Analysis

  • max time kernel
    54s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/03/2023, 23:46

General

  • Target

    91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe

  • Size

    693KB

  • MD5

    5a33e377371553472537ecde4eefc08b

  • SHA1

    3565fb5cc86902b30168f11ff85ca0c87cf99e10

  • SHA256

    91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006

  • SHA512

    5b16dc6d95a648d711f48e2a36a624f9fbe32ade4f74bfec2e0a89e801daac0fcde861d711c9501e612e0a4e697dc7b4d32af4b980bbc54079a03f553f5aa97d

  • SSDEEP

    12288:nMrpy90yDgVcEQXlyGzqYumJzDB8PTv5HE9amOAe+x8W7KlOJZ:yy9kVcb1yG+xmJzSPTv5HUuUreQZ

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe
    "C:\Users\Admin\AppData\Local\Temp\91517b6d27a8fb3866677aec0331d57e50e6fc87b6c07e0c5bc708cf5012a006.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycYB40jN62.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycYB40jN62.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urff66Dr08.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urff66Dr08.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriS63lt78.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriS63lt78.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuJk17NU23.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuJk17NU23.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4216

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuJk17NU23.exe

          Filesize

          175KB

          MD5

          270dc504167cc3926ad19560d0e900e4

          SHA1

          5119fccc03f0148ac4fed011d9eca4d94dad77ad

          SHA256

          4b5d1a2bb26b7c65c01bcd4eb2a837a8427395a50092b1fba2f1ea2bf58bb4ff

          SHA512

          fdc7a25055bdb1fc0f7214febf2fca454bf3ac18eba7af4da604298cbb7dab0a0f5664b636b51b61153bc67e5e785c7b739632acf0e989193587b200e05dace8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuJk17NU23.exe

          Filesize

          175KB

          MD5

          270dc504167cc3926ad19560d0e900e4

          SHA1

          5119fccc03f0148ac4fed011d9eca4d94dad77ad

          SHA256

          4b5d1a2bb26b7c65c01bcd4eb2a837a8427395a50092b1fba2f1ea2bf58bb4ff

          SHA512

          fdc7a25055bdb1fc0f7214febf2fca454bf3ac18eba7af4da604298cbb7dab0a0f5664b636b51b61153bc67e5e785c7b739632acf0e989193587b200e05dace8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycYB40jN62.exe

          Filesize

          548KB

          MD5

          ac99c5589eac2b141252a6363aedac96

          SHA1

          48dd56bbb715189d7d9f444918b468ef8bd5e0cf

          SHA256

          22c98b744c0176d3e112da915e6c614027051af63233f5ec938e0135b1c58083

          SHA512

          621241ce5422820a659655f1a3253a2cc154bb3b473023cc90302fc7df04cbefee8d1050153a147fd5530601becab7c095336f56fef0daba071d9a417fc68230

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycYB40jN62.exe

          Filesize

          548KB

          MD5

          ac99c5589eac2b141252a6363aedac96

          SHA1

          48dd56bbb715189d7d9f444918b468ef8bd5e0cf

          SHA256

          22c98b744c0176d3e112da915e6c614027051af63233f5ec938e0135b1c58083

          SHA512

          621241ce5422820a659655f1a3253a2cc154bb3b473023cc90302fc7df04cbefee8d1050153a147fd5530601becab7c095336f56fef0daba071d9a417fc68230

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urff66Dr08.exe

          Filesize

          352KB

          MD5

          6345b3da7da3d9a3012ba87a252a29f6

          SHA1

          a36f23e5d0802652705df132bce0a8589ff5e7bf

          SHA256

          caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df

          SHA512

          3d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urff66Dr08.exe

          Filesize

          352KB

          MD5

          6345b3da7da3d9a3012ba87a252a29f6

          SHA1

          a36f23e5d0802652705df132bce0a8589ff5e7bf

          SHA256

          caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df

          SHA512

          3d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriS63lt78.exe

          Filesize

          410KB

          MD5

          cc1e39c942634bbd04ef3eb880af3cb4

          SHA1

          390ee64e70074c204d8c7fc736e69b91940375bc

          SHA256

          98f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec

          SHA512

          f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriS63lt78.exe

          Filesize

          410KB

          MD5

          cc1e39c942634bbd04ef3eb880af3cb4

          SHA1

          390ee64e70074c204d8c7fc736e69b91940375bc

          SHA256

          98f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec

          SHA512

          f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2

        • memory/4056-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4056-133-0x0000000004710000-0x000000000472A000-memory.dmp

          Filesize

          104KB

        • memory/4056-134-0x0000000007150000-0x000000000764E000-memory.dmp

          Filesize

          5.0MB

        • memory/4056-135-0x00000000070F0000-0x0000000007108000-memory.dmp

          Filesize

          96KB

        • memory/4056-136-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-137-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-139-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-141-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-143-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-145-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-147-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-149-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-151-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-153-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-155-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-157-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-159-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-161-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-163-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/4056-164-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4056-165-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4056-166-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4056-167-0x0000000000400000-0x0000000002BC5000-memory.dmp

          Filesize

          39.8MB

        • memory/4056-171-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4056-170-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4056-172-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4056-169-0x0000000000400000-0x0000000002BC5000-memory.dmp

          Filesize

          39.8MB

        • memory/4216-1111-0x00000000009A0000-0x00000000009D2000-memory.dmp

          Filesize

          200KB

        • memory/4216-1113-0x0000000005210000-0x0000000005220000-memory.dmp

          Filesize

          64KB

        • memory/4216-1112-0x0000000005280000-0x00000000052CB000-memory.dmp

          Filesize

          300KB

        • memory/4384-180-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-295-0x0000000004590000-0x00000000045DB000-memory.dmp

          Filesize

          300KB

        • memory/4384-179-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-184-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-186-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-188-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-190-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-192-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-194-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-198-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-200-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-196-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-202-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-204-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-206-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-208-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-210-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-212-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-297-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-182-0x0000000007140000-0x000000000717E000-memory.dmp

          Filesize

          248KB

        • memory/4384-301-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-299-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-1089-0x0000000007EE0000-0x00000000084E6000-memory.dmp

          Filesize

          6.0MB

        • memory/4384-1090-0x00000000078D0000-0x00000000079DA000-memory.dmp

          Filesize

          1.0MB

        • memory/4384-1091-0x00000000079F0000-0x0000000007A02000-memory.dmp

          Filesize

          72KB

        • memory/4384-1092-0x0000000007A10000-0x0000000007A4E000-memory.dmp

          Filesize

          248KB

        • memory/4384-1093-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-1094-0x0000000007B60000-0x0000000007BAB000-memory.dmp

          Filesize

          300KB

        • memory/4384-1096-0x0000000007D00000-0x0000000007D66000-memory.dmp

          Filesize

          408KB

        • memory/4384-1097-0x00000000089E0000-0x0000000008A72000-memory.dmp

          Filesize

          584KB

        • memory/4384-1098-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-1099-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-1100-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-1101-0x0000000008BC0000-0x0000000008D82000-memory.dmp

          Filesize

          1.8MB

        • memory/4384-1102-0x0000000008D90000-0x00000000092BC000-memory.dmp

          Filesize

          5.2MB

        • memory/4384-178-0x0000000007140000-0x0000000007184000-memory.dmp

          Filesize

          272KB

        • memory/4384-177-0x0000000004880000-0x00000000048C6000-memory.dmp

          Filesize

          280KB

        • memory/4384-1103-0x00000000072C0000-0x00000000072D0000-memory.dmp

          Filesize

          64KB

        • memory/4384-1104-0x00000000093F0000-0x0000000009466000-memory.dmp

          Filesize

          472KB

        • memory/4384-1105-0x0000000009480000-0x00000000094D0000-memory.dmp

          Filesize

          320KB