Analysis

  • max time kernel
    55s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/03/2023, 05:45

General

  • Target

    e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669.exe

  • Size

    666KB

  • MD5

    711606d4a9d81857c2e615c46601133b

  • SHA1

    c9a43563db935b7e164268dae14d0cba11964562

  • SHA256

    e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669

  • SHA512

    a3941d5e5655adcdfdcb7763e9d5b60b20f27e65c65c8bd43bb22edd2b0a827e38c7a574407b84f2ca145c68e9fe321abc852d6f43c71ca3fc1d12a6cb3049c4

  • SSDEEP

    12288:aMriy90GjSpas3RTp8lfLXdGr5k47w6CmR3X6NNP1B3qZPISYdG+q93:Qy5jSpas3yf7dGr5k6Z3wXB3qZJZ93

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669.exe
    "C:\Users\Admin\AppData\Local\Temp\e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe

          Filesize

          175KB

          MD5

          0bccc38c4f456a28b85da467cfb94596

          SHA1

          6f23e6436ad79141e63f3210ace789db2b02b480

          SHA256

          8d407e70fae68a01883703bdf21d5c2da4d921febef736da1de9aef8b2850302

          SHA512

          479d891eb6034d4a2d14ec64c15b6f4f53177eeb17f87ef544dade2717bed35a529f2420f1365b8d4e578eafd784e7a99f3407defbc70ad0b6a2e20e400eaf88

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe

          Filesize

          175KB

          MD5

          0bccc38c4f456a28b85da467cfb94596

          SHA1

          6f23e6436ad79141e63f3210ace789db2b02b480

          SHA256

          8d407e70fae68a01883703bdf21d5c2da4d921febef736da1de9aef8b2850302

          SHA512

          479d891eb6034d4a2d14ec64c15b6f4f53177eeb17f87ef544dade2717bed35a529f2420f1365b8d4e578eafd784e7a99f3407defbc70ad0b6a2e20e400eaf88

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe

          Filesize

          522KB

          MD5

          ad56f847e579377ea24daa27e14a7b62

          SHA1

          23e25897d66c65ca0e99dffa40605d8b961c13fe

          SHA256

          b28cb22fbd605a3241cfe04b3d8a87bb551421909a7bbfc1fa2905720726d817

          SHA512

          e3bdfb5b0ec98513f38931128c8571a9a0af43e49f9193ee253eb5a9a3e81ca3cc20d0c3a9e490b4c1e5b2a953486c0e0a040d09d6408aec0d9162244d4478f4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe

          Filesize

          522KB

          MD5

          ad56f847e579377ea24daa27e14a7b62

          SHA1

          23e25897d66c65ca0e99dffa40605d8b961c13fe

          SHA256

          b28cb22fbd605a3241cfe04b3d8a87bb551421909a7bbfc1fa2905720726d817

          SHA512

          e3bdfb5b0ec98513f38931128c8571a9a0af43e49f9193ee253eb5a9a3e81ca3cc20d0c3a9e490b4c1e5b2a953486c0e0a040d09d6408aec0d9162244d4478f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe

          Filesize

          250KB

          MD5

          452980bfe4732aaef2162c53c88f7ea4

          SHA1

          31b4e28e7ffdf36023ea859f0c343036dfb0470e

          SHA256

          855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

          SHA512

          7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe

          Filesize

          250KB

          MD5

          452980bfe4732aaef2162c53c88f7ea4

          SHA1

          31b4e28e7ffdf36023ea859f0c343036dfb0470e

          SHA256

          855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

          SHA512

          7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe

          Filesize

          309KB

          MD5

          284f5cacca006d191a474f8c3eada4c1

          SHA1

          05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

          SHA256

          52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

          SHA512

          26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe

          Filesize

          309KB

          MD5

          284f5cacca006d191a474f8c3eada4c1

          SHA1

          05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

          SHA256

          52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

          SHA512

          26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

        • memory/1784-1110-0x0000000000950000-0x0000000000982000-memory.dmp

          Filesize

          200KB

        • memory/1784-1111-0x0000000005390000-0x00000000053DB000-memory.dmp

          Filesize

          300KB

        • memory/1784-1112-0x0000000005190000-0x00000000051A0000-memory.dmp

          Filesize

          64KB

        • memory/1784-1113-0x0000000005190000-0x00000000051A0000-memory.dmp

          Filesize

          64KB

        • memory/4072-146-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/4072-156-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-136-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-140-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-142-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-143-0x0000000000660000-0x000000000068D000-memory.dmp

          Filesize

          180KB

        • memory/4072-135-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-148-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/4072-147-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-144-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/4072-150-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-152-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-154-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-138-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-158-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-160-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-162-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-164-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-166-0x0000000002660000-0x0000000002672000-memory.dmp

          Filesize

          72KB

        • memory/4072-167-0x0000000000400000-0x0000000000582000-memory.dmp

          Filesize

          1.5MB

        • memory/4072-168-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/4072-169-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

          Filesize

          64KB

        • memory/4072-171-0x0000000000400000-0x0000000000582000-memory.dmp

          Filesize

          1.5MB

        • memory/4072-134-0x0000000002660000-0x0000000002678000-memory.dmp

          Filesize

          96KB

        • memory/4072-133-0x0000000004CF0000-0x00000000051EE000-memory.dmp

          Filesize

          5.0MB

        • memory/4072-132-0x0000000000900000-0x000000000091A000-memory.dmp

          Filesize

          104KB

        • memory/4384-179-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-215-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-183-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-185-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-187-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-189-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-191-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-193-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-195-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-198-0x00000000007A0000-0x00000000007EB000-memory.dmp

          Filesize

          300KB

        • memory/4384-197-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-200-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-202-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-201-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-207-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-205-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-204-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-209-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-211-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-181-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-213-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-1088-0x0000000005830000-0x0000000005E36000-memory.dmp

          Filesize

          6.0MB

        • memory/4384-1089-0x0000000005220000-0x000000000532A000-memory.dmp

          Filesize

          1.0MB

        • memory/4384-1090-0x0000000004C50000-0x0000000004C62000-memory.dmp

          Filesize

          72KB

        • memory/4384-1091-0x0000000004C70000-0x0000000004CAE000-memory.dmp

          Filesize

          248KB

        • memory/4384-1092-0x0000000004CC0000-0x0000000004D0B000-memory.dmp

          Filesize

          300KB

        • memory/4384-1093-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-1094-0x0000000005580000-0x00000000055E6000-memory.dmp

          Filesize

          408KB

        • memory/4384-1096-0x0000000006260000-0x00000000062F2000-memory.dmp

          Filesize

          584KB

        • memory/4384-1097-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-1098-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-1099-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-1100-0x0000000006580000-0x0000000006742000-memory.dmp

          Filesize

          1.8MB

        • memory/4384-1101-0x0000000006750000-0x0000000006C7C000-memory.dmp

          Filesize

          5.2MB

        • memory/4384-178-0x00000000025C0000-0x00000000025FE000-memory.dmp

          Filesize

          248KB

        • memory/4384-177-0x00000000025C0000-0x0000000002604000-memory.dmp

          Filesize

          272KB

        • memory/4384-176-0x0000000002540000-0x0000000002586000-memory.dmp

          Filesize

          280KB

        • memory/4384-1102-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4384-1103-0x0000000006DB0000-0x0000000006E26000-memory.dmp

          Filesize

          472KB

        • memory/4384-1104-0x0000000006E30000-0x0000000006E80000-memory.dmp

          Filesize

          320KB