Analysis

  • max time kernel
    57s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-03-2023 13:17

General

  • Target

    1fa29a3d40a56066177d038852745376afb7899ac00cea8bda2102867d7f0928.exe

  • Size

    516KB

  • MD5

    8b6f04fdc74c9ddbcce42bf81ce4e24b

  • SHA1

    629f004ef86c0a869e13da3c9609e35b8d31bb19

  • SHA256

    1fa29a3d40a56066177d038852745376afb7899ac00cea8bda2102867d7f0928

  • SHA512

    48b425a1c88b2fdf0cb75da9c2fd76045ebce7f588f9e0702598926946eba097998dc520b5ab21c187f786418cd07059b6ee25c3d16e24ef923adbd0ca4b7842

  • SSDEEP

    12288:WMrpy90FHAWaL8i04nioHGukmy3W/Ptvi9c/:/ya3NcOmymntvi9Y

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fa29a3d40a56066177d038852745376afb7899ac00cea8bda2102867d7f0928.exe
    "C:\Users\Admin\AppData\Local\Temp\1fa29a3d40a56066177d038852745376afb7899ac00cea8bda2102867d7f0928.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urSW34CF00.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urSW34CF00.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wrEr08ck57.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wrEr08ck57.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urSW34CF00.exe

    Filesize

    232KB

    MD5

    fa0bf4034c0d1c31e46269512270b913

    SHA1

    fe2cc134263ff123c8448a62bff83853a22a8298

    SHA256

    115b1dd2d011b884f77b0d51c7093ef306649f3d3d78c4ee8b64822add6d944f

    SHA512

    dd688e8d5b627a70b9d5b2a847a968f8189739c3a85ad5fe68d487a5cb59bc418a95d324ab53bfe08c1c7f7ad3845aa815ca59dd212071875e5e14099e2f6a53

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\urSW34CF00.exe

    Filesize

    232KB

    MD5

    fa0bf4034c0d1c31e46269512270b913

    SHA1

    fe2cc134263ff123c8448a62bff83853a22a8298

    SHA256

    115b1dd2d011b884f77b0d51c7093ef306649f3d3d78c4ee8b64822add6d944f

    SHA512

    dd688e8d5b627a70b9d5b2a847a968f8189739c3a85ad5fe68d487a5cb59bc418a95d324ab53bfe08c1c7f7ad3845aa815ca59dd212071875e5e14099e2f6a53

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wrEr08ck57.exe

    Filesize

    289KB

    MD5

    71a839f728f79ee4af543c5ec12771fb

    SHA1

    f1503f9dc53c3e32ff7256d84d151f76cf601d5c

    SHA256

    563fa95b6824faee24bef23daae68b191bbf5ec09941d90abad95f8999f195fb

    SHA512

    b5a8fde95f70836adb284ed60fb56dcab939139f382c39a6aa4e54f859090330e99346ee27a663907f9e6b1a6bf9eb0e859da8aa92739f430f52e277fa13b6e9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wrEr08ck57.exe

    Filesize

    289KB

    MD5

    71a839f728f79ee4af543c5ec12771fb

    SHA1

    f1503f9dc53c3e32ff7256d84d151f76cf601d5c

    SHA256

    563fa95b6824faee24bef23daae68b191bbf5ec09941d90abad95f8999f195fb

    SHA512

    b5a8fde95f70836adb284ed60fb56dcab939139f382c39a6aa4e54f859090330e99346ee27a663907f9e6b1a6bf9eb0e859da8aa92739f430f52e277fa13b6e9

  • memory/3088-233-0x00000000006A0000-0x00000000006EB000-memory.dmp

    Filesize

    300KB

  • memory/3088-1087-0x0000000005730000-0x000000000583A000-memory.dmp

    Filesize

    1.0MB

  • memory/3088-1102-0x0000000007FB0000-0x0000000008000000-memory.dmp

    Filesize

    320KB

  • memory/3088-1101-0x0000000007F30000-0x0000000007FA6000-memory.dmp

    Filesize

    472KB

  • memory/3088-1100-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-1099-0x0000000006600000-0x0000000006B2C000-memory.dmp

    Filesize

    5.2MB

  • memory/3088-1098-0x0000000006430000-0x00000000065F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3088-181-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-1097-0x0000000006290000-0x0000000006322000-memory.dmp

    Filesize

    584KB

  • memory/3088-1096-0x0000000005B80000-0x0000000005BE6000-memory.dmp

    Filesize

    408KB

  • memory/3088-1095-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-1094-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-1093-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-183-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-1091-0x00000000059E0000-0x0000000005A2B000-memory.dmp

    Filesize

    300KB

  • memory/3088-1090-0x0000000005890000-0x00000000058CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-1089-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-185-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-1088-0x0000000005870000-0x0000000005882000-memory.dmp

    Filesize

    72KB

  • memory/3088-197-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-1086-0x0000000005110000-0x0000000005716000-memory.dmp

    Filesize

    6.0MB

  • memory/3088-239-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-237-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-235-0x0000000002400000-0x0000000002410000-memory.dmp

    Filesize

    64KB

  • memory/3088-209-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-207-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-205-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-174-0x0000000002120000-0x0000000002166000-memory.dmp

    Filesize

    280KB

  • memory/3088-175-0x0000000002390000-0x00000000023D4000-memory.dmp

    Filesize

    272KB

  • memory/3088-176-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-177-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-179-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-203-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-201-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-199-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-187-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-189-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-191-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-193-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-195-0x0000000002390000-0x00000000023CE000-memory.dmp

    Filesize

    248KB

  • memory/4124-157-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-159-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-151-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-139-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-130-0x00000000023D0000-0x00000000023EA000-memory.dmp

    Filesize

    104KB

  • memory/4124-131-0x0000000004CC0000-0x00000000051BE000-memory.dmp

    Filesize

    5.0MB

  • memory/4124-169-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/4124-129-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4124-167-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/4124-166-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/4124-165-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/4124-164-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/4124-163-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-161-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-132-0x0000000002450000-0x0000000002468000-memory.dmp

    Filesize

    96KB

  • memory/4124-155-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-153-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-149-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-147-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-145-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-143-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-141-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-137-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-136-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/4124-135-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/4124-134-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/4124-133-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB