Analysis

  • max time kernel
    51s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-03-2023 17:02

General

  • Target

    0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe

  • Size

    677KB

  • MD5

    db18f21c2028c6c111d84212ee59d017

  • SHA1

    882657c79da453e6360e423254c6e85ad64d2d82

  • SHA256

    0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d

  • SHA512

    ace3785c8d147d1853342dcd4db87e457077caecbc134185e312dea4239f740cc611790854514576c95a571556321ea5f4ee6107fd07c2432d664695516055ed

  • SSDEEP

    12288:PMr0y90FcRHydJAn50bt11Lkmw/XdALRBJrLgjRuOSH7fP2Asd2rJ:PyuYSKQrtw6dTHYuDHbTsYrJ

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe
    "C:\Users\Admin\AppData\Local\Temp\0e2b70509cc4294b5fe8c60258465c13a64b3de2bc75de32e84000b055198c6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycxA90dK52.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycxA90dK52.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urOy29TU33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urOy29TU33.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGB10kl77.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGB10kl77.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuKi16rf85.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuKi16rf85.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuKi16rf85.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuKi16rf85.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycxA90dK52.exe

    Filesize

    533KB

    MD5

    0700f702e4518d2558c7a81c3a8bf847

    SHA1

    d386f2be847763b5fd221a6d7905187a5ba69b40

    SHA256

    9c3e5f33caabb43ba820c7caccb59d5a94fef434ad8759a7958ed50cf960e823

    SHA512

    8dd3dec6c167dd6b020a75045155f8515444786a286edf0f607dc887e8ea45a3ffd732012221d30d41105496b3a6d1b97470cf4f4fbef243d40971195ffb259e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycxA90dK52.exe

    Filesize

    533KB

    MD5

    0700f702e4518d2558c7a81c3a8bf847

    SHA1

    d386f2be847763b5fd221a6d7905187a5ba69b40

    SHA256

    9c3e5f33caabb43ba820c7caccb59d5a94fef434ad8759a7958ed50cf960e823

    SHA512

    8dd3dec6c167dd6b020a75045155f8515444786a286edf0f607dc887e8ea45a3ffd732012221d30d41105496b3a6d1b97470cf4f4fbef243d40971195ffb259e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urOy29TU33.exe

    Filesize

    259KB

    MD5

    6bc8513cf7109e5ac11a3ce08bd4aa75

    SHA1

    c3ac687b5f1622ede490ea7503900c5fa192fd25

    SHA256

    5c740441af175fbb77d481aebd50b3598b387dabaf576e5607c0e5866f62c729

    SHA512

    b6e62cdbb3bb1dfd09ddab7f2befdd8225c61e143adcd20a9f23e38992057e3cc89e08370a36f5f1a2c9162f3498d7d6dfe025e1c783efb75380760ecfa6ae0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urOy29TU33.exe

    Filesize

    259KB

    MD5

    6bc8513cf7109e5ac11a3ce08bd4aa75

    SHA1

    c3ac687b5f1622ede490ea7503900c5fa192fd25

    SHA256

    5c740441af175fbb77d481aebd50b3598b387dabaf576e5607c0e5866f62c729

    SHA512

    b6e62cdbb3bb1dfd09ddab7f2befdd8225c61e143adcd20a9f23e38992057e3cc89e08370a36f5f1a2c9162f3498d7d6dfe025e1c783efb75380760ecfa6ae0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGB10kl77.exe

    Filesize

    317KB

    MD5

    951fa5356ac288731a279778680760cb

    SHA1

    ec2e18c615f5818742d946582d64e32bb88dbfbb

    SHA256

    f5f7055115e81907accaf5c574e871f2c009da8163df4d5930af1563f4f5b175

    SHA512

    b8385866f94ab644ad455571866080250acb23cb1d19208ec58cf316524e0b6c419620622c0fe0591b1ff0e3ee5a8e50a39ed0bc4a792ba4b9b903b0ed83d1c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGB10kl77.exe

    Filesize

    317KB

    MD5

    951fa5356ac288731a279778680760cb

    SHA1

    ec2e18c615f5818742d946582d64e32bb88dbfbb

    SHA256

    f5f7055115e81907accaf5c574e871f2c009da8163df4d5930af1563f4f5b175

    SHA512

    b8385866f94ab644ad455571866080250acb23cb1d19208ec58cf316524e0b6c419620622c0fe0591b1ff0e3ee5a8e50a39ed0bc4a792ba4b9b903b0ed83d1c4

  • memory/2772-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2772-137-0x00000000020E0000-0x00000000020FA000-memory.dmp

    Filesize

    104KB

  • memory/2772-138-0x0000000004C80000-0x000000000517E000-memory.dmp

    Filesize

    5.0MB

  • memory/2772-139-0x00000000025E0000-0x00000000025F8000-memory.dmp

    Filesize

    96KB

  • memory/2772-140-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2772-141-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2772-142-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2772-143-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-144-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-146-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-148-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-152-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-154-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-158-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-156-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-160-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-162-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-170-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-168-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-166-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-164-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-150-0x00000000025E0000-0x00000000025F2000-memory.dmp

    Filesize

    72KB

  • memory/2772-171-0x0000000000400000-0x0000000000584000-memory.dmp

    Filesize

    1.5MB

  • memory/2772-172-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2772-173-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2772-174-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/2772-176-0x0000000000400000-0x0000000000584000-memory.dmp

    Filesize

    1.5MB

  • memory/4212-181-0x0000000004960000-0x00000000049A6000-memory.dmp

    Filesize

    280KB

  • memory/4212-182-0x0000000005040000-0x0000000005084000-memory.dmp

    Filesize

    272KB

  • memory/4212-183-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-184-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-186-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-188-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-190-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-192-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-194-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-196-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-198-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-200-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-202-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-204-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-206-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-208-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-210-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-212-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-214-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-217-0x0000000005040000-0x000000000507E000-memory.dmp

    Filesize

    248KB

  • memory/4212-218-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-216-0x00000000007C0000-0x000000000080B000-memory.dmp

    Filesize

    300KB

  • memory/4212-221-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-224-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-1093-0x00000000056C0000-0x0000000005CC6000-memory.dmp

    Filesize

    6.0MB

  • memory/4212-1094-0x0000000005130000-0x000000000523A000-memory.dmp

    Filesize

    1.0MB

  • memory/4212-1095-0x0000000005270000-0x0000000005282000-memory.dmp

    Filesize

    72KB

  • memory/4212-1096-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-1097-0x0000000005290000-0x00000000052CE000-memory.dmp

    Filesize

    248KB

  • memory/4212-1098-0x00000000053E0000-0x000000000542B000-memory.dmp

    Filesize

    300KB

  • memory/4212-1100-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-1101-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-1102-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4212-1103-0x0000000005580000-0x0000000005612000-memory.dmp

    Filesize

    584KB

  • memory/4212-1104-0x0000000005620000-0x0000000005686000-memory.dmp

    Filesize

    408KB

  • memory/4212-1105-0x0000000006550000-0x00000000065C6000-memory.dmp

    Filesize

    472KB

  • memory/4212-1106-0x00000000065E0000-0x0000000006630000-memory.dmp

    Filesize

    320KB

  • memory/4212-1107-0x0000000006660000-0x0000000006822000-memory.dmp

    Filesize

    1.8MB

  • memory/4212-1108-0x0000000006860000-0x0000000006D8C000-memory.dmp

    Filesize

    5.2MB

  • memory/4212-1109-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4804-1116-0x0000000000840000-0x0000000000872000-memory.dmp

    Filesize

    200KB

  • memory/4804-1117-0x0000000005280000-0x00000000052CB000-memory.dmp

    Filesize

    300KB

  • memory/4804-1118-0x0000000005150000-0x0000000005160000-memory.dmp

    Filesize

    64KB