Analysis

  • max time kernel
    55s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/03/2023, 04:22

General

  • Target

    e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe

  • Size

    536KB

  • MD5

    29cdd4e791dd11e53190eb7f9dd70806

  • SHA1

    f0fc909f2388f9e6e75903544afde0af0d786929

  • SHA256

    e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63

  • SHA512

    9011d7ceefbde7c7ef9aed72c7d565577615082badce4faa460841d67b6da992f027753500765c85d31ef504210747704f0d88f81a487b20fd3a1db6c330c378

  • SSDEEP

    12288:SMrGy90fL2hmMYqBcL/Nl7xiOKU7yFH08H/o/cn5j4N:gyWzMYacL1H4U+0atn5MN

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe
    "C:\Users\Admin\AppData\Local\Temp\e49cb01228035638b3dd27f0a6983d9eb5913c2c6e7898ef561d92206e281a63.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtI8429Ow.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtI8429Ow.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw44OS01Et48.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw44OS01Et48.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUe38tq50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUe38tq50.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHc03sz82.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHc03sz82.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2200

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHc03sz82.exe

          Filesize

          175KB

          MD5

          72a8e04545cf9c5371848dc03b4db79c

          SHA1

          cf0078dfdc140aa1ac0936a485018a915cf7152f

          SHA256

          e94fbb2351219d2c14fc2d61a81786793036d21b993386ba095cf3f5914909f2

          SHA512

          bab6ec840b7913e462abd7a452f388c959f828acc2cade582e91056f89b44186c94ebcddc91a280a94cc235affa7fba6f6f36663be57e98f5f6533886c8635d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHc03sz82.exe

          Filesize

          175KB

          MD5

          72a8e04545cf9c5371848dc03b4db79c

          SHA1

          cf0078dfdc140aa1ac0936a485018a915cf7152f

          SHA256

          e94fbb2351219d2c14fc2d61a81786793036d21b993386ba095cf3f5914909f2

          SHA512

          bab6ec840b7913e462abd7a452f388c959f828acc2cade582e91056f89b44186c94ebcddc91a280a94cc235affa7fba6f6f36663be57e98f5f6533886c8635d8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtI8429Ow.exe

          Filesize

          392KB

          MD5

          275273fc1e5d5a3cac7fe4ae85764ca8

          SHA1

          d047cf72e096c194a8f45dd45796ad2fb479d370

          SHA256

          0aa5f47b75393857f60f1ef6326aa9d2a246cf857724f1889970df7b39bb20f6

          SHA512

          1c03a64e30cb8e0cbca9912ecd5ec980e71fe987c5b1eb8fd22fea4c2802b225b9bc3fbf9bbae6a4d74bf03b4922c1fa838122c42c808bd9ff91599e61de81ca

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vtI8429Ow.exe

          Filesize

          392KB

          MD5

          275273fc1e5d5a3cac7fe4ae85764ca8

          SHA1

          d047cf72e096c194a8f45dd45796ad2fb479d370

          SHA256

          0aa5f47b75393857f60f1ef6326aa9d2a246cf857724f1889970df7b39bb20f6

          SHA512

          1c03a64e30cb8e0cbca9912ecd5ec980e71fe987c5b1eb8fd22fea4c2802b225b9bc3fbf9bbae6a4d74bf03b4922c1fa838122c42c808bd9ff91599e61de81ca

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw44OS01Et48.exe

          Filesize

          12KB

          MD5

          d53189fe5a9f5a18daec60aae9e1425e

          SHA1

          d1eb1ca0498bca6266bc59a807b36383c32258e3

          SHA256

          9d4976da7f505b246980b0108aba89902f0b35097ae18d20612f2a0801136833

          SHA512

          1db176014db9b3fcf3ddb7a47a4153de7e018b369cb4e77fcfd528ec3e8aa5a783b27de8672785a15e7d6eb8d83c0e59720a0e63ab271a73d3bcbd8aeaba1c50

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw44OS01Et48.exe

          Filesize

          12KB

          MD5

          d53189fe5a9f5a18daec60aae9e1425e

          SHA1

          d1eb1ca0498bca6266bc59a807b36383c32258e3

          SHA256

          9d4976da7f505b246980b0108aba89902f0b35097ae18d20612f2a0801136833

          SHA512

          1db176014db9b3fcf3ddb7a47a4153de7e018b369cb4e77fcfd528ec3e8aa5a783b27de8672785a15e7d6eb8d83c0e59720a0e63ab271a73d3bcbd8aeaba1c50

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUe38tq50.exe

          Filesize

          304KB

          MD5

          6940451e769c094029427d1531775121

          SHA1

          03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

          SHA256

          ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

          SHA512

          53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUe38tq50.exe

          Filesize

          304KB

          MD5

          6940451e769c094029427d1531775121

          SHA1

          03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

          SHA256

          ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

          SHA512

          53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

        • memory/1004-137-0x0000000002650000-0x0000000002696000-memory.dmp

          Filesize

          280KB

        • memory/1004-138-0x0000000000590000-0x00000000005DB000-memory.dmp

          Filesize

          300KB

        • memory/1004-139-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/1004-140-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/1004-141-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/1004-142-0x0000000004CF0000-0x00000000051EE000-memory.dmp

          Filesize

          5.0MB

        • memory/1004-143-0x0000000004B50000-0x0000000004B94000-memory.dmp

          Filesize

          272KB

        • memory/1004-144-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-145-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-147-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-149-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-151-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-153-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-155-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-157-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-159-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-161-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-163-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-165-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-167-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-169-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-171-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-173-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-175-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-177-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-179-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-181-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-183-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-185-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-187-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-189-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-191-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-193-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-195-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-197-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-199-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-201-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-203-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-205-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-207-0x0000000004B50000-0x0000000004B8E000-memory.dmp

          Filesize

          248KB

        • memory/1004-1050-0x00000000051F0000-0x00000000057F6000-memory.dmp

          Filesize

          6.0MB

        • memory/1004-1051-0x0000000005800000-0x000000000590A000-memory.dmp

          Filesize

          1.0MB

        • memory/1004-1052-0x0000000004C40000-0x0000000004C52000-memory.dmp

          Filesize

          72KB

        • memory/1004-1053-0x0000000004C60000-0x0000000004C9E000-memory.dmp

          Filesize

          248KB

        • memory/1004-1054-0x0000000005A10000-0x0000000005A5B000-memory.dmp

          Filesize

          300KB

        • memory/1004-1055-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/1004-1057-0x0000000005B70000-0x0000000005C02000-memory.dmp

          Filesize

          584KB

        • memory/1004-1058-0x0000000005C10000-0x0000000005C76000-memory.dmp

          Filesize

          408KB

        • memory/1004-1059-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/1004-1060-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/1004-1061-0x0000000006300000-0x0000000006376000-memory.dmp

          Filesize

          472KB

        • memory/1004-1062-0x0000000006380000-0x00000000063D0000-memory.dmp

          Filesize

          320KB

        • memory/1004-1063-0x0000000006500000-0x00000000066C2000-memory.dmp

          Filesize

          1.8MB

        • memory/1004-1064-0x00000000066E0000-0x0000000006C0C000-memory.dmp

          Filesize

          5.2MB

        • memory/2200-1070-0x0000000000420000-0x0000000000452000-memory.dmp

          Filesize

          200KB

        • memory/2200-1071-0x0000000004E60000-0x0000000004EAB000-memory.dmp

          Filesize

          300KB

        • memory/2200-1072-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/3508-131-0x00000000001A0000-0x00000000001AA000-memory.dmp

          Filesize

          40KB