Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2023, 10:56

General

  • Target

    5c90302cbb280e3a62dfb885f06c0a73.exe

  • Size

    536KB

  • MD5

    5c90302cbb280e3a62dfb885f06c0a73

  • SHA1

    91933b9371b72831311061c52e6eb2e51fd298f1

  • SHA256

    38335d1c12c313646a3aa279c3448ff517acda6b20e472e90c544553a5d633be

  • SHA512

    c17147bd1cf9b9450884dd11ca4034f5d49eaa22cda62810d07d03f9d7555f124925d56d17b998768193b4ce190b7f4acd3d965badcb51daa307736a469dfda0

  • SSDEEP

    12288:bMr4y90L0JNVZhbI57fC/or22ZweiyiA0gQjR+QtaKooi:fyRTVzQ7RrLZweiyiAZ4R7oN

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 39 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c90302cbb280e3a62dfb885f06c0a73.exe
    "C:\Users\Admin\AppData\Local\Temp\5c90302cbb280e3a62dfb885f06c0a73.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2020

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe

          Filesize

          175KB

          MD5

          88ed71c9ea2cfc40f286ee45f5dd9706

          SHA1

          571018c26155d7a137f9d137fb12acf44f73b475

          SHA256

          ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525

          SHA512

          ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe

          Filesize

          175KB

          MD5

          88ed71c9ea2cfc40f286ee45f5dd9706

          SHA1

          571018c26155d7a137f9d137fb12acf44f73b475

          SHA256

          ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525

          SHA512

          ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe

          Filesize

          391KB

          MD5

          dee73a1b5fe1e66da448bb57d16d3a36

          SHA1

          c1acd6846483c9f26345b02e185c0e0c22a39783

          SHA256

          3cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26

          SHA512

          75853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe

          Filesize

          391KB

          MD5

          dee73a1b5fe1e66da448bb57d16d3a36

          SHA1

          c1acd6846483c9f26345b02e185c0e0c22a39783

          SHA256

          3cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26

          SHA512

          75853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exe

          Filesize

          11KB

          MD5

          d4fb3164fc1b8498a1adae8241163056

          SHA1

          a62dffcd8e476fcb39c02f2bad59cc269e1ecf78

          SHA256

          51634dc26530b823523bdc2ef9f3d95feceb82be3b6c80d73847cc04ab5c6a50

          SHA512

          fef8e462b216c2b5a36241713e2fee7bae8e14bee5f8bdd70d2011c926b3d964b59c9e6d0fd0b1578bd63fc4e5ce164d79a1190812a609c6a2cdc6d64295d3b6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exe

          Filesize

          11KB

          MD5

          d4fb3164fc1b8498a1adae8241163056

          SHA1

          a62dffcd8e476fcb39c02f2bad59cc269e1ecf78

          SHA256

          51634dc26530b823523bdc2ef9f3d95feceb82be3b6c80d73847cc04ab5c6a50

          SHA512

          fef8e462b216c2b5a36241713e2fee7bae8e14bee5f8bdd70d2011c926b3d964b59c9e6d0fd0b1578bd63fc4e5ce164d79a1190812a609c6a2cdc6d64295d3b6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe

          Filesize

          304KB

          MD5

          425a4e66387f5515e08c6258b5dc0c4d

          SHA1

          e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

          SHA256

          f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

          SHA512

          c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe

          Filesize

          304KB

          MD5

          425a4e66387f5515e08c6258b5dc0c4d

          SHA1

          e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

          SHA256

          f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

          SHA512

          c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe

          Filesize

          304KB

          MD5

          425a4e66387f5515e08c6258b5dc0c4d

          SHA1

          e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

          SHA256

          f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

          SHA512

          c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe

          Filesize

          175KB

          MD5

          88ed71c9ea2cfc40f286ee45f5dd9706

          SHA1

          571018c26155d7a137f9d137fb12acf44f73b475

          SHA256

          ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525

          SHA512

          ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\uJu83EH35.exe

          Filesize

          175KB

          MD5

          88ed71c9ea2cfc40f286ee45f5dd9706

          SHA1

          571018c26155d7a137f9d137fb12acf44f73b475

          SHA256

          ecc58fc52688fdce67912314dcbbeda4a140feff200961fa18883d8d8051e525

          SHA512

          ba00b587ee493cdc760f13681f1541ba3a646ebee25af7814b0cfbb0f69dafa504edda353cb3fb0957c7b10394f195c1c0df5489a8f023871a5aa5c59e6136c0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe

          Filesize

          391KB

          MD5

          dee73a1b5fe1e66da448bb57d16d3a36

          SHA1

          c1acd6846483c9f26345b02e185c0e0c22a39783

          SHA256

          3cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26

          SHA512

          75853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vwj2367oD.exe

          Filesize

          391KB

          MD5

          dee73a1b5fe1e66da448bb57d16d3a36

          SHA1

          c1acd6846483c9f26345b02e185c0e0c22a39783

          SHA256

          3cab77cf12116c6be3c679b87d9fde07a37ac5245b18bb79740e3b33fbe2ea26

          SHA512

          75853379e5bf5d9e804feeaa8d36cf12cd084307aad33f02d485da7556d9f9f8469a240005a07a7ecfcfe8c7756925d7a877ef0e27305d9acaa8a34a8fff9ff4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95jZ88lZ09.exe

          Filesize

          11KB

          MD5

          d4fb3164fc1b8498a1adae8241163056

          SHA1

          a62dffcd8e476fcb39c02f2bad59cc269e1ecf78

          SHA256

          51634dc26530b823523bdc2ef9f3d95feceb82be3b6c80d73847cc04ab5c6a50

          SHA512

          fef8e462b216c2b5a36241713e2fee7bae8e14bee5f8bdd70d2011c926b3d964b59c9e6d0fd0b1578bd63fc4e5ce164d79a1190812a609c6a2cdc6d64295d3b6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe

          Filesize

          304KB

          MD5

          425a4e66387f5515e08c6258b5dc0c4d

          SHA1

          e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

          SHA256

          f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

          SHA512

          c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe

          Filesize

          304KB

          MD5

          425a4e66387f5515e08c6258b5dc0c4d

          SHA1

          e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

          SHA256

          f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

          SHA512

          c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tJp42xx42.exe

          Filesize

          304KB

          MD5

          425a4e66387f5515e08c6258b5dc0c4d

          SHA1

          e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

          SHA256

          f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

          SHA512

          c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

        • memory/1632-112-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-128-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-90-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-92-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-94-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-96-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-98-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-100-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-102-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-104-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-106-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-108-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-110-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-87-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-114-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-116-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-118-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-122-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-120-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-124-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-126-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-88-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-130-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-134-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-132-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-136-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-138-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-140-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-142-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-144-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-146-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-148-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-150-0x00000000022E0000-0x000000000231E000-memory.dmp

          Filesize

          248KB

        • memory/1632-190-0x0000000004C10000-0x0000000004C50000-memory.dmp

          Filesize

          256KB

        • memory/1632-192-0x0000000004C10000-0x0000000004C50000-memory.dmp

          Filesize

          256KB

        • memory/1632-995-0x0000000004C10000-0x0000000004C50000-memory.dmp

          Filesize

          256KB

        • memory/1632-997-0x0000000004C10000-0x0000000004C50000-memory.dmp

          Filesize

          256KB

        • memory/1632-86-0x00000000022E0000-0x0000000002324000-memory.dmp

          Filesize

          272KB

        • memory/1632-85-0x0000000004C10000-0x0000000004C50000-memory.dmp

          Filesize

          256KB

        • memory/1632-83-0x0000000000CD0000-0x0000000000D16000-memory.dmp

          Filesize

          280KB

        • memory/1632-84-0x0000000000320000-0x000000000036B000-memory.dmp

          Filesize

          300KB

        • memory/1692-72-0x00000000001C0000-0x00000000001CA000-memory.dmp

          Filesize

          40KB

        • memory/2020-1005-0x0000000000BE0000-0x0000000000C12000-memory.dmp

          Filesize

          200KB

        • memory/2020-1006-0x0000000000D30000-0x0000000000D70000-memory.dmp

          Filesize

          256KB