Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/02/2023, 23:27

General

  • Target

    51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe

  • Size

    546KB

  • MD5

    9713bf5b143c141ad320c618cd2c293c

  • SHA1

    32e41b844fe32c1931405b52e782871d3949db03

  • SHA256

    51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101

  • SHA512

    fc1a3ec84ef0aee8e54ff9688c61b9b08901b463e0e4888bf411677c20ca2a71d557fba5502758c55683d264901dad48d64c30b896874dc61eb3336603b2662d

  • SSDEEP

    12288:0Mr5y90seTRx7KBExfcgj7CGMPMREwQ1cQ4f7eNz0gvOtp:dy4KBExfcgHJREwdQy7eNYSq

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe
    "C:\Users\Admin\AppData\Local\Temp\51fa75840fa613015c3570317994937a5af8ce2dbe1603edef69628bf322a101.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPZ8617LB.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPZ8617LB.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw57uN73WA66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw57uN73WA66.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsK00jC71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsK00jC71.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uYo25QJ19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uYo25QJ19.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3920

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uYo25QJ19.exe

          Filesize

          176KB

          MD5

          39e9897c15a6c76f5ffd7b68d05f0df1

          SHA1

          dd2c6fd8c3f2279efb73f98e2a8a0ac63716854b

          SHA256

          aeb89d4534e6e0876aaf3026addb9a1ed26a699491adbadeab4dd647fa340197

          SHA512

          68f62dd505e2105f594e8dfea35fbd06e04cd3058c465c01f3adfc87f1d4d2f20635956c8d67ed57e8586132db22b0c1bc4b98e1f62f6a0c222dd1cb1a713923

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uYo25QJ19.exe

          Filesize

          176KB

          MD5

          39e9897c15a6c76f5ffd7b68d05f0df1

          SHA1

          dd2c6fd8c3f2279efb73f98e2a8a0ac63716854b

          SHA256

          aeb89d4534e6e0876aaf3026addb9a1ed26a699491adbadeab4dd647fa340197

          SHA512

          68f62dd505e2105f594e8dfea35fbd06e04cd3058c465c01f3adfc87f1d4d2f20635956c8d67ed57e8586132db22b0c1bc4b98e1f62f6a0c222dd1cb1a713923

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPZ8617LB.exe

          Filesize

          402KB

          MD5

          6fff3cf4393ad642b1a59e04884cf30c

          SHA1

          0dfd9438dbe6770335c0104a7ef2ed2b5d05bece

          SHA256

          a6d0160cc4b9b9dd8ac179044627a0bf44124230660777c93f0c9c6c51a7eba3

          SHA512

          d92a16cfef944473859d92200a060f1633207449edda6483905ce5c9b6201246c8f4ad6db9581be09898024fb8c94a7e81b879fd0d612fe6ccca123f5e3a3db3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vPZ8617LB.exe

          Filesize

          402KB

          MD5

          6fff3cf4393ad642b1a59e04884cf30c

          SHA1

          0dfd9438dbe6770335c0104a7ef2ed2b5d05bece

          SHA256

          a6d0160cc4b9b9dd8ac179044627a0bf44124230660777c93f0c9c6c51a7eba3

          SHA512

          d92a16cfef944473859d92200a060f1633207449edda6483905ce5c9b6201246c8f4ad6db9581be09898024fb8c94a7e81b879fd0d612fe6ccca123f5e3a3db3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw57uN73WA66.exe

          Filesize

          15KB

          MD5

          9f281fb6157e2a7179fdda95b4e1da43

          SHA1

          fb6d48199ce8140a823ccfc413327066d4c3d894

          SHA256

          b57732dc568efdd7e6b9435066500d6de5d2219264a20ffe779211091633b88c

          SHA512

          7e4e9562cb209b608cfd605cdc134d2394cb263b98643500be93a2744f00bcea55988c86141dbd05e1aab07def0f6b20250266221f783a435053fdf179d63d70

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw57uN73WA66.exe

          Filesize

          15KB

          MD5

          9f281fb6157e2a7179fdda95b4e1da43

          SHA1

          fb6d48199ce8140a823ccfc413327066d4c3d894

          SHA256

          b57732dc568efdd7e6b9435066500d6de5d2219264a20ffe779211091633b88c

          SHA512

          7e4e9562cb209b608cfd605cdc134d2394cb263b98643500be93a2744f00bcea55988c86141dbd05e1aab07def0f6b20250266221f783a435053fdf179d63d70

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsK00jC71.exe

          Filesize

          376KB

          MD5

          51d83e219f7908c47e000ced515c41c5

          SHA1

          49860bcc7802e33498d0010de530f67573577ce1

          SHA256

          556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d

          SHA512

          a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsK00jC71.exe

          Filesize

          376KB

          MD5

          51d83e219f7908c47e000ced515c41c5

          SHA1

          49860bcc7802e33498d0010de530f67573577ce1

          SHA256

          556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d

          SHA512

          a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4

        • memory/3920-1076-0x00000000008B0000-0x00000000008E2000-memory.dmp

          Filesize

          200KB

        • memory/3920-1077-0x00000000051D0000-0x00000000051E0000-memory.dmp

          Filesize

          64KB

        • memory/3920-1078-0x00000000051E0000-0x000000000522B000-memory.dmp

          Filesize

          300KB

        • memory/4160-185-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-179-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-144-0x0000000004D00000-0x0000000004D44000-memory.dmp

          Filesize

          272KB

        • memory/4160-145-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-147-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-146-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-148-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-149-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-153-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-151-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-155-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-157-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-159-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-161-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-163-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-165-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-167-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-171-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-169-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-175-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-173-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-142-0x0000000004C80000-0x0000000004CC6000-memory.dmp

          Filesize

          280KB

        • memory/4160-183-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-181-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-189-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-187-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-143-0x00000000071A0000-0x000000000769E000-memory.dmp

          Filesize

          5.0MB

        • memory/4160-177-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-193-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-201-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-199-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-203-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-205-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-197-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-195-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-207-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-211-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-209-0x0000000004D00000-0x0000000004D3E000-memory.dmp

          Filesize

          248KB

        • memory/4160-1054-0x00000000076E0000-0x0000000007CE6000-memory.dmp

          Filesize

          6.0MB

        • memory/4160-1055-0x0000000007D70000-0x0000000007E7A000-memory.dmp

          Filesize

          1.0MB

        • memory/4160-1056-0x0000000007EB0000-0x0000000007EC2000-memory.dmp

          Filesize

          72KB

        • memory/4160-1057-0x0000000007ED0000-0x0000000007F0E000-memory.dmp

          Filesize

          248KB

        • memory/4160-1058-0x0000000008020000-0x000000000806B000-memory.dmp

          Filesize

          300KB

        • memory/4160-1059-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-1061-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-1062-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-1063-0x00000000081B0000-0x0000000008242000-memory.dmp

          Filesize

          584KB

        • memory/4160-1064-0x0000000008250000-0x00000000082B6000-memory.dmp

          Filesize

          408KB

        • memory/4160-1065-0x00000000046B0000-0x00000000046C0000-memory.dmp

          Filesize

          64KB

        • memory/4160-141-0x0000000002BD0000-0x0000000002C1B000-memory.dmp

          Filesize

          300KB

        • memory/4160-1066-0x0000000009D00000-0x0000000009EC2000-memory.dmp

          Filesize

          1.8MB

        • memory/4160-1067-0x0000000009ED0000-0x000000000A3FC000-memory.dmp

          Filesize

          5.2MB

        • memory/4160-1068-0x000000000A4A0000-0x000000000A516000-memory.dmp

          Filesize

          472KB

        • memory/4160-1069-0x000000000A520000-0x000000000A570000-memory.dmp

          Filesize

          320KB

        • memory/4168-135-0x0000000000D90000-0x0000000000D9A000-memory.dmp

          Filesize

          40KB