Analysis

  • max time kernel
    145s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 17:48

General

  • Target

    a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe

  • Size

    1.3MB

  • MD5

    58c13aa04075aa6a6f83393d256fb82a

  • SHA1

    af3f7d6f4c41d0c67964c93c922c9ccabdf4eaef

  • SHA256

    a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6

  • SHA512

    a4e17116e4b31514d5dcc2b7ddf24b155d4c4ebcc3b6b1b3b334b6a529017ee3f740f3ee08fcbf1b3ce7fea11c0a06257562797b7703c9df3a85c4e20a7928f6

  • SSDEEP

    24576:syrjby7BLclszJOSJ+Seqczux5rc8mC2VRQfUdsl+Rzx/c+wufNWlHb:b3YBLkQJ+Sery5rc8mCkeU+ozx/3U

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe
    "C:\Users\Admin\AppData\Local\Temp\a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptev0976OM.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptev0976OM.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXr9100du.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXr9100du.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptCg5564KR.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptCg5564KR.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptHe1780Zk.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptHe1780Zk.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1352
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptqA4135MY.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptqA4135MY.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1728
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exe
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5104
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exe
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptev0976OM.exe

    Filesize

    1.2MB

    MD5

    c2aab0d35bce87298e771a6c1f3e34ed

    SHA1

    29025629c20de5f1bf4222a27ecb38967b57ecb5

    SHA256

    6c5f3090f50765acc82a8101044fb6b967de5fed7395fd5e742fb9bad3e31962

    SHA512

    293a024623b8da0fd2b38159eb1e14a7f5a3f3c8ec165f3a0d9ebe95e97989e72d78578495d95c627954c851bceec0f1ef3ab7bb923fd531580862fc40d151a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptev0976OM.exe

    Filesize

    1.2MB

    MD5

    c2aab0d35bce87298e771a6c1f3e34ed

    SHA1

    29025629c20de5f1bf4222a27ecb38967b57ecb5

    SHA256

    6c5f3090f50765acc82a8101044fb6b967de5fed7395fd5e742fb9bad3e31962

    SHA512

    293a024623b8da0fd2b38159eb1e14a7f5a3f3c8ec165f3a0d9ebe95e97989e72d78578495d95c627954c851bceec0f1ef3ab7bb923fd531580862fc40d151a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXr9100du.exe

    Filesize

    1.0MB

    MD5

    472f3f809ba093156ea886d9aceb974c

    SHA1

    c55612c33b5a6ad50e016aed6f5413c2cf22d0cb

    SHA256

    39ef2de9d514cfeb9c1c2bb14be89120a508f2d9ba6c8f9a696fe910f01056d9

    SHA512

    449b68e8b35bf624788093a615b735ba23eb38d743f8ce13f89be449efa09a78d1e5335dfd1406c5d4c0d9f2ade21a846ea20d3277e3aaf2cf7b3ea831e48c1a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXr9100du.exe

    Filesize

    1.0MB

    MD5

    472f3f809ba093156ea886d9aceb974c

    SHA1

    c55612c33b5a6ad50e016aed6f5413c2cf22d0cb

    SHA256

    39ef2de9d514cfeb9c1c2bb14be89120a508f2d9ba6c8f9a696fe910f01056d9

    SHA512

    449b68e8b35bf624788093a615b735ba23eb38d743f8ce13f89be449efa09a78d1e5335dfd1406c5d4c0d9f2ade21a846ea20d3277e3aaf2cf7b3ea831e48c1a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptCg5564KR.exe

    Filesize

    935KB

    MD5

    e2f1fc56553c442d83aea45a525e7602

    SHA1

    fc19654a941e2089798c6136b54959c785e6b2d7

    SHA256

    0a6e59157ccbfd605e90ba6f3022e99a978996c63d95bea4527fa5293a741f93

    SHA512

    8ed47c441cca45bbd3368d5f07e290e557ed648917805b87272ba7f3d3dbdad8177b550d8bfe48eae0f4369a7e2dd13aa2ee295377da695a12e189ea842cf272

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptCg5564KR.exe

    Filesize

    935KB

    MD5

    e2f1fc56553c442d83aea45a525e7602

    SHA1

    fc19654a941e2089798c6136b54959c785e6b2d7

    SHA256

    0a6e59157ccbfd605e90ba6f3022e99a978996c63d95bea4527fa5293a741f93

    SHA512

    8ed47c441cca45bbd3368d5f07e290e557ed648917805b87272ba7f3d3dbdad8177b550d8bfe48eae0f4369a7e2dd13aa2ee295377da695a12e189ea842cf272

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptHe1780Zk.exe

    Filesize

    666KB

    MD5

    b7f90be8dcca58e0bc0e044b0bd61cc2

    SHA1

    28f1134ef5edb16c65a677f2d62e30b7dfa702a3

    SHA256

    fbcf7799c0a733b7242b5cbb3a5ef37ffbf7fea58bd405558727679237071bc0

    SHA512

    fafaee11beddf78acdaaf50f140b8ef93c182e6bfabe89e4189318b7dc352d252990dee6b02caddaea7108a9cca5a8394ef3ec9e6f91e25da7b02c04b4065800

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptHe1780Zk.exe

    Filesize

    666KB

    MD5

    b7f90be8dcca58e0bc0e044b0bd61cc2

    SHA1

    28f1134ef5edb16c65a677f2d62e30b7dfa702a3

    SHA256

    fbcf7799c0a733b7242b5cbb3a5ef37ffbf7fea58bd405558727679237071bc0

    SHA512

    fafaee11beddf78acdaaf50f140b8ef93c182e6bfabe89e4189318b7dc352d252990dee6b02caddaea7108a9cca5a8394ef3ec9e6f91e25da7b02c04b4065800

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptqA4135MY.exe

    Filesize

    391KB

    MD5

    1256d61ebc2cf66acaca8de6bb6a6331

    SHA1

    d325c96471d55b111b5da3f3db61602bd1ef984c

    SHA256

    490b697c9960785af7a80b87f9a6a75ba56a2e6a6d2698498ea3bdd6f9fbeb78

    SHA512

    761d866ae04c7ee2fbb17570f859c6595e7c28a4f8dae729a72d2ae68371e5cf5e1af6545f569c3ae4654941247bccab84f2c877b7a291b04d608483d363e075

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptqA4135MY.exe

    Filesize

    391KB

    MD5

    1256d61ebc2cf66acaca8de6bb6a6331

    SHA1

    d325c96471d55b111b5da3f3db61602bd1ef984c

    SHA256

    490b697c9960785af7a80b87f9a6a75ba56a2e6a6d2698498ea3bdd6f9fbeb78

    SHA512

    761d866ae04c7ee2fbb17570f859c6595e7c28a4f8dae729a72d2ae68371e5cf5e1af6545f569c3ae4654941247bccab84f2c877b7a291b04d608483d363e075

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exe

    Filesize

    11KB

    MD5

    bf41791ec502a80e498da916c9b37da4

    SHA1

    72a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e

    SHA256

    3768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348

    SHA512

    8605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exe

    Filesize

    11KB

    MD5

    bf41791ec502a80e498da916c9b37da4

    SHA1

    72a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e

    SHA256

    3768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348

    SHA512

    8605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCm53OE84.exe

    Filesize

    11KB

    MD5

    bf41791ec502a80e498da916c9b37da4

    SHA1

    72a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e

    SHA256

    3768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348

    SHA512

    8605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exe

    Filesize

    304KB

    MD5

    9c3e7c5879f2758bb2add2fbf488ed16

    SHA1

    c5a2662767f97a4860f33a9fe6cace435a3c1b02

    SHA256

    7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

    SHA512

    0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exe

    Filesize

    304KB

    MD5

    9c3e7c5879f2758bb2add2fbf488ed16

    SHA1

    c5a2662767f97a4860f33a9fe6cace435a3c1b02

    SHA256

    7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

    SHA512

    0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cupg61Qf09.exe

    Filesize

    304KB

    MD5

    9c3e7c5879f2758bb2add2fbf488ed16

    SHA1

    c5a2662767f97a4860f33a9fe6cace435a3c1b02

    SHA256

    7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

    SHA512

    0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

  • memory/3484-211-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-229-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-184-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-183-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-185-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-186-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-187-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-189-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-191-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-193-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-195-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-197-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-199-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-201-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-203-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-205-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-207-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-209-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-181-0x0000000004D70000-0x0000000005314000-memory.dmp

    Filesize

    5.6MB

  • memory/3484-213-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-215-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-217-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-219-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-221-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-223-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-225-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-227-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-182-0x0000000000840000-0x000000000088B000-memory.dmp

    Filesize

    300KB

  • memory/3484-231-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-233-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-235-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-237-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-239-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-241-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-243-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-245-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-247-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-249-0x00000000026E0000-0x000000000271E000-memory.dmp

    Filesize

    248KB

  • memory/3484-1092-0x0000000005320000-0x0000000005938000-memory.dmp

    Filesize

    6.1MB

  • memory/3484-1093-0x0000000004C50000-0x0000000004D5A000-memory.dmp

    Filesize

    1.0MB

  • memory/3484-1094-0x0000000005970000-0x0000000005982000-memory.dmp

    Filesize

    72KB

  • memory/3484-1095-0x0000000005990000-0x00000000059CC000-memory.dmp

    Filesize

    240KB

  • memory/3484-1096-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-1098-0x0000000005C80000-0x0000000005CE6000-memory.dmp

    Filesize

    408KB

  • memory/3484-1100-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-1099-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-1101-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3484-1102-0x0000000006450000-0x00000000064E2000-memory.dmp

    Filesize

    584KB

  • memory/3484-1103-0x0000000006540000-0x00000000065B6000-memory.dmp

    Filesize

    472KB

  • memory/3484-1104-0x00000000065D0000-0x0000000006620000-memory.dmp

    Filesize

    320KB

  • memory/3484-1105-0x0000000006830000-0x00000000069F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3484-1106-0x0000000006A10000-0x0000000006F3C000-memory.dmp

    Filesize

    5.2MB

  • memory/3484-1107-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/5104-175-0x0000000000D70000-0x0000000000D7A000-memory.dmp

    Filesize

    40KB