Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-03-2023 11:53

General

  • Target

    78307c971ea622222f7f8cdba360c0c912b804acdb9fc28930a74f2225916274.exe

  • Size

    673KB

  • MD5

    5caea57f970a2f9392fc480cd56e6598

  • SHA1

    97c4a12b8fac3c38650841109b9a714207cafd75

  • SHA256

    78307c971ea622222f7f8cdba360c0c912b804acdb9fc28930a74f2225916274

  • SHA512

    ea1e7f10287fb1353b260145de9957936fa5d432a8a24b5cf5d39b92379c208a637c69a02534ab9bd6bb2d74d889911b7fb9e0d5a427f36a18da0a65af9e8391

  • SSDEEP

    12288:PMrmy90Lty8OFzXZ65keVi8/jflodWU0tGS4wpp5pePGjZivM2bFFe2B:5yoty9F8eeVi3L0gSTYPGNi0Kr

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

flurs

C2

hueref.eu:4162

Attributes
  • auth_value

    967190a484bd63836957d2fa7d601592

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78307c971ea622222f7f8cdba360c0c912b804acdb9fc28930a74f2225916274.exe
    "C:\Users\Admin\AppData\Local\Temp\78307c971ea622222f7f8cdba360c0c912b804acdb9fc28930a74f2225916274.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTG31OC20.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTG31OC20.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcK51Xc45.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcK51Xc45.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrfY64hc65.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrfY64hc65.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuQB30Na25.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuQB30Na25.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuQB30Na25.exe

    Filesize

    175KB

    MD5

    0dc3450163abd7a73dee76462760fabd

    SHA1

    eb48cc0853484871e093be7be7944aede932c842

    SHA256

    51baa36a92c69bf90240ff1cd09f03802805423add326d5ef8b776a11b570e71

    SHA512

    7613118eab9a9b3259fefcba3419dd24dcf4ef41be661bbc83b4d0ff7788ce18383cdea53d3e63df9db5f3681ab714711812c43a0d0cd137ee308cb86d27e5d2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuQB30Na25.exe

    Filesize

    175KB

    MD5

    0dc3450163abd7a73dee76462760fabd

    SHA1

    eb48cc0853484871e093be7be7944aede932c842

    SHA256

    51baa36a92c69bf90240ff1cd09f03802805423add326d5ef8b776a11b570e71

    SHA512

    7613118eab9a9b3259fefcba3419dd24dcf4ef41be661bbc83b4d0ff7788ce18383cdea53d3e63df9db5f3681ab714711812c43a0d0cd137ee308cb86d27e5d2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTG31OC20.exe

    Filesize

    528KB

    MD5

    fd4a39808c5c92c5112d107dd8cfda27

    SHA1

    835f9a0c24219d4492e719be72f643cf81172a60

    SHA256

    ed378e2e8443db54fe250568c3737d87db718326cf13670c0460f8cab3daf85e

    SHA512

    5aeb577ac9394c0c3e129abaa894ec93f85b59130ff876fa2e54859c06067feb4dd4bc2884b2b3a2a0bb86f3237569563ff60fbc3e49f059df125269e6990152

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTG31OC20.exe

    Filesize

    528KB

    MD5

    fd4a39808c5c92c5112d107dd8cfda27

    SHA1

    835f9a0c24219d4492e719be72f643cf81172a60

    SHA256

    ed378e2e8443db54fe250568c3737d87db718326cf13670c0460f8cab3daf85e

    SHA512

    5aeb577ac9394c0c3e129abaa894ec93f85b59130ff876fa2e54859c06067feb4dd4bc2884b2b3a2a0bb86f3237569563ff60fbc3e49f059df125269e6990152

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcK51Xc45.exe

    Filesize

    258KB

    MD5

    3fa3b033c4f009e10bc1fc1937d1648f

    SHA1

    5312efd06ad98019cd9b47e29508eda8e0a75a22

    SHA256

    802445df965f6ab11774fe9b2df81259fde366c7d31e201920c01c52e4470265

    SHA512

    15b09a70edfa6e9db5ec26ed4f905e8ab9879274e3bbc3bc7b88e331ef557ad64fa060f1c35013055070fec16ad703e31c3e0ab01b86ac0a846709e7600ff3d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcK51Xc45.exe

    Filesize

    258KB

    MD5

    3fa3b033c4f009e10bc1fc1937d1648f

    SHA1

    5312efd06ad98019cd9b47e29508eda8e0a75a22

    SHA256

    802445df965f6ab11774fe9b2df81259fde366c7d31e201920c01c52e4470265

    SHA512

    15b09a70edfa6e9db5ec26ed4f905e8ab9879274e3bbc3bc7b88e331ef557ad64fa060f1c35013055070fec16ad703e31c3e0ab01b86ac0a846709e7600ff3d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrfY64hc65.exe

    Filesize

    308KB

    MD5

    c08ea92c1d03fb367226765e9271415b

    SHA1

    a7446c05eb491cbaeb1d528f96b4d6ba70017c2a

    SHA256

    5687174289cc28ecf2025e0aec313a18151361200f818a8e6d83123e4ad40388

    SHA512

    a975c487c656bd35704a3a2da42c2cae28aa72c234295ffc4d4c87f2aa4f05889bc5bed1d6e41c4b5c7390808cc0fae7241577cbf538694eb0167de089400a1d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrfY64hc65.exe

    Filesize

    308KB

    MD5

    c08ea92c1d03fb367226765e9271415b

    SHA1

    a7446c05eb491cbaeb1d528f96b4d6ba70017c2a

    SHA256

    5687174289cc28ecf2025e0aec313a18151361200f818a8e6d83123e4ad40388

    SHA512

    a975c487c656bd35704a3a2da42c2cae28aa72c234295ffc4d4c87f2aa4f05889bc5bed1d6e41c4b5c7390808cc0fae7241577cbf538694eb0167de089400a1d

  • memory/1448-1093-0x0000000005130000-0x0000000005736000-memory.dmp

    Filesize

    6.0MB

  • memory/1448-220-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-1109-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-1108-0x0000000006F70000-0x0000000006FC0000-memory.dmp

    Filesize

    320KB

  • memory/1448-1107-0x0000000006EF0000-0x0000000006F66000-memory.dmp

    Filesize

    472KB

  • memory/1448-194-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-1106-0x0000000006750000-0x0000000006C7C000-memory.dmp

    Filesize

    5.2MB

  • memory/1448-1105-0x0000000006560000-0x0000000006722000-memory.dmp

    Filesize

    1.8MB

  • memory/1448-1104-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-1103-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-196-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-1102-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-1101-0x0000000006260000-0x00000000062F2000-memory.dmp

    Filesize

    584KB

  • memory/1448-1100-0x0000000005B90000-0x0000000005BF6000-memory.dmp

    Filesize

    408KB

  • memory/1448-1098-0x00000000059F0000-0x0000000005A3B000-memory.dmp

    Filesize

    300KB

  • memory/1448-1097-0x00000000058B0000-0x00000000058EE000-memory.dmp

    Filesize

    248KB

  • memory/1448-1096-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-1095-0x0000000005890000-0x00000000058A2000-memory.dmp

    Filesize

    72KB

  • memory/1448-1094-0x0000000005780000-0x000000000588A000-memory.dmp

    Filesize

    1.0MB

  • memory/1448-204-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-218-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-216-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-214-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-212-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-210-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-181-0x0000000004B70000-0x0000000004BB6000-memory.dmp

    Filesize

    280KB

  • memory/1448-182-0x00000000050F0000-0x0000000005134000-memory.dmp

    Filesize

    272KB

  • memory/1448-183-0x0000000000670000-0x00000000006BB000-memory.dmp

    Filesize

    300KB

  • memory/1448-185-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-192-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-184-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-187-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-188-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-190-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-186-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/1448-208-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-206-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-198-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-200-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/1448-202-0x00000000050F0000-0x000000000512E000-memory.dmp

    Filesize

    248KB

  • memory/2572-171-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2572-165-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/2572-152-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-139-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-140-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-176-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/2572-174-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/2572-175-0x0000000000400000-0x0000000000583000-memory.dmp

    Filesize

    1.5MB

  • memory/2572-173-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/2572-138-0x0000000004AB0000-0x0000000004AC8000-memory.dmp

    Filesize

    96KB

  • memory/2572-142-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-146-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-154-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-158-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-170-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-164-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-168-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-167-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/2572-163-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/2572-162-0x0000000000660000-0x000000000068D000-memory.dmp

    Filesize

    180KB

  • memory/2572-160-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-156-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-150-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-148-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-144-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/2572-137-0x0000000004B90000-0x000000000508E000-memory.dmp

    Filesize

    5.0MB

  • memory/2572-136-0x0000000002390000-0x00000000023AA000-memory.dmp

    Filesize

    104KB

  • memory/2900-1115-0x0000000000E50000-0x0000000000E82000-memory.dmp

    Filesize

    200KB

  • memory/2900-1116-0x0000000005890000-0x00000000058DB000-memory.dmp

    Filesize

    300KB

  • memory/2900-1117-0x00000000059A0000-0x00000000059B0000-memory.dmp

    Filesize

    64KB