Analysis

  • max time kernel
    54s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-03-2023 17:34

General

  • Target

    c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe

  • Size

    536KB

  • MD5

    808a0a83a20c2ffb73fbb2d8b5652ec5

  • SHA1

    c1de14be89bc830e3a612c956c49c7b511182c71

  • SHA256

    c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a

  • SHA512

    e0c27a8cf4edfe23dbe9d81f699b853592de1282e11a432303c12b3ed977252ee3563f2b2cd652c0201928b279bd02233ed756a959c2f3437406478c287cff54

  • SSDEEP

    12288:GMr4y90xGZARwVQVX8hWbp6UcF0HWm9V9CswqxrE:6ya+AeVQtmWF6F02osswqO

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe
    "C:\Users\Admin\AppData\Local\Temp\c5c1f389ba6b1acbb80517b9e0efb886ed791f4a88f1ddb3401c3dd153e9638a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJ3219hf.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJ3219hf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw66oz76sj55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw66oz76sj55.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOU90Bf19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOU90Bf19.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRv31Mm24.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRv31Mm24.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRv31Mm24.exe

    Filesize

    175KB

    MD5

    b6bf608523f7bd15f08bac156d0456fe

    SHA1

    3ffc96931e5fab6c30f1f7329450168dbf479212

    SHA256

    e822431833cc3516b5a489c0efbcdcbc49088c2024cea1a99c5f507fd5626365

    SHA512

    ee8e0d135f19458e8232434603a9a25517ce74172390d34c42a2ea2dc0b4ecf9a0c0384a09ef84a21758e4e1fe37bf60b10ec42bbe743900a37da76c90431fdf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uRv31Mm24.exe

    Filesize

    175KB

    MD5

    b6bf608523f7bd15f08bac156d0456fe

    SHA1

    3ffc96931e5fab6c30f1f7329450168dbf479212

    SHA256

    e822431833cc3516b5a489c0efbcdcbc49088c2024cea1a99c5f507fd5626365

    SHA512

    ee8e0d135f19458e8232434603a9a25517ce74172390d34c42a2ea2dc0b4ecf9a0c0384a09ef84a21758e4e1fe37bf60b10ec42bbe743900a37da76c90431fdf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJ3219hf.exe

    Filesize

    391KB

    MD5

    b6f50acc016464ec7e0f8f93398a6572

    SHA1

    af78253284f5680ce28e54a6b4a03e90c9185e4a

    SHA256

    2adf19cafc73e5798a47ea062ce97fffa3be3dd0048441eaca9c76da5f6b551f

    SHA512

    bba3c6afc46698bc2ffc29eb3fcc63dddf16a25f11936517d2e6ba11dc852747075b72d747d51e7e3c7881ad598f3a18da6ab1d436977e4c66f346a7d2ea94a3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJ3219hf.exe

    Filesize

    391KB

    MD5

    b6f50acc016464ec7e0f8f93398a6572

    SHA1

    af78253284f5680ce28e54a6b4a03e90c9185e4a

    SHA256

    2adf19cafc73e5798a47ea062ce97fffa3be3dd0048441eaca9c76da5f6b551f

    SHA512

    bba3c6afc46698bc2ffc29eb3fcc63dddf16a25f11936517d2e6ba11dc852747075b72d747d51e7e3c7881ad598f3a18da6ab1d436977e4c66f346a7d2ea94a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw66oz76sj55.exe

    Filesize

    11KB

    MD5

    f2ebf762262c6349dabbb635967a9f59

    SHA1

    8a389b38d9d3120e1d5121eee37c31a12dc51a78

    SHA256

    660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45

    SHA512

    fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw66oz76sj55.exe

    Filesize

    11KB

    MD5

    f2ebf762262c6349dabbb635967a9f59

    SHA1

    8a389b38d9d3120e1d5121eee37c31a12dc51a78

    SHA256

    660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45

    SHA512

    fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOU90Bf19.exe

    Filesize

    304KB

    MD5

    9c3e7c5879f2758bb2add2fbf488ed16

    SHA1

    c5a2662767f97a4860f33a9fe6cace435a3c1b02

    SHA256

    7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

    SHA512

    0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tOU90Bf19.exe

    Filesize

    304KB

    MD5

    9c3e7c5879f2758bb2add2fbf488ed16

    SHA1

    c5a2662767f97a4860f33a9fe6cace435a3c1b02

    SHA256

    7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

    SHA512

    0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

  • memory/2340-1073-0x0000000000DE0000-0x0000000000E12000-memory.dmp

    Filesize

    200KB

  • memory/2340-1074-0x0000000005990000-0x00000000059A0000-memory.dmp

    Filesize

    64KB

  • memory/2340-1076-0x0000000005990000-0x00000000059A0000-memory.dmp

    Filesize

    64KB

  • memory/2340-1075-0x0000000005820000-0x000000000586B000-memory.dmp

    Filesize

    300KB

  • memory/3504-133-0x00000000000E0000-0x00000000000EA000-memory.dmp

    Filesize

    40KB

  • memory/4036-177-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-189-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-143-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-144-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-146-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-147-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4036-149-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4036-150-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-153-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-151-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4036-155-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-157-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-159-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-161-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-163-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-165-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-169-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-167-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-171-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-173-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-175-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-141-0x0000000004BF0000-0x00000000050EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4036-179-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-181-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-183-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-185-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-187-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-142-0x0000000004B00000-0x0000000004B44000-memory.dmp

    Filesize

    272KB

  • memory/4036-191-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-193-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-195-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-197-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-199-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-201-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-203-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-205-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-207-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-209-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/4036-1052-0x00000000050F0000-0x00000000056F6000-memory.dmp

    Filesize

    6.0MB

  • memory/4036-1053-0x0000000005730000-0x000000000583A000-memory.dmp

    Filesize

    1.0MB

  • memory/4036-1054-0x0000000005870000-0x0000000005882000-memory.dmp

    Filesize

    72KB

  • memory/4036-1055-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4036-1056-0x0000000005890000-0x00000000058CE000-memory.dmp

    Filesize

    248KB

  • memory/4036-1057-0x00000000059E0000-0x0000000005A2B000-memory.dmp

    Filesize

    300KB

  • memory/4036-1059-0x0000000005B70000-0x0000000005BD6000-memory.dmp

    Filesize

    408KB

  • memory/4036-1060-0x0000000006260000-0x00000000062F2000-memory.dmp

    Filesize

    584KB

  • memory/4036-1061-0x0000000006330000-0x00000000064F2000-memory.dmp

    Filesize

    1.8MB

  • memory/4036-1062-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4036-1063-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/4036-140-0x0000000002480000-0x00000000024C6000-memory.dmp

    Filesize

    280KB

  • memory/4036-139-0x0000000000590000-0x00000000005DB000-memory.dmp

    Filesize

    300KB

  • memory/4036-1064-0x0000000006500000-0x0000000006A2C000-memory.dmp

    Filesize

    5.2MB

  • memory/4036-1065-0x0000000006D90000-0x0000000006E06000-memory.dmp

    Filesize

    472KB

  • memory/4036-1066-0x0000000006E10000-0x0000000006E60000-memory.dmp

    Filesize

    320KB

  • memory/4036-1067-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB