Analysis

  • max time kernel
    57s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/03/2023, 18:22

General

  • Target

    9984fec1b6669345c05126a31109b96c8e6678ee436333ab7ec8558b9ec89da2.exe

  • Size

    546KB

  • MD5

    d1d4ea2a780541eeb519801a6eab483d

  • SHA1

    a94603f1e21d048365090f2eb8657d35182f8d7c

  • SHA256

    9984fec1b6669345c05126a31109b96c8e6678ee436333ab7ec8558b9ec89da2

  • SHA512

    7795d08ae5cf8dd6690203034f964fd7cd1bfe78d77771ff9def61826bf79a5a5893ca66c61767fd710be23264a7dec664a6d5ff29c524a6d0cd69fcc774fa15

  • SSDEEP

    12288:YMrfy90R5nFysK0nMZRMOH1b2gpzvpfG8AorPlgRxa+U+bm3P:XyipK0ncRbSojp+8hb8xnG

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9984fec1b6669345c05126a31109b96c8e6678ee436333ab7ec8558b9ec89da2.exe
    "C:\Users\Admin\AppData\Local\Temp\9984fec1b6669345c05126a31109b96c8e6678ee436333ab7ec8558b9ec89da2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkoT9334qO.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkoT9334qO.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95RM95KG23.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95RM95KG23.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkhN21Xu53Nn.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkhN21Xu53Nn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upQW62LQ94rD.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upQW62LQ94rD.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upQW62LQ94rD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upQW62LQ94rD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkoT9334qO.exe

    Filesize

    402KB

    MD5

    e499b5299036c6b5ac8a86fe8f4f4111

    SHA1

    bb74fda8e0b330bddeeaba0bda9f2f75bb1e5838

    SHA256

    41c59bea49051ffa7b65a6d722b5ba5e644fa2f745f92fdb048b93888e96b9f8

    SHA512

    0dc7ecec2515bad76d91715ce5179bfff36123481d93ee54d41a4567505cbbaf153a593c02f13f3f8cf037ca2969e8048e549fb8448ec6ca2b6638bbe8cac2e3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkoT9334qO.exe

    Filesize

    402KB

    MD5

    e499b5299036c6b5ac8a86fe8f4f4111

    SHA1

    bb74fda8e0b330bddeeaba0bda9f2f75bb1e5838

    SHA256

    41c59bea49051ffa7b65a6d722b5ba5e644fa2f745f92fdb048b93888e96b9f8

    SHA512

    0dc7ecec2515bad76d91715ce5179bfff36123481d93ee54d41a4567505cbbaf153a593c02f13f3f8cf037ca2969e8048e549fb8448ec6ca2b6638bbe8cac2e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95RM95KG23.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw95RM95KG23.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkhN21Xu53Nn.exe

    Filesize

    317KB

    MD5

    951fa5356ac288731a279778680760cb

    SHA1

    ec2e18c615f5818742d946582d64e32bb88dbfbb

    SHA256

    f5f7055115e81907accaf5c574e871f2c009da8163df4d5930af1563f4f5b175

    SHA512

    b8385866f94ab644ad455571866080250acb23cb1d19208ec58cf316524e0b6c419620622c0fe0591b1ff0e3ee5a8e50a39ed0bc4a792ba4b9b903b0ed83d1c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkhN21Xu53Nn.exe

    Filesize

    317KB

    MD5

    951fa5356ac288731a279778680760cb

    SHA1

    ec2e18c615f5818742d946582d64e32bb88dbfbb

    SHA256

    f5f7055115e81907accaf5c574e871f2c009da8163df4d5930af1563f4f5b175

    SHA512

    b8385866f94ab644ad455571866080250acb23cb1d19208ec58cf316524e0b6c419620622c0fe0591b1ff0e3ee5a8e50a39ed0bc4a792ba4b9b903b0ed83d1c4

  • memory/1344-135-0x0000000000260000-0x000000000026A000-memory.dmp

    Filesize

    40KB

  • memory/1676-141-0x0000000004A80000-0x0000000004AC6000-memory.dmp

    Filesize

    280KB

  • memory/1676-142-0x00000000005A0000-0x00000000005EB000-memory.dmp

    Filesize

    300KB

  • memory/1676-143-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-144-0x0000000004B70000-0x000000000506E000-memory.dmp

    Filesize

    5.0MB

  • memory/1676-145-0x0000000004B00000-0x0000000004B44000-memory.dmp

    Filesize

    272KB

  • memory/1676-146-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-147-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-149-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-151-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-153-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-155-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-157-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-158-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-161-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-160-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-163-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-165-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-167-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-169-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-171-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-173-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-175-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-177-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-179-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-181-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-183-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-185-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-187-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-189-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-191-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-193-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-195-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-197-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-199-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-201-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-203-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-205-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-207-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-209-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-211-0x0000000004B00000-0x0000000004B3E000-memory.dmp

    Filesize

    248KB

  • memory/1676-1054-0x00000000050B0000-0x00000000056B6000-memory.dmp

    Filesize

    6.0MB

  • memory/1676-1055-0x0000000005740000-0x000000000584A000-memory.dmp

    Filesize

    1.0MB

  • memory/1676-1056-0x0000000005880000-0x0000000005892000-memory.dmp

    Filesize

    72KB

  • memory/1676-1057-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-1058-0x00000000058A0000-0x00000000058DE000-memory.dmp

    Filesize

    248KB

  • memory/1676-1059-0x00000000059F0000-0x0000000005A3B000-memory.dmp

    Filesize

    300KB

  • memory/1676-1061-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-1062-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-1063-0x0000000005B90000-0x0000000005C22000-memory.dmp

    Filesize

    584KB

  • memory/1676-1064-0x0000000005C30000-0x0000000005C96000-memory.dmp

    Filesize

    408KB

  • memory/1676-1065-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/1676-1066-0x0000000006540000-0x00000000065B6000-memory.dmp

    Filesize

    472KB

  • memory/1676-1067-0x00000000065E0000-0x0000000006630000-memory.dmp

    Filesize

    320KB

  • memory/1676-1069-0x0000000007920000-0x0000000007AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/1676-1070-0x0000000007AF0000-0x000000000801C000-memory.dmp

    Filesize

    5.2MB

  • memory/5096-1076-0x0000000000EB0000-0x0000000000EE2000-memory.dmp

    Filesize

    200KB

  • memory/5096-1077-0x00000000058F0000-0x000000000593B000-memory.dmp

    Filesize

    300KB

  • memory/5096-1078-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/5096-1079-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB