Analysis

  • max time kernel
    54s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/03/2023, 07:37

General

  • Target

    74bf4248cf2d017b8e3f866b89dbc8211353c9e3b2aae4343067447375b946a3.exe

  • Size

    666KB

  • MD5

    28ed2ff357205040e4b7fcb1398416cf

  • SHA1

    fe89f8bddde2342e368cffd1b9a965a2202eff0e

  • SHA256

    74bf4248cf2d017b8e3f866b89dbc8211353c9e3b2aae4343067447375b946a3

  • SHA512

    b1e3aef130efc64d237fd6eb43041a159c5c7674af972a81294b3320590f813a6176e8f115a3309173987ce094791407f3486df900f3149e865e14f49a134804

  • SSDEEP

    12288:RMroy908EADgNMSGso4XdGG5k4SoPrmR3X6NzP/B374PISYd1:5yNgXvdGG5ZPK3wbB374q

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74bf4248cf2d017b8e3f866b89dbc8211353c9e3b2aae4343067447375b946a3.exe
    "C:\Users\Admin\AppData\Local\Temp\74bf4248cf2d017b8e3f866b89dbc8211353c9e3b2aae4343067447375b946a3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaJ51TN32.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaJ51TN32.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urnL72VZ44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urnL72VZ44.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrHt18sj86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrHt18sj86.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuPQ23ve95.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuPQ23ve95.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuPQ23ve95.exe

    Filesize

    175KB

    MD5

    00135fecba1a0572a095fcecc3dfd2e3

    SHA1

    60b8b1d91c64b3d86188d1ad7acd21fd02120ae7

    SHA256

    e452a05be145521e06763eed8c1b539cc5b2fbe142cdbc9d9f1e8c60206084a4

    SHA512

    8ec27d1289ceaee4c631cab06ba30b717acd3b12ee2aaf7f0a2760e752668499865d7bf891bf87b37aaa87261aa58edb3e0f9d23f2c47099f2ca23630eb779ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuPQ23ve95.exe

    Filesize

    175KB

    MD5

    00135fecba1a0572a095fcecc3dfd2e3

    SHA1

    60b8b1d91c64b3d86188d1ad7acd21fd02120ae7

    SHA256

    e452a05be145521e06763eed8c1b539cc5b2fbe142cdbc9d9f1e8c60206084a4

    SHA512

    8ec27d1289ceaee4c631cab06ba30b717acd3b12ee2aaf7f0a2760e752668499865d7bf891bf87b37aaa87261aa58edb3e0f9d23f2c47099f2ca23630eb779ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaJ51TN32.exe

    Filesize

    522KB

    MD5

    aa4353bd8466dcf47fb9bc7ac4e03b2f

    SHA1

    902588f4242528fafea22c4b8bb76a4e2e45254f

    SHA256

    69bfc4001329b56ab10634ee694a33878f38cf2ad99df05dd327468c748a3ad7

    SHA512

    6fb4bef46868aa4412641e38f637cad8bad08b3f3411f5987f33d93511383513128f02d02bc0ff0a06535f5e95cc643d926c70e731beb0b8366db42de3f8dfab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaJ51TN32.exe

    Filesize

    522KB

    MD5

    aa4353bd8466dcf47fb9bc7ac4e03b2f

    SHA1

    902588f4242528fafea22c4b8bb76a4e2e45254f

    SHA256

    69bfc4001329b56ab10634ee694a33878f38cf2ad99df05dd327468c748a3ad7

    SHA512

    6fb4bef46868aa4412641e38f637cad8bad08b3f3411f5987f33d93511383513128f02d02bc0ff0a06535f5e95cc643d926c70e731beb0b8366db42de3f8dfab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urnL72VZ44.exe

    Filesize

    250KB

    MD5

    452980bfe4732aaef2162c53c88f7ea4

    SHA1

    31b4e28e7ffdf36023ea859f0c343036dfb0470e

    SHA256

    855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

    SHA512

    7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urnL72VZ44.exe

    Filesize

    250KB

    MD5

    452980bfe4732aaef2162c53c88f7ea4

    SHA1

    31b4e28e7ffdf36023ea859f0c343036dfb0470e

    SHA256

    855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

    SHA512

    7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrHt18sj86.exe

    Filesize

    309KB

    MD5

    284f5cacca006d191a474f8c3eada4c1

    SHA1

    05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

    SHA256

    52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

    SHA512

    26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrHt18sj86.exe

    Filesize

    309KB

    MD5

    284f5cacca006d191a474f8c3eada4c1

    SHA1

    05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

    SHA256

    52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

    SHA512

    26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

  • memory/3616-1089-0x0000000005990000-0x0000000005F96000-memory.dmp

    Filesize

    6.0MB

  • memory/3616-216-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-1105-0x0000000006980000-0x0000000006EAC000-memory.dmp

    Filesize

    5.2MB

  • memory/3616-1104-0x00000000067A0000-0x0000000006962000-memory.dmp

    Filesize

    1.8MB

  • memory/3616-1103-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-1102-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-1099-0x00000000065D0000-0x0000000006620000-memory.dmp

    Filesize

    320KB

  • memory/3616-1101-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-1100-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-1098-0x0000000006540000-0x00000000065B6000-memory.dmp

    Filesize

    472KB

  • memory/3616-1097-0x0000000005760000-0x00000000057C6000-memory.dmp

    Filesize

    408KB

  • memory/3616-1096-0x00000000056C0000-0x0000000005752000-memory.dmp

    Filesize

    584KB

  • memory/3616-1094-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-1093-0x0000000004E00000-0x0000000004E4B000-memory.dmp

    Filesize

    300KB

  • memory/3616-1092-0x0000000004DB0000-0x0000000004DEE000-memory.dmp

    Filesize

    248KB

  • memory/3616-1091-0x0000000004D90000-0x0000000004DA2000-memory.dmp

    Filesize

    72KB

  • memory/3616-195-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-194-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-1090-0x0000000005380000-0x000000000548A000-memory.dmp

    Filesize

    1.0MB

  • memory/3616-206-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-214-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-212-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-177-0x0000000002420000-0x0000000002466000-memory.dmp

    Filesize

    280KB

  • memory/3616-178-0x00000000024A0000-0x00000000024E4000-memory.dmp

    Filesize

    272KB

  • memory/3616-179-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-180-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-184-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-182-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-186-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-188-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-190-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-193-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-210-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-192-0x0000000001F90000-0x0000000001FDB000-memory.dmp

    Filesize

    300KB

  • memory/3616-208-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-198-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3616-197-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-200-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-202-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3616-204-0x00000000024A0000-0x00000000024DE000-memory.dmp

    Filesize

    248KB

  • memory/3920-167-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-169-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-140-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-138-0x0000000004AB0000-0x0000000004AC8000-memory.dmp

    Filesize

    96KB

  • memory/3920-139-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-172-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/3920-137-0x0000000004AE0000-0x0000000004FDE000-memory.dmp

    Filesize

    5.0MB

  • memory/3920-170-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/3920-165-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-163-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-161-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-159-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-157-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-155-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-153-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-151-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3920-149-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3920-150-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-147-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3920-146-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-144-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-142-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/3920-136-0x00000000020D0000-0x00000000020EA000-memory.dmp

    Filesize

    104KB

  • memory/3920-135-0x0000000000660000-0x000000000068D000-memory.dmp

    Filesize

    180KB

  • memory/4536-1111-0x0000000000D70000-0x0000000000DA2000-memory.dmp

    Filesize

    200KB

  • memory/4536-1112-0x0000000005900000-0x0000000005910000-memory.dmp

    Filesize

    64KB

  • memory/4536-1113-0x00000000057B0000-0x00000000057FB000-memory.dmp

    Filesize

    300KB