Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2023, 15:04

General

  • Target

    e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe

  • Size

    857KB

  • MD5

    38406b6f196feaa3f0d82d3693786977

  • SHA1

    3f69a2fe5394f5eb9d3bcafb9595970fbda58026

  • SHA256

    e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a

  • SHA512

    31fd394743b6aceacba89f4d3be3167126db6b1766f149b3e66a4f2fe2ad351ba7d6f217668471cc179fc2ed61098ec59e7f0b97077c23a54b450e1bb72fe6c9

  • SSDEEP

    12288:YMroy90ltewCKRvpu1KCVdyU07hr1HokfrIafJpiBv2BRsV6+wywdpKvkNKZhsUg:wyARpu11dyUm0afJphH+Uds8NKjXE

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe
    "C:\Users\Admin\AppData\Local\Temp\e0675e5b80a6637c4cb279f070f68c3aff5adf7f93ba4b84ec608bcc9fdbce3a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9893173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9893173.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7607190.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7607190.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4494257.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4494257.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4228
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6599543.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6599543.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:264

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9893173.exe

          Filesize

          412KB

          MD5

          c5eb84cec5bd60c20828ce3051e8e167

          SHA1

          ff8a6fe48ecdf8faa15d9a401fec395578134951

          SHA256

          ea12dc1ea6ffa4c105b03ba5bc8621f151d4c71d0fd0dbfb6a4a31d23f51953a

          SHA512

          bde94f8d06e057d439940d0da358ce2144d586f363afa5d9b3a27cec1d87ac9f257c37337d4970a69bf7f7567cdca8156a1033709f12c36caee5681a1b714434

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9893173.exe

          Filesize

          412KB

          MD5

          c5eb84cec5bd60c20828ce3051e8e167

          SHA1

          ff8a6fe48ecdf8faa15d9a401fec395578134951

          SHA256

          ea12dc1ea6ffa4c105b03ba5bc8621f151d4c71d0fd0dbfb6a4a31d23f51953a

          SHA512

          bde94f8d06e057d439940d0da358ce2144d586f363afa5d9b3a27cec1d87ac9f257c37337d4970a69bf7f7567cdca8156a1033709f12c36caee5681a1b714434

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7607190.exe

          Filesize

          206KB

          MD5

          9a2a075174fa0b1da4234b26d146fb2a

          SHA1

          972ea5c7c9a6a1876745b48d5a444df30da9a73c

          SHA256

          269229e5c15b93ff53b4f1920f46567cd2843a03268b1a029fe1659650d7dd66

          SHA512

          987b9382998f4c7c6280bfdd1f682b27b500ce0e5bf94bc83062c42bcf0a6a1dbf86e751864678e0fa48f1a677609e9c7a24c2de98fc6a3b3a32ae48e8ea3138

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7607190.exe

          Filesize

          206KB

          MD5

          9a2a075174fa0b1da4234b26d146fb2a

          SHA1

          972ea5c7c9a6a1876745b48d5a444df30da9a73c

          SHA256

          269229e5c15b93ff53b4f1920f46567cd2843a03268b1a029fe1659650d7dd66

          SHA512

          987b9382998f4c7c6280bfdd1f682b27b500ce0e5bf94bc83062c42bcf0a6a1dbf86e751864678e0fa48f1a677609e9c7a24c2de98fc6a3b3a32ae48e8ea3138

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4494257.exe

          Filesize

          14KB

          MD5

          4e60508044a17c985590e8d1ac94d6d7

          SHA1

          d1d5964a0703a26a247ba2dc99d19f2482b7e384

          SHA256

          c55c7cad5af3a10a6bcf1bed6646f2a7d69440a53898dafa47a14bb9ff5ca3e6

          SHA512

          6d5526d2915668df1e042d1347c31f1216892442c322bb410e42112edbbe802286c37b021cf72289c47462fcb600bfe674c72ada1239477d22186723828b9276

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4494257.exe

          Filesize

          14KB

          MD5

          4e60508044a17c985590e8d1ac94d6d7

          SHA1

          d1d5964a0703a26a247ba2dc99d19f2482b7e384

          SHA256

          c55c7cad5af3a10a6bcf1bed6646f2a7d69440a53898dafa47a14bb9ff5ca3e6

          SHA512

          6d5526d2915668df1e042d1347c31f1216892442c322bb410e42112edbbe802286c37b021cf72289c47462fcb600bfe674c72ada1239477d22186723828b9276

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6599543.exe

          Filesize

          172KB

          MD5

          9c80e9ba748d545f3d50f3d728b21e1b

          SHA1

          2bc26d18e0f9d98e407b8db8f3b8fd84d2d93d5f

          SHA256

          8f4b85f549faf3e5a958189ef035145e696211874626cd6c81d93793d5f49c1d

          SHA512

          f0a22c18bce599e31476bdf84cb9f53f6451f28b55a8d82c269ee24f1bc0098a6e42089c0a5c6bead34af3dd5c88509141cb726fc1d16e4dce5655c4ab5712d1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6599543.exe

          Filesize

          172KB

          MD5

          9c80e9ba748d545f3d50f3d728b21e1b

          SHA1

          2bc26d18e0f9d98e407b8db8f3b8fd84d2d93d5f

          SHA256

          8f4b85f549faf3e5a958189ef035145e696211874626cd6c81d93793d5f49c1d

          SHA512

          f0a22c18bce599e31476bdf84cb9f53f6451f28b55a8d82c269ee24f1bc0098a6e42089c0a5c6bead34af3dd5c88509141cb726fc1d16e4dce5655c4ab5712d1

        • memory/264-160-0x000000000B260000-0x000000000B878000-memory.dmp

          Filesize

          6.1MB

        • memory/264-165-0x000000000B090000-0x000000000B106000-memory.dmp

          Filesize

          472KB

        • memory/264-172-0x000000000CE00000-0x000000000D32C000-memory.dmp

          Filesize

          5.2MB

        • memory/264-161-0x000000000ADE0000-0x000000000AEEA000-memory.dmp

          Filesize

          1.0MB

        • memory/264-162-0x000000000AD20000-0x000000000AD32000-memory.dmp

          Filesize

          72KB

        • memory/264-163-0x000000000AD80000-0x000000000ADBC000-memory.dmp

          Filesize

          240KB

        • memory/264-164-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/264-159-0x0000000000E60000-0x0000000000E90000-memory.dmp

          Filesize

          192KB

        • memory/264-166-0x000000000B1B0000-0x000000000B242000-memory.dmp

          Filesize

          584KB

        • memory/264-167-0x000000000BE30000-0x000000000C3D4000-memory.dmp

          Filesize

          5.6MB

        • memory/264-168-0x000000000B980000-0x000000000B9E6000-memory.dmp

          Filesize

          408KB

        • memory/264-169-0x000000000C4E0000-0x000000000C530000-memory.dmp

          Filesize

          320KB

        • memory/264-170-0x000000000C700000-0x000000000C8C2000-memory.dmp

          Filesize

          1.8MB

        • memory/264-171-0x0000000005670000-0x0000000005680000-memory.dmp

          Filesize

          64KB

        • memory/4228-154-0x0000000000030000-0x000000000003A000-memory.dmp

          Filesize

          40KB