Analysis

  • max time kernel
    83s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2023 20:24

General

  • Target

    94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe

  • Size

    551KB

  • MD5

    d838110cb773123478decc152355eb11

  • SHA1

    2bdf7c29aa54c0b506992dd301086b0dfd4193bf

  • SHA256

    94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6

  • SHA512

    271b620de0752f403f901e91d82d7496a5314a15429e0d4069d11ff05808b2e8baccf8e7f1393d50b8a4d21cff66397db872c5f54dfa78a4af135f87c77b6216

  • SSDEEP

    12288:oMriy90zZsXDVXsbkq/3iLkyit+nlt0o:KyAZuVakqFyiEnj0o

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

redline

Botnet

nocrypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    4fc7cda1ab5883a6197f20f517ce2a8c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\94eb67a4dfb3781055f7797678445bd289bd4acca0e7d1a5c7c75542dbdd2eb6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJv99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJv99.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aXP28.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aXP28.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baw36oH.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baw36oH.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cFy47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cFy47.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 1084
        3⤵
        • Program crash
        PID:3176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3832 -ip 3832
    1⤵
      PID:2100

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cFy47.exe

      Filesize

      427KB

      MD5

      0c87b90de994371b24beb289ca177975

      SHA1

      a8d63494cd9372a0cb408c414fc0de7e277e2f5b

      SHA256

      65135f1312b6dcd8db495ab0c61f516c46c2afe5e5ef5de76b4b58adfd264edb

      SHA512

      9248a9d20964c8a798be1f188ef5170125da10c4dee4c295f98c75e8409beddaa64cf101d349a30e40bdafbfba56aebe541e6094a2946d2c249c34a0c7955edd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cFy47.exe

      Filesize

      427KB

      MD5

      0c87b90de994371b24beb289ca177975

      SHA1

      a8d63494cd9372a0cb408c414fc0de7e277e2f5b

      SHA256

      65135f1312b6dcd8db495ab0c61f516c46c2afe5e5ef5de76b4b58adfd264edb

      SHA512

      9248a9d20964c8a798be1f188ef5170125da10c4dee4c295f98c75e8409beddaa64cf101d349a30e40bdafbfba56aebe541e6094a2946d2c249c34a0c7955edd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJv99.exe

      Filesize

      202KB

      MD5

      301a6dfca15b519ea4f513ee9cba86a0

      SHA1

      0837b2abbf3eddfe8358998b0efc8a908af1e25a

      SHA256

      589c49c5789f9830bb3b89ba4db4416d810614dd82d6e31a721a703844d696bb

      SHA512

      2a294f2c87ff32ea11661b184b88fd1fc9cdec93374540f9f5ddafa672058e4ca8059bcdcfb8e2de4a639dc65d21b3581ee5cf80990dd4ca795c9c066a40f358

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJv99.exe

      Filesize

      202KB

      MD5

      301a6dfca15b519ea4f513ee9cba86a0

      SHA1

      0837b2abbf3eddfe8358998b0efc8a908af1e25a

      SHA256

      589c49c5789f9830bb3b89ba4db4416d810614dd82d6e31a721a703844d696bb

      SHA512

      2a294f2c87ff32ea11661b184b88fd1fc9cdec93374540f9f5ddafa672058e4ca8059bcdcfb8e2de4a639dc65d21b3581ee5cf80990dd4ca795c9c066a40f358

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aXP28.exe

      Filesize

      175KB

      MD5

      da6f3bef8abc85bd09f50783059964e3

      SHA1

      a0f25f60ec1896c4c920ea397f40e6ce29724322

      SHA256

      e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

      SHA512

      4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aXP28.exe

      Filesize

      175KB

      MD5

      da6f3bef8abc85bd09f50783059964e3

      SHA1

      a0f25f60ec1896c4c920ea397f40e6ce29724322

      SHA256

      e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

      SHA512

      4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baw36oH.exe

      Filesize

      175KB

      MD5

      30132c45c2305b287d96a3ad8158e9e3

      SHA1

      c89477868792dbfc6abeb3016e4fcc542b01bea1

      SHA256

      0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

      SHA512

      1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\baw36oH.exe

      Filesize

      175KB

      MD5

      30132c45c2305b287d96a3ad8158e9e3

      SHA1

      c89477868792dbfc6abeb3016e4fcc542b01bea1

      SHA256

      0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

      SHA512

      1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

    • memory/1840-150-0x0000000000000000-mapping.dmp

    • memory/1840-153-0x0000000000C60000-0x0000000000C92000-memory.dmp

      Filesize

      200KB

    • memory/3832-159-0x0000000000400000-0x00000000004D1000-memory.dmp

      Filesize

      836KB

    • memory/3832-157-0x0000000000572000-0x0000000000592000-memory.dmp

      Filesize

      128KB

    • memory/3832-154-0x0000000000000000-mapping.dmp

    • memory/3832-158-0x0000000000520000-0x000000000054D000-memory.dmp

      Filesize

      180KB

    • memory/3832-160-0x0000000000572000-0x0000000000592000-memory.dmp

      Filesize

      128KB

    • memory/3832-161-0x0000000000400000-0x00000000004D1000-memory.dmp

      Filesize

      836KB

    • memory/4436-132-0x0000000000000000-mapping.dmp

    • memory/4460-139-0x0000000004FB0000-0x00000000055C8000-memory.dmp

      Filesize

      6.1MB

    • memory/4460-149-0x0000000006B00000-0x000000000702C000-memory.dmp

      Filesize

      5.2MB

    • memory/4460-148-0x0000000006400000-0x00000000065C2000-memory.dmp

      Filesize

      1.8MB

    • memory/4460-147-0x0000000005B30000-0x0000000005B80000-memory.dmp

      Filesize

      320KB

    • memory/4460-146-0x0000000005AB0000-0x0000000005B26000-memory.dmp

      Filesize

      472KB

    • memory/4460-145-0x0000000004F30000-0x0000000004F96000-memory.dmp

      Filesize

      408KB

    • memory/4460-144-0x00000000055D0000-0x0000000005662000-memory.dmp

      Filesize

      584KB

    • memory/4460-143-0x0000000005B80000-0x0000000006124000-memory.dmp

      Filesize

      5.6MB

    • memory/4460-142-0x0000000004AC0000-0x0000000004AFC000-memory.dmp

      Filesize

      240KB

    • memory/4460-141-0x0000000004A60000-0x0000000004A72000-memory.dmp

      Filesize

      72KB

    • memory/4460-140-0x0000000004B30000-0x0000000004C3A000-memory.dmp

      Filesize

      1.0MB

    • memory/4460-138-0x00000000001D0000-0x0000000000202000-memory.dmp

      Filesize

      200KB

    • memory/4460-135-0x0000000000000000-mapping.dmp