Analysis

  • max time kernel
    47s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2023 04:47

General

  • Target

    0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe

  • Size

    530KB

  • MD5

    8265d0a33a7188d8fdce39d43b05f850

  • SHA1

    0894bd1e3b2b988e5c341fc8b0390a5f0134fd85

  • SHA256

    0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3

  • SHA512

    1150ae0ffbb8b0433fe09ec4909a18894d4521d3bf2c431af543cf7e7479fef803161d4bc78050ecd730c8615971cb96984413e40fef45b019210265695cb168

  • SSDEEP

    12288:eMrcy90tqhb9xae1ZCTItUC5VHWQZ2kQ3Z09xhItNqZG:CyD9PP12IqCr2BgCqU

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 39 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe
    "C:\Users\Admin\AppData\Local\Temp\0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe

    Filesize

    386KB

    MD5

    d1db1d44c7dcd8a588da8fe4079018e3

    SHA1

    344cb778c7ad2e85da70bf485d4858bec1edb856

    SHA256

    a7293178a27ea7e2d1ed6fa3f2dc928d850f07e1a6f70684271cb3fd256de198

    SHA512

    e5aaa01062d40d910d71c9c6088dd1220bd983b0f6c11192416494c8e3ab71abcbc2b2ebdd88da39a55f33b9860fb6159e7db12b947c1c2092c832a91e71f4be

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe

    Filesize

    386KB

    MD5

    d1db1d44c7dcd8a588da8fe4079018e3

    SHA1

    344cb778c7ad2e85da70bf485d4858bec1edb856

    SHA256

    a7293178a27ea7e2d1ed6fa3f2dc928d850f07e1a6f70684271cb3fd256de198

    SHA512

    e5aaa01062d40d910d71c9c6088dd1220bd983b0f6c11192416494c8e3ab71abcbc2b2ebdd88da39a55f33b9860fb6159e7db12b947c1c2092c832a91e71f4be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe

    Filesize

    386KB

    MD5

    d1db1d44c7dcd8a588da8fe4079018e3

    SHA1

    344cb778c7ad2e85da70bf485d4858bec1edb856

    SHA256

    a7293178a27ea7e2d1ed6fa3f2dc928d850f07e1a6f70684271cb3fd256de198

    SHA512

    e5aaa01062d40d910d71c9c6088dd1220bd983b0f6c11192416494c8e3ab71abcbc2b2ebdd88da39a55f33b9860fb6159e7db12b947c1c2092c832a91e71f4be

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe

    Filesize

    386KB

    MD5

    d1db1d44c7dcd8a588da8fe4079018e3

    SHA1

    344cb778c7ad2e85da70bf485d4858bec1edb856

    SHA256

    a7293178a27ea7e2d1ed6fa3f2dc928d850f07e1a6f70684271cb3fd256de198

    SHA512

    e5aaa01062d40d910d71c9c6088dd1220bd983b0f6c11192416494c8e3ab71abcbc2b2ebdd88da39a55f33b9860fb6159e7db12b947c1c2092c832a91e71f4be

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • memory/268-113-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-129-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-91-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-93-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-95-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-97-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-99-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-101-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-103-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-105-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-107-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-109-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-111-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-87-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-115-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-117-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-119-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-121-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-123-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-125-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-127-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-89-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-131-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-133-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-135-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-137-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-139-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-141-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-143-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-145-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-147-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-149-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-266-0x0000000002290000-0x00000000022D0000-memory.dmp

    Filesize

    256KB

  • memory/268-268-0x0000000002290000-0x00000000022D0000-memory.dmp

    Filesize

    256KB

  • memory/268-994-0x0000000002290000-0x00000000022D0000-memory.dmp

    Filesize

    256KB

  • memory/268-996-0x0000000002290000-0x00000000022D0000-memory.dmp

    Filesize

    256KB

  • memory/268-997-0x0000000002290000-0x00000000022D0000-memory.dmp

    Filesize

    256KB

  • memory/268-86-0x0000000002530000-0x000000000256E000-memory.dmp

    Filesize

    248KB

  • memory/268-85-0x0000000002530000-0x0000000002574000-memory.dmp

    Filesize

    272KB

  • memory/268-84-0x00000000024F0000-0x0000000002536000-memory.dmp

    Filesize

    280KB

  • memory/268-83-0x0000000000250000-0x000000000029B000-memory.dmp

    Filesize

    300KB

  • memory/876-72-0x0000000000F60000-0x0000000000F6A000-memory.dmp

    Filesize

    40KB

  • memory/1400-1005-0x0000000000DF0000-0x0000000000E22000-memory.dmp

    Filesize

    200KB

  • memory/1400-1006-0x0000000004F60000-0x0000000004FA0000-memory.dmp

    Filesize

    256KB