Analysis

  • max time kernel
    111s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 00:46

General

  • Target

    0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe

  • Size

    536KB

  • MD5

    b7b379de1a821bd3d2de8c581d825db5

  • SHA1

    e0e2c1a862cc2cf806dbfac7163878104f62e7a9

  • SHA256

    0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286

  • SHA512

    d6a44e15f82209bb3c5b1bb16ddd5ba334e081d3eff9dd2a4be0aa5336ddcad4d3492450bf0a786c8b60d72400cf8787214683072512256f0cfb80a3e39c392c

  • SSDEEP

    12288:hMr7y90A/8GJTCsH002Yx/2rpt1YjOpKyo9g8l:ayr7JTvUJYB2rpzYjOpO

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe
    "C:\Users\Admin\AppData\Local\Temp\0b5e1e9260065471d6abea1744c21ef3181944b66d80e0aaafde44cba1414286.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLr4909vh.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLr4909vh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw52HX55cH18.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw52HX55cH18.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJC51jK07.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJC51jK07.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uqG32ZD05.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uqG32ZD05.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uqG32ZD05.exe

    Filesize

    175KB

    MD5

    8a457a266f4cf034d6d29e52d691508b

    SHA1

    733322bad9498307c2fcf9e01849d64af6972e4a

    SHA256

    c667a3851729512e1e518a5c340efb9f01b46f10339c74bfe011371f1bcd9058

    SHA512

    8fd2ddbfcbf7741deed7511c1087d4b4fa6a2c496cd48ccf9108f92f7969fc6a3e052ff13d05f424977c3528b8915631d2e95f4aae9d87bc38f0a3257a5639d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uqG32ZD05.exe

    Filesize

    175KB

    MD5

    8a457a266f4cf034d6d29e52d691508b

    SHA1

    733322bad9498307c2fcf9e01849d64af6972e4a

    SHA256

    c667a3851729512e1e518a5c340efb9f01b46f10339c74bfe011371f1bcd9058

    SHA512

    8fd2ddbfcbf7741deed7511c1087d4b4fa6a2c496cd48ccf9108f92f7969fc6a3e052ff13d05f424977c3528b8915631d2e95f4aae9d87bc38f0a3257a5639d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLr4909vh.exe

    Filesize

    391KB

    MD5

    bf78df0aacc8d696f61e05b28aa29ab2

    SHA1

    30b8ef22403efb7d02ffab965d072f58dfab1fbf

    SHA256

    40700ef85b7d2951edd592dccefdbd292c1ec473e86cf568e2f67ba93b6f83f6

    SHA512

    836bc2351f44654e434ebe31c45b207007764aecebb721e201167eb5218738b0e178f93a6c33230bda9f1420ba38d7edc85c67d80bad35434e339b080432af0a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vLr4909vh.exe

    Filesize

    391KB

    MD5

    bf78df0aacc8d696f61e05b28aa29ab2

    SHA1

    30b8ef22403efb7d02ffab965d072f58dfab1fbf

    SHA256

    40700ef85b7d2951edd592dccefdbd292c1ec473e86cf568e2f67ba93b6f83f6

    SHA512

    836bc2351f44654e434ebe31c45b207007764aecebb721e201167eb5218738b0e178f93a6c33230bda9f1420ba38d7edc85c67d80bad35434e339b080432af0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw52HX55cH18.exe

    Filesize

    11KB

    MD5

    b0290c12d3f462d90c8ac05fd604eb1c

    SHA1

    b2aeb79cd128f638ee00bbf2800ad75a4a6189eb

    SHA256

    55a2aa7c5a65fd1d92867a0c3366e15980856dfbe25d97ce7193949b4cb3296d

    SHA512

    c7123283333b0b57a773c1204a23f3fe0436da1bd22ae44b6fa668a05fea16ed4b42889b230ec51471faad9451b226eaee9891d20addaa62a71c414a3d2eb460

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw52HX55cH18.exe

    Filesize

    11KB

    MD5

    b0290c12d3f462d90c8ac05fd604eb1c

    SHA1

    b2aeb79cd128f638ee00bbf2800ad75a4a6189eb

    SHA256

    55a2aa7c5a65fd1d92867a0c3366e15980856dfbe25d97ce7193949b4cb3296d

    SHA512

    c7123283333b0b57a773c1204a23f3fe0436da1bd22ae44b6fa668a05fea16ed4b42889b230ec51471faad9451b226eaee9891d20addaa62a71c414a3d2eb460

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJC51jK07.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJC51jK07.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • memory/2264-153-0x0000000002200000-0x000000000224B000-memory.dmp

    Filesize

    300KB

  • memory/2264-154-0x0000000004D50000-0x00000000052F4000-memory.dmp

    Filesize

    5.6MB

  • memory/2264-155-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-156-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-160-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-158-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-164-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-162-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-166-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-168-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-171-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2264-173-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-174-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2264-170-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-176-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-178-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-182-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-184-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-180-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-186-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-190-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-188-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-194-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-192-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-198-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-196-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-206-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-210-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-214-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-216-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-212-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-208-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-204-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-202-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-218-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-200-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-220-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/2264-1063-0x0000000005300000-0x0000000005918000-memory.dmp

    Filesize

    6.1MB

  • memory/2264-1064-0x0000000005920000-0x0000000005A2A000-memory.dmp

    Filesize

    1.0MB

  • memory/2264-1065-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2264-1066-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2264-1067-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

    Filesize

    240KB

  • memory/2264-1069-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2264-1070-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2264-1071-0x0000000005C80000-0x0000000005D12000-memory.dmp

    Filesize

    584KB

  • memory/2264-1072-0x0000000005D20000-0x0000000005D86000-memory.dmp

    Filesize

    408KB

  • memory/2264-1073-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2264-1075-0x00000000089C0000-0x0000000008A36000-memory.dmp

    Filesize

    472KB

  • memory/2264-1076-0x0000000008A50000-0x0000000008AA0000-memory.dmp

    Filesize

    320KB

  • memory/2264-1077-0x0000000008BB0000-0x0000000008D72000-memory.dmp

    Filesize

    1.8MB

  • memory/2264-1078-0x0000000008D80000-0x00000000092AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4188-147-0x0000000000BC0000-0x0000000000BCA000-memory.dmp

    Filesize

    40KB

  • memory/4776-1084-0x00000000004A0000-0x00000000004D2000-memory.dmp

    Filesize

    200KB

  • memory/4776-1085-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/4776-1086-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB