Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2023, 02:23

General

  • Target

    5894bb3327f34b4f4787da947732bd47cf4bd581910d9a82f72b8131b5fbc324.exe

  • Size

    481KB

  • MD5

    d3a2c22c5f91d855715286b1125c57f2

  • SHA1

    db3ceee7ded1badbb5b2d364ebfb538b999f1a86

  • SHA256

    5894bb3327f34b4f4787da947732bd47cf4bd581910d9a82f72b8131b5fbc324

  • SHA512

    f76886c40238da7f8bcc1560dc1d53f4efd1d975f3509b00d6aa3ac43331e332510e0d10af1939076b30c163ab330a76418a43e10ea4919c11864886f603a574

  • SSDEEP

    6144:K1y+bnr+ap0yN90QEK7mAYQVa2o4Rx+PHeJNdYNjgGFruMr47LsAs/pPQjq:PMr+y90k7mrrYYCSNjONL/s/Baq

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5894bb3327f34b4f4787da947732bd47cf4bd581910d9a82f72b8131b5fbc324.exe
    "C:\Users\Admin\AppData\Local\Temp\5894bb3327f34b4f4787da947732bd47cf4bd581910d9a82f72b8131b5fbc324.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKo17hL.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKo17hL.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bSh27Rn.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bSh27Rn.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1040
          4⤵
          • Program crash
          PID:4540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dFS13cK.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dFS13cK.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ldZ71lt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ldZ71lt.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5104 -ip 5104
    1⤵
      PID:856

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ldZ71lt.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ldZ71lt.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKo17hL.exe

            Filesize

            378KB

            MD5

            ebf7a00473e50e8b59305e438d1c4a70

            SHA1

            6fb6434755d7f52ea2153adaab99dd7084a33c1c

            SHA256

            9a1b2e0f5f433272e716dfe7fd26bea15ed4046b1ed5350bddef6965f8a1d1fb

            SHA512

            10a99613b0ec527b1f3b5b383749b1ae9b993b61eae4175b6df5c63a15d17f91568cbffd338d307d25eb981e1620d0c73b71eb312a2308a820bcbe6821345f68

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKo17hL.exe

            Filesize

            378KB

            MD5

            ebf7a00473e50e8b59305e438d1c4a70

            SHA1

            6fb6434755d7f52ea2153adaab99dd7084a33c1c

            SHA256

            9a1b2e0f5f433272e716dfe7fd26bea15ed4046b1ed5350bddef6965f8a1d1fb

            SHA512

            10a99613b0ec527b1f3b5b383749b1ae9b993b61eae4175b6df5c63a15d17f91568cbffd338d307d25eb981e1620d0c73b71eb312a2308a820bcbe6821345f68

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bSh27Rn.exe

            Filesize

            247KB

            MD5

            a9a22f8215115be43a5275d88542da90

            SHA1

            549ceb476d6f91119321681d84abdac93eb35125

            SHA256

            af670681bdd2d782169d3baa2e36837d315cd40d1802e56d65553f5bd1aa640c

            SHA512

            6aca26659331e03fe9579793bbdf25df7bdb48e89d8b855d79580d7e58da43c63f34492ba196b51d4316f03cfcd121a9df97d973ee7e2d255f7fa150e7f0bdc9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bSh27Rn.exe

            Filesize

            247KB

            MD5

            a9a22f8215115be43a5275d88542da90

            SHA1

            549ceb476d6f91119321681d84abdac93eb35125

            SHA256

            af670681bdd2d782169d3baa2e36837d315cd40d1802e56d65553f5bd1aa640c

            SHA512

            6aca26659331e03fe9579793bbdf25df7bdb48e89d8b855d79580d7e58da43c63f34492ba196b51d4316f03cfcd121a9df97d973ee7e2d255f7fa150e7f0bdc9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dFS13cK.exe

            Filesize

            175KB

            MD5

            a5f5c5d6291c7ae9e1d1b7ed1e551490

            SHA1

            3d06413341893b838549939e15f8f1eec423d71a

            SHA256

            1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

            SHA512

            d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dFS13cK.exe

            Filesize

            175KB

            MD5

            a5f5c5d6291c7ae9e1d1b7ed1e551490

            SHA1

            3d06413341893b838549939e15f8f1eec423d71a

            SHA256

            1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

            SHA512

            d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

          • memory/2240-156-0x00000000066B0000-0x0000000006700000-memory.dmp

            Filesize

            320KB

          • memory/2240-153-0x0000000005990000-0x00000000059F6000-memory.dmp

            Filesize

            408KB

          • memory/2240-158-0x0000000007800000-0x0000000007D2C000-memory.dmp

            Filesize

            5.2MB

          • memory/2240-157-0x0000000007100000-0x00000000072C2000-memory.dmp

            Filesize

            1.8MB

          • memory/2240-155-0x0000000006630000-0x00000000066A6000-memory.dmp

            Filesize

            472KB

          • memory/2240-154-0x0000000006500000-0x0000000006592000-memory.dmp

            Filesize

            584KB

          • memory/2240-148-0x0000000000C10000-0x0000000000C42000-memory.dmp

            Filesize

            200KB

          • memory/2240-149-0x0000000005B40000-0x0000000006158000-memory.dmp

            Filesize

            6.1MB

          • memory/2240-150-0x00000000056B0000-0x00000000057BA000-memory.dmp

            Filesize

            1.0MB

          • memory/2240-151-0x00000000055E0000-0x00000000055F2000-memory.dmp

            Filesize

            72KB

          • memory/2240-152-0x0000000005640000-0x000000000567C000-memory.dmp

            Filesize

            240KB

          • memory/3784-162-0x0000000000520000-0x000000000052A000-memory.dmp

            Filesize

            40KB

          • memory/3784-163-0x00007FFDF4CB0000-0x00007FFDF5771000-memory.dmp

            Filesize

            10.8MB

          • memory/3784-164-0x00007FFDF4CB0000-0x00007FFDF5771000-memory.dmp

            Filesize

            10.8MB

          • memory/5104-139-0x00000000008F1000-0x0000000000911000-memory.dmp

            Filesize

            128KB

          • memory/5104-141-0x0000000000400000-0x000000000056F000-memory.dmp

            Filesize

            1.4MB

          • memory/5104-144-0x0000000000400000-0x000000000056F000-memory.dmp

            Filesize

            1.4MB

          • memory/5104-143-0x00000000008F1000-0x0000000000911000-memory.dmp

            Filesize

            128KB

          • memory/5104-142-0x00000000008F1000-0x0000000000911000-memory.dmp

            Filesize

            128KB

          • memory/5104-140-0x0000000000640000-0x000000000066D000-memory.dmp

            Filesize

            180KB

          • memory/5104-138-0x0000000004E60000-0x0000000005404000-memory.dmp

            Filesize

            5.6MB