Analysis

  • max time kernel
    143s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-03-2023 19:09

General

  • Target

    d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe

  • Size

    1.3MB

  • MD5

    430495ef053d688e1dfd58a0c5f8b591

  • SHA1

    af9b9ac615390eb66c9741c2eb5314387deadd87

  • SHA256

    d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04

  • SHA512

    fa5d9c46fab089a344d06382ca96a7603a78f6ba6bfc8c311cedaea3f0a7ae32d14c3e5f5a46b73637cb3b7f9f2cad70d5c4fe7d2b3e5a6ce6beeb9a0c51eca2

  • SSDEEP

    24576:iyrof08WinvAHzxCJej4v1xLA78NmrVSE/vcJrlWv9MLKHoL6X8He:JEf08xvATaej8bcrPirov9ML6gHH

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe
    "C:\Users\Admin\AppData\Local\Temp\d49743de9d24ac1fb13f571caa8d17f62cb9345ec6c7fae31bc5a8a9f1940e04.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptiz9930lX.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptiz9930lX.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptjN7720Ij.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptjN7720Ij.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptdA6660VW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptdA6660VW.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcv2260xY.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcv2260xY.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1192
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptjE1228gb.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptjE1228gb.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:328
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exe
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2544
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exe
                7⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptiz9930lX.exe

    Filesize

    1.2MB

    MD5

    af318ad2b75220b952ba15d8e58b2268

    SHA1

    31debc50a71d1fd6235a4cb8021f65e1af86c382

    SHA256

    b5d901b6a84851aadf85923ecbaec91227ccb81207984338db6dd7a5d79dd3f3

    SHA512

    4a031e541647dc9c9bb6d0bc789a66d3174e8042355604a7cb33b09a2949c445b84b88f5bb9733d3f440eca66cd67abd703c70d2e71945ec4855926453a03c47

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptiz9930lX.exe

    Filesize

    1.2MB

    MD5

    af318ad2b75220b952ba15d8e58b2268

    SHA1

    31debc50a71d1fd6235a4cb8021f65e1af86c382

    SHA256

    b5d901b6a84851aadf85923ecbaec91227ccb81207984338db6dd7a5d79dd3f3

    SHA512

    4a031e541647dc9c9bb6d0bc789a66d3174e8042355604a7cb33b09a2949c445b84b88f5bb9733d3f440eca66cd67abd703c70d2e71945ec4855926453a03c47

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptjN7720Ij.exe

    Filesize

    996KB

    MD5

    e82db278c1ac73899db27a072a14a7a3

    SHA1

    33bfbdcee14ea66451397a7a419c318582b545fb

    SHA256

    ff65cc4e94dc30005c594ecd7ba0adf3aa9c6d16969aac86613d58e9284216ef

    SHA512

    482462741bbd18a80d3b0965d2a84c0e8859b2f5dedf8ea650b2efd4fdf46fb04b92f03321b1dfbb4bbdc09ef8f6e8291e4373524cda2d18e4d7ffa2f8832800

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptjN7720Ij.exe

    Filesize

    996KB

    MD5

    e82db278c1ac73899db27a072a14a7a3

    SHA1

    33bfbdcee14ea66451397a7a419c318582b545fb

    SHA256

    ff65cc4e94dc30005c594ecd7ba0adf3aa9c6d16969aac86613d58e9284216ef

    SHA512

    482462741bbd18a80d3b0965d2a84c0e8859b2f5dedf8ea650b2efd4fdf46fb04b92f03321b1dfbb4bbdc09ef8f6e8291e4373524cda2d18e4d7ffa2f8832800

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptdA6660VW.exe

    Filesize

    893KB

    MD5

    eea83b5ca893b21d31e54c645cf2581c

    SHA1

    326cfa51c970b5bbc18a0efbcfc97d4845733187

    SHA256

    e15e06aa5b051560a56eeed00410db3c4c2261e02b589f276182b3cc3e075113

    SHA512

    239d53c4301d57035b7c206313b4395d323e7a5acc57f33012da26f1f3066a07b271d1cfdc84fe2f48c4899a4ba4934a274a5ec95c5f712191106239f4feefc0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptdA6660VW.exe

    Filesize

    893KB

    MD5

    eea83b5ca893b21d31e54c645cf2581c

    SHA1

    326cfa51c970b5bbc18a0efbcfc97d4845733187

    SHA256

    e15e06aa5b051560a56eeed00410db3c4c2261e02b589f276182b3cc3e075113

    SHA512

    239d53c4301d57035b7c206313b4395d323e7a5acc57f33012da26f1f3066a07b271d1cfdc84fe2f48c4899a4ba4934a274a5ec95c5f712191106239f4feefc0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcv2260xY.exe

    Filesize

    666KB

    MD5

    ed354ecc892c5abc9779e25769fcab34

    SHA1

    4ac898adb6879fb63b0d047ca13cd8c0165b4bba

    SHA256

    3c4cb2c88330c5b3d7a3ca307a151b476adc7d0bd6fc603dc4152271754d8c34

    SHA512

    5204c965e2a4d2907bd9513bee5fde4e354ca407f52f1fef252cac4f8c7d6bff0ede8bca69ccbc628dab7a35ff8fbbdee423a0e7f394d9fa0dd18ce75a8100e6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcv2260xY.exe

    Filesize

    666KB

    MD5

    ed354ecc892c5abc9779e25769fcab34

    SHA1

    4ac898adb6879fb63b0d047ca13cd8c0165b4bba

    SHA256

    3c4cb2c88330c5b3d7a3ca307a151b476adc7d0bd6fc603dc4152271754d8c34

    SHA512

    5204c965e2a4d2907bd9513bee5fde4e354ca407f52f1fef252cac4f8c7d6bff0ede8bca69ccbc628dab7a35ff8fbbdee423a0e7f394d9fa0dd18ce75a8100e6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptjE1228gb.exe

    Filesize

    391KB

    MD5

    d49d8355bdc66f09a4653d3745116161

    SHA1

    2b4c3dbb692cc26b408f9e344322cc0cdfd133bc

    SHA256

    092c4cf4d8e01b2c0f6cad2d1225af0998c17dda2615e66fab667e8dbd59bd6c

    SHA512

    65ee0e07ec556d27d7ac00b05c57fe1e724cf32dc0791b5642936137eee3b413e024f8421cf4b97a90320d412bfba1a85af9e8c05409db9e16651003713536cf

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptjE1228gb.exe

    Filesize

    391KB

    MD5

    d49d8355bdc66f09a4653d3745116161

    SHA1

    2b4c3dbb692cc26b408f9e344322cc0cdfd133bc

    SHA256

    092c4cf4d8e01b2c0f6cad2d1225af0998c17dda2615e66fab667e8dbd59bd6c

    SHA512

    65ee0e07ec556d27d7ac00b05c57fe1e724cf32dc0791b5642936137eee3b413e024f8421cf4b97a90320d412bfba1a85af9e8c05409db9e16651003713536cf

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exe

    Filesize

    11KB

    MD5

    7aec008cd290fd9e521fdf0a19947f8c

    SHA1

    411cf2389fea5702b8840f3ef81476b9768b4c1d

    SHA256

    8f84cc0b07859be47304976a8d33ce84ae72d40528aa937975a880d51c2ae7ae

    SHA512

    f8233df3f2f5b63232ee6e1ab021b68db3c164073a162cc284d9e73c959b53ffc4f848b5565f59b3edd85e9fcc00e17f350b26a1a313549b1514b47b8db82eb9

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exe

    Filesize

    11KB

    MD5

    7aec008cd290fd9e521fdf0a19947f8c

    SHA1

    411cf2389fea5702b8840f3ef81476b9768b4c1d

    SHA256

    8f84cc0b07859be47304976a8d33ce84ae72d40528aa937975a880d51c2ae7ae

    SHA512

    f8233df3f2f5b63232ee6e1ab021b68db3c164073a162cc284d9e73c959b53ffc4f848b5565f59b3edd85e9fcc00e17f350b26a1a313549b1514b47b8db82eb9

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOC19Om41.exe

    Filesize

    11KB

    MD5

    7aec008cd290fd9e521fdf0a19947f8c

    SHA1

    411cf2389fea5702b8840f3ef81476b9768b4c1d

    SHA256

    8f84cc0b07859be47304976a8d33ce84ae72d40528aa937975a880d51c2ae7ae

    SHA512

    f8233df3f2f5b63232ee6e1ab021b68db3c164073a162cc284d9e73c959b53ffc4f848b5565f59b3edd85e9fcc00e17f350b26a1a313549b1514b47b8db82eb9

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exe

    Filesize

    303KB

    MD5

    003ebed48d2fda6c315c683d32b6a6dc

    SHA1

    677088017218065e750a178b68fe2388ac74920a

    SHA256

    0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

    SHA512

    26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exe

    Filesize

    303KB

    MD5

    003ebed48d2fda6c315c683d32b6a6dc

    SHA1

    677088017218065e750a178b68fe2388ac74920a

    SHA256

    0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

    SHA512

    26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTP22re85.exe

    Filesize

    303KB

    MD5

    003ebed48d2fda6c315c683d32b6a6dc

    SHA1

    677088017218065e750a178b68fe2388ac74920a

    SHA256

    0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

    SHA512

    26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

  • memory/2544-175-0x0000000000030000-0x000000000003A000-memory.dmp

    Filesize

    40KB

  • memory/3296-181-0x0000000000930000-0x000000000097B000-memory.dmp

    Filesize

    300KB

  • memory/3296-183-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-182-0x0000000004DA0000-0x0000000005344000-memory.dmp

    Filesize

    5.6MB

  • memory/3296-184-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-185-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-186-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-187-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-189-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-191-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-193-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-195-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-197-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-199-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-201-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-203-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-205-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-207-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-209-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-211-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-213-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-215-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-217-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-219-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-221-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-223-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-225-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-227-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-229-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-231-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-233-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-235-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-237-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-239-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-241-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-243-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-245-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-247-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-249-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3296-1092-0x0000000005350000-0x0000000005968000-memory.dmp

    Filesize

    6.1MB

  • memory/3296-1093-0x0000000005970000-0x0000000005A7A000-memory.dmp

    Filesize

    1.0MB

  • memory/3296-1094-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

    Filesize

    72KB

  • memory/3296-1095-0x0000000005B10000-0x0000000005B4C000-memory.dmp

    Filesize

    240KB

  • memory/3296-1096-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-1098-0x0000000005DC0000-0x0000000005E52000-memory.dmp

    Filesize

    584KB

  • memory/3296-1099-0x0000000005E60000-0x0000000005EC6000-memory.dmp

    Filesize

    408KB

  • memory/3296-1100-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-1101-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-1102-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-1103-0x0000000006560000-0x00000000065D6000-memory.dmp

    Filesize

    472KB

  • memory/3296-1104-0x00000000065F0000-0x0000000006640000-memory.dmp

    Filesize

    320KB

  • memory/3296-1105-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-1106-0x00000000068A0000-0x0000000006A62000-memory.dmp

    Filesize

    1.8MB

  • memory/3296-1107-0x0000000006A80000-0x0000000006FAC000-memory.dmp

    Filesize

    5.2MB