Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/02/2023, 02:34

General

  • Target

    b73cac73e902b365a1e05eef1893b7ada245ac8c770e9a02e1950395539feb92.exe

  • Size

    556KB

  • MD5

    13d5f07517085d9be3b2cad7eda2a465

  • SHA1

    1fca54eba29a1c06ccf0761631c450af0279592b

  • SHA256

    b73cac73e902b365a1e05eef1893b7ada245ac8c770e9a02e1950395539feb92

  • SHA512

    72daaf91318d518047b86310ed67fddc8e762a418b59aecb35119c73128713e4390caa49bb1eb404bc81aad9ab318aa840c502f7cc1d310206424dd0e775e9ee

  • SSDEEP

    12288:zMrhy90GAs7p1SehG8aFs56MsFvnCbKqxFK3+49CPQ3E:uyYsLBHa6I1ZqxJ4WQ3E

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b73cac73e902b365a1e05eef1893b7ada245ac8c770e9a02e1950395539feb92.exe
    "C:\Users\Admin\AppData\Local\Temp\b73cac73e902b365a1e05eef1893b7ada245ac8c770e9a02e1950395539feb92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vjr6468.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vjr6468.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rMq2835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rMq2835.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQd56ef.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQd56ef.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWb45gW.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWb45gW.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3212

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWb45gW.exe

          Filesize

          352KB

          MD5

          f2646606f3fe7c960ce6858c1a55acb1

          SHA1

          79296d0a57bce9a57f28ed8a0e68c99ed89f40b3

          SHA256

          2fda9bc196785ee87ad4139c91d024055eab01e91fb658a57513c6e556eeed31

          SHA512

          728c33bbc0750251fcaae4b1ac1c6b07e30a0f167acae6d6082ca81c6f49b0b14f64ec70c3b9be446621a07f86d65448f0a97eff0dbc968178a73b72454ac3fd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uWb45gW.exe

          Filesize

          352KB

          MD5

          f2646606f3fe7c960ce6858c1a55acb1

          SHA1

          79296d0a57bce9a57f28ed8a0e68c99ed89f40b3

          SHA256

          2fda9bc196785ee87ad4139c91d024055eab01e91fb658a57513c6e556eeed31

          SHA512

          728c33bbc0750251fcaae4b1ac1c6b07e30a0f167acae6d6082ca81c6f49b0b14f64ec70c3b9be446621a07f86d65448f0a97eff0dbc968178a73b72454ac3fd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vjr6468.exe

          Filesize

          202KB

          MD5

          48c3f9ab5cabc9288e7070d6dd0011d7

          SHA1

          dbed0d85138c41a93ab9ac1d11f9665fabed8a07

          SHA256

          c6e26be21c176ced5a891e0feed16f1c995dbb18f1844907ac3c805207476fcd

          SHA512

          1175cf5d7e260c2c8a5c518eec9fb6c0bb94bc996a02b10d2571297833283be5b5a8107a20e1fbe01d6b5e24bd5719f0ec6a99569883a0d7522360a00e591dcd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vjr6468.exe

          Filesize

          202KB

          MD5

          48c3f9ab5cabc9288e7070d6dd0011d7

          SHA1

          dbed0d85138c41a93ab9ac1d11f9665fabed8a07

          SHA256

          c6e26be21c176ced5a891e0feed16f1c995dbb18f1844907ac3c805207476fcd

          SHA512

          1175cf5d7e260c2c8a5c518eec9fb6c0bb94bc996a02b10d2571297833283be5b5a8107a20e1fbe01d6b5e24bd5719f0ec6a99569883a0d7522360a00e591dcd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rMq2835.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rMq2835.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQd56ef.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQd56ef.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • memory/1736-167-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-176-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-168-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-169-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-170-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-171-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-175-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-172-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-177-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-178-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-174-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-179-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-185-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-184-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-183-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-182-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-181-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/1736-180-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3212-372-0x00000000024C0000-0x0000000002506000-memory.dmp

          Filesize

          280KB

        • memory/3212-374-0x0000000000842000-0x0000000000871000-memory.dmp

          Filesize

          188KB

        • memory/3212-376-0x0000000002280000-0x00000000022CB000-memory.dmp

          Filesize

          300KB

        • memory/3212-377-0x0000000000400000-0x00000000005F2000-memory.dmp

          Filesize

          1.9MB

        • memory/3212-380-0x0000000004B60000-0x0000000004BA4000-memory.dmp

          Filesize

          272KB

        • memory/3212-394-0x0000000005A50000-0x0000000005A9B000-memory.dmp

          Filesize

          300KB

        • memory/3212-413-0x0000000000400000-0x00000000005F2000-memory.dmp

          Filesize

          1.9MB

        • memory/3212-412-0x0000000000842000-0x0000000000871000-memory.dmp

          Filesize

          188KB

        • memory/3212-414-0x0000000000842000-0x0000000000871000-memory.dmp

          Filesize

          188KB

        • memory/3476-157-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-124-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-158-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-159-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-160-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-161-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-162-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-163-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-164-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-147-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-127-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-119-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-150-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-152-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-155-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-128-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-156-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-138-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-154-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-153-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-151-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-149-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-148-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-146-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-145-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-143-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-142-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-126-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-141-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-140-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-129-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-125-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-144-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-130-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-131-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-123-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-122-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-132-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-133-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-134-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-135-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-136-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-137-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-120-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-121-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3476-139-0x0000000077740000-0x00000000778CE000-memory.dmp

          Filesize

          1.6MB

        • memory/3628-217-0x0000000000E30000-0x0000000000E3A000-memory.dmp

          Filesize

          40KB

        • memory/4188-286-0x0000000004E40000-0x0000000004E7E000-memory.dmp

          Filesize

          248KB

        • memory/4188-284-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

          Filesize

          72KB

        • memory/4188-302-0x00000000062E0000-0x00000000067DE000-memory.dmp

          Filesize

          5.0MB

        • memory/4188-301-0x0000000005D40000-0x0000000005DD2000-memory.dmp

          Filesize

          584KB

        • memory/4188-293-0x0000000005160000-0x00000000051C6000-memory.dmp

          Filesize

          408KB

        • memory/4188-288-0x0000000004FC0000-0x000000000500B000-memory.dmp

          Filesize

          300KB

        • memory/4188-304-0x0000000005E60000-0x0000000005ED6000-memory.dmp

          Filesize

          472KB

        • memory/4188-307-0x0000000006EE0000-0x000000000740C000-memory.dmp

          Filesize

          5.2MB

        • memory/4188-282-0x0000000004EB0000-0x0000000004FBA000-memory.dmp

          Filesize

          1.0MB

        • memory/4188-281-0x0000000005390000-0x0000000005996000-memory.dmp

          Filesize

          6.0MB

        • memory/4188-268-0x0000000000440000-0x0000000000472000-memory.dmp

          Filesize

          200KB

        • memory/4188-306-0x00000000067E0000-0x00000000069A2000-memory.dmp

          Filesize

          1.8MB

        • memory/4188-305-0x0000000005DE0000-0x0000000005E30000-memory.dmp

          Filesize

          320KB