341893b838549939e15f8f1eec423d71a

          SHA256

          1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

          SHA512

          d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fGS78ds.exe

          Filesize

          175KB

          MD5

          a5f5c5d6291c7ae9e1d1b7ed1e551490

          SHA1

          3d06413341893b838549939e15f8f1eec423d71a

          SHA256

          1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

          SHA512

          d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nIK35ya34.exe

          Filesize

          338KB

          MD5

          001a865a5403fa829c8ef3c777b06e79

          SHA1

          ee3a283bb5108e70f0163cef825b9b9c56a620ea

          SHA256

          896b70b6e4bb5fa23fdd19dfd2f8cc50088896f4b2cf15bb5d6abde21030c347

          SHA512

          6c0f95bf77c93a86fd44b47915f098a3b42ebbc4953b2878b9eb4412932726c00829c92f0878bf60628b60553b40bbe8925204302f9b016531fc0701d912842d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nIK35ya34.exe

          Filesize

          338KB

          MD5

          001a865a5403fa829c8ef3c777b06e79

          SHA1

          ee3a283bb5108e70f0163cef825b9b9c56a620ea

          SHA256

          896b70b6e4bb5fa23fdd19dfd2f8cc50088896f4b2cf15bb5d6abde21030c347

          SHA512

          6c0f95bf77c93a86fd44b47915f098a3b42ebbc4953b2878b9eb4412932726c00829c92f0878bf60628b60553b40bbe8925204302f9b016531fc0701d912842d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dfv57HE.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dfv57HE.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eqv42uh.exe

          Filesize

          257KB

          MD5

          7a4d7ae3f43f3eb9053a6696e30966d8

          SHA1

          7faffac12b8f52a6e23aa4c2b684a7b61f1c036f

          SHA256

          a490b798053c489286d6ad768c59d2e86fa200a31c25d4c1983f99b6d1946262

          SHA512

          a1b4e949552916289e5b8fa30deb21c5988292c39bbdbc29147a8bf1e0b9f703b146ad37044fcce309d289c77bff9072eb27850053ba39ff09842d9e7c919201

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eqv42uh.exe

          Filesize

          257KB

          MD5

          7a4d7ae3f43f3eb9053a6696e30966d8

          SHA1

          7faffac12b8f52a6e23aa4c2b684a7b61f1c036f

          SHA256

          a490b798053c489286d6ad768c59d2e86fa200a31c25d4c1983f99b6d1946262

          SHA512

          a1b4e949552916289e5b8fa30deb21c5988292c39bbdbc29147a8bf1e0b9f703b146ad37044fcce309d289c77bff9072eb27850053ba39ff09842d9e7c919201

        • memory/1112-216-0x0000000000AD0000-0x0000000000ADA000-memory.dmp

          Filesize

          40KB

        • memory/2572-142-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-151-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-130-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-131-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-132-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-133-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-134-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-135-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-136-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-137-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-138-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-139-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-140-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-141-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-118-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-143-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-144-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-145-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-146-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-147-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-148-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-149-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-150-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-126-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-119-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-153-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-154-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-155-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-157-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-158-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-156-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-159-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-160-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-161-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-162-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-163-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-120-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-129-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-121-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-122-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-123-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-124-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-152-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-127-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-125-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2572-128-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2776-263-0x0000000000580000-0x000000000062E000-memory.dmp

          Filesize

          696KB

        • memory/2776-289-0x0000000000400000-0x0000000000574000-memory.dmp

          Filesize

          1.5MB

        • memory/2776-287-0x0000000000400000-0x0000000000574000-memory.dmp

          Filesize

          1.5MB

        • memory/2776-286-0x0000000000580000-0x000000000062E000-memory.dmp

          Filesize

          696KB

        • memory/2776-283-0x0000000002650000-0x0000000002668000-memory.dmp

          Filesize

          96KB

        • memory/2776-281-0x0000000004CA0000-0x000000000519E000-memory.dmp

          Filesize

          5.0MB

        • memory/2776-277-0x00000000025C0000-0x00000000025DA000-memory.dmp

          Filesize

          104KB

        • memory/2776-267-0x0000000000400000-0x0000000000574000-memory.dmp

          Filesize

          1.5MB

        • memory/2776-265-0x00000000007B0000-0x00000000007DD000-memory.dmp

          Filesize

          180KB

        • memory/3432-353-0x0000000005C00000-0x0000000006206000-memory.dmp

          Filesize

          6.0MB

        • memory/3432-358-0x0000000005720000-0x000000000575E000-memory.dmp

          Filesize

          248KB

        • memory/3432-381-0x00000000070B0000-0x0000000007100000-memory.dmp

          Filesize

          320KB

        • memory/3432-380-0x0000000007030000-0x00000000070A6000-memory.dmp

          Filesize

          472KB

        • memory/3432-376-0x00000000074E0000-0x0000000007A0C000-memory.dmp

          Filesize

          5.2MB

        • memory/3432-375-0x0000000006DE0000-0x0000000006FA2000-memory.dmp

          Filesize

          1.8MB

        • memory/3432-367-0x0000000006210000-0x0000000006276000-memory.dmp

          Filesize

          408KB

        • memory/3432-364-0x0000000005A40000-0x0000000005AD2000-memory.dmp

          Filesize

          584KB

        • memory/3432-360-0x0000000005870000-0x00000000058BB000-memory.dmp

          Filesize

          300KB

        • memory/3432-356-0x0000000005690000-0x00000000056A2000-memory.dmp

          Filesize

          72KB

        • memory/3432-354-0x0000000005760000-0x000000000586A000-memory.dmp

          Filesize

          1.0MB

        • memory/3432-340-0x0000000000CF0000-0x0000000000D22000-memory.dmp

          Filesize

          200KB

        • memory/5064-184-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-181-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-177-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-176-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-179-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-166-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-170-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-180-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-175-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-178-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-182-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-173-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-183-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-174-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-167-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-171-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-168-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/5064-169-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB