Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/06/2023, 02:49

General

  • Target

    213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe

  • Size

    578KB

  • MD5

    86bc8f724840b402efee1fc33931aa41

  • SHA1

    8e7c6101167e492650088d285d2f17b0cba970a3

  • SHA256

    213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e

  • SHA512

    3f2805d54afc84929b447b9bcbebbc6e766bfd269e752c2b292f559bebcfafdb385b1040d23f83b00c3f20144a32b88146a51c81518bb9e0724fa5736d8dc4ab

  • SSDEEP

    12288:fMr7y90r03JfvestlwfYpT/RjoChHeSEKzs2:kyPf2QlR5RjoKHeu

Malware Config

Extracted

Family

redline

Botnet

dasa

C2

83.97.73.126:19048

Attributes
  • auth_value

    7eca6ed540c2dcd359aed5b67c4eda07

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe
    "C:\Users\Admin\AppData\Local\Temp\213013de067392f5d37d134a75289d0f9956d82eb3d98eea76b4c4056e57346e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5388702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5388702.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5729416.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5729416.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2731864.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2731864.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5388702.exe

    Filesize

    378KB

    MD5

    bd5261f7fd5ac5aa357e60a87cb5a7ee

    SHA1

    322b34f6e4e327ed714148b5bf38b01513b8fb27

    SHA256

    22593a81909dcf5e0a81ce500216cbf24c3b4e8eeba9786a3049da0003b3b42a

    SHA512

    7365cc8b68b346e59542a45197c86b317b06a40048274619deff54f673b2e8d0769697fc6b187633718edb0564cae881f39f5e3718b7c0409f7a199505606dba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5388702.exe

    Filesize

    378KB

    MD5

    bd5261f7fd5ac5aa357e60a87cb5a7ee

    SHA1

    322b34f6e4e327ed714148b5bf38b01513b8fb27

    SHA256

    22593a81909dcf5e0a81ce500216cbf24c3b4e8eeba9786a3049da0003b3b42a

    SHA512

    7365cc8b68b346e59542a45197c86b317b06a40048274619deff54f673b2e8d0769697fc6b187633718edb0564cae881f39f5e3718b7c0409f7a199505606dba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5729416.exe

    Filesize

    206KB

    MD5

    381a88fc13aa055a55e05bdbce96dc3c

    SHA1

    1d0149576295f20cc8d8d3fe18c2cad378bbdf61

    SHA256

    9bfe84db54063e87b0f6f5c6d7ea2a54e5b3e0f06eca94eab8c5366f845b0315

    SHA512

    14608034c70d97666c798361120d9ed862326fe76c2bb7da221cd974420b1ea23a35b920f4136717a4c58418c3088e91f5c578dd41418bed9739cc2dfa9cc09a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5729416.exe

    Filesize

    206KB

    MD5

    381a88fc13aa055a55e05bdbce96dc3c

    SHA1

    1d0149576295f20cc8d8d3fe18c2cad378bbdf61

    SHA256

    9bfe84db54063e87b0f6f5c6d7ea2a54e5b3e0f06eca94eab8c5366f845b0315

    SHA512

    14608034c70d97666c798361120d9ed862326fe76c2bb7da221cd974420b1ea23a35b920f4136717a4c58418c3088e91f5c578dd41418bed9739cc2dfa9cc09a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2731864.exe

    Filesize

    172KB

    MD5

    64dc188223c46f48febe2530a4c6f115

    SHA1

    010cdf18f5b107595fbd1009202f28b4e952c4e0

    SHA256

    bff50f9aa40653088d78e99ca92f318f0d33785f4fb5666fa46b7c4e156631cd

    SHA512

    2be09159b08b37e48e21d9903a27a1f1b655c5982e4aa794c8cee6f08b69cc34f315b04832da63a9de013dad1dd5cbf35ec99de28e1711f758a8968c09161c08

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2731864.exe

    Filesize

    172KB

    MD5

    64dc188223c46f48febe2530a4c6f115

    SHA1

    010cdf18f5b107595fbd1009202f28b4e952c4e0

    SHA256

    bff50f9aa40653088d78e99ca92f318f0d33785f4fb5666fa46b7c4e156631cd

    SHA512

    2be09159b08b37e48e21d9903a27a1f1b655c5982e4aa794c8cee6f08b69cc34f315b04832da63a9de013dad1dd5cbf35ec99de28e1711f758a8968c09161c08

  • memory/3500-141-0x0000000000720000-0x0000000000750000-memory.dmp

    Filesize

    192KB

  • memory/3500-142-0x0000000004E90000-0x0000000004E96000-memory.dmp

    Filesize

    24KB

  • memory/3500-143-0x0000000005710000-0x0000000005D16000-memory.dmp

    Filesize

    6.0MB

  • memory/3500-144-0x0000000005240000-0x000000000534A000-memory.dmp

    Filesize

    1.0MB

  • memory/3500-145-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/3500-146-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/3500-147-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3500-148-0x0000000005350000-0x000000000539B000-memory.dmp

    Filesize

    300KB

  • memory/3500-149-0x00000000055F0000-0x0000000005666000-memory.dmp

    Filesize

    472KB

  • memory/3500-150-0x0000000005D20000-0x0000000005DB2000-memory.dmp

    Filesize

    584KB

  • memory/3500-151-0x0000000006630000-0x0000000006B2E000-memory.dmp

    Filesize

    5.0MB

  • memory/3500-152-0x0000000005DC0000-0x0000000005E26000-memory.dmp

    Filesize

    408KB

  • memory/3500-153-0x0000000006380000-0x00000000063D0000-memory.dmp

    Filesize

    320KB

  • memory/3500-154-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3500-155-0x0000000006D00000-0x0000000006EC2000-memory.dmp

    Filesize

    1.8MB

  • memory/3500-156-0x00000000088B0000-0x0000000008DDC000-memory.dmp

    Filesize

    5.2MB