Analysis

  • max time kernel
    53s
  • max time network
    178s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-03-2023 04:47

General

  • Target

    0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe

  • Size

    530KB

  • MD5

    8265d0a33a7188d8fdce39d43b05f850

  • SHA1

    0894bd1e3b2b988e5c341fc8b0390a5f0134fd85

  • SHA256

    0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3

  • SHA512

    1150ae0ffbb8b0433fe09ec4909a18894d4521d3bf2c431af543cf7e7479fef803161d4bc78050ecd730c8615971cb96984413e40fef45b019210265695cb168

  • SSDEEP

    12288:eMrcy90tqhb9xae1ZCTItUC5VHWQZ2kQ3Z09xhItNqZG:CyD9PP12IqCr2BgCqU

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe
    "C:\Users\Admin\AppData\Local\Temp\0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upYi85BO84nD.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe

    Filesize

    386KB

    MD5

    d1db1d44c7dcd8a588da8fe4079018e3

    SHA1

    344cb778c7ad2e85da70bf485d4858bec1edb856

    SHA256

    a7293178a27ea7e2d1ed6fa3f2dc928d850f07e1a6f70684271cb3fd256de198

    SHA512

    e5aaa01062d40d910d71c9c6088dd1220bd983b0f6c11192416494c8e3ab71abcbc2b2ebdd88da39a55f33b9860fb6159e7db12b947c1c2092c832a91e71f4be

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkrE4303xd.exe

    Filesize

    386KB

    MD5

    d1db1d44c7dcd8a588da8fe4079018e3

    SHA1

    344cb778c7ad2e85da70bf485d4858bec1edb856

    SHA256

    a7293178a27ea7e2d1ed6fa3f2dc928d850f07e1a6f70684271cb3fd256de198

    SHA512

    e5aaa01062d40d910d71c9c6088dd1220bd983b0f6c11192416494c8e3ab71abcbc2b2ebdd88da39a55f33b9860fb6159e7db12b947c1c2092c832a91e71f4be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06oc78De85.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkJt48rc50xN.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • memory/3076-141-0x0000000000590000-0x00000000005DB000-memory.dmp

    Filesize

    300KB

  • memory/3076-142-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-143-0x0000000004B00000-0x0000000004B46000-memory.dmp

    Filesize

    280KB

  • memory/3076-144-0x0000000004BD0000-0x00000000050CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3076-145-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/3076-146-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-147-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-148-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-149-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-151-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-153-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-155-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-157-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-159-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-161-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-163-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-165-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-167-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-169-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-171-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-173-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-175-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-177-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-179-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-181-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-183-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-185-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-187-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-189-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-191-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-193-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-195-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-197-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-199-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-201-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-203-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-205-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-207-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-209-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-211-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/3076-1054-0x00000000056E0000-0x0000000005CE6000-memory.dmp

    Filesize

    6.0MB

  • memory/3076-1055-0x0000000005120000-0x000000000522A000-memory.dmp

    Filesize

    1.0MB

  • memory/3076-1056-0x0000000005260000-0x0000000005272000-memory.dmp

    Filesize

    72KB

  • memory/3076-1057-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-1058-0x0000000005280000-0x00000000052BE000-memory.dmp

    Filesize

    248KB

  • memory/3076-1060-0x00000000053D0000-0x000000000541B000-memory.dmp

    Filesize

    300KB

  • memory/3076-1061-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-1062-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-1063-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-1064-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/3076-1065-0x0000000005570000-0x0000000005602000-memory.dmp

    Filesize

    584KB

  • memory/3076-1066-0x0000000005610000-0x0000000005676000-memory.dmp

    Filesize

    408KB

  • memory/3076-1068-0x0000000006450000-0x00000000064C6000-memory.dmp

    Filesize

    472KB

  • memory/3076-1069-0x00000000064E0000-0x0000000006530000-memory.dmp

    Filesize

    320KB

  • memory/3076-1070-0x0000000006550000-0x0000000006712000-memory.dmp

    Filesize

    1.8MB

  • memory/3076-1071-0x0000000006720000-0x0000000006C4C000-memory.dmp

    Filesize

    5.2MB

  • memory/3436-135-0x0000000000D70000-0x0000000000D7A000-memory.dmp

    Filesize

    40KB

  • memory/3700-1077-0x0000000000050000-0x0000000000082000-memory.dmp

    Filesize

    200KB

  • memory/3700-1078-0x0000000004970000-0x00000000049BB000-memory.dmp

    Filesize

    300KB

  • memory/3700-1079-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB