Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2023, 17:36

General

  • Target

    db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe

  • Size

    739KB

  • MD5

    d7404a6099ea5cfa126c83bf38f61ea3

  • SHA1

    50028cf7f82a05ac59986568780542e33b480458

  • SHA256

    db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16

  • SHA512

    31023b304d07e679392f60a35e2b8cb9364530082c28f6901d852bf99af88811a2a035a2402633e77336f407851ac8f03ea74796791d565a3e777685960f1b20

  • SSDEEP

    12288:lMrGy90I/fNVZb8IVcI0N6c4q6aKOQSfS4wEUxikveQ6mv4KQYspy:vyjNVZb8Iz0GxSfS4wEeXv/vbd

Malware Config

Extracted

Family

redline

Botnet

cr10

C2

176.113.115.17:4132

Attributes
  • auth_value

    0a52a09c70a98bb6612362e5eb8b1d02

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe
    "C:\Users\Admin\AppData\Local\Temp\db888c33e99939779647619d4a2926d6592b62b96fae1794d5c4bcca86956f16.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmx79.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmx79.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTW34.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTW34.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJo17.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJo17.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 1340
            5⤵
            • Program crash
            PID:3356
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrC80.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrC80.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nXL42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nXL42.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEq08.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEq08.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1972 -ip 1972
    1⤵
      PID:1312

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEq08.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sEq08.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmx79.exe

            Filesize

            635KB

            MD5

            1843160bc6692d876285c247854d0469

            SHA1

            b9c2efa657b64f19dd89985d9781e273d81bdcc1

            SHA256

            315f4d4c6f6bc19c87679ed30ab9a5084a4343edf570aedb761c227d182ad759

            SHA512

            c77792be9ad7a4230ecd88244e44d18ff23a01ef523808b9064080abdc41e16f06b5e72cf57e70aa411048936334ef07214ce9591dda29bfe2fe6c253c476bfd

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmx79.exe

            Filesize

            635KB

            MD5

            1843160bc6692d876285c247854d0469

            SHA1

            b9c2efa657b64f19dd89985d9781e273d81bdcc1

            SHA256

            315f4d4c6f6bc19c87679ed30ab9a5084a4343edf570aedb761c227d182ad759

            SHA512

            c77792be9ad7a4230ecd88244e44d18ff23a01ef523808b9064080abdc41e16f06b5e72cf57e70aa411048936334ef07214ce9591dda29bfe2fe6c253c476bfd

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nXL42.exe

            Filesize

            175KB

            MD5

            dd0c9e110c68ce1fa5308979ef718f7b

            SHA1

            473deb8069f0841d47b74b7f414dacc6f96eca78

            SHA256

            dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

            SHA512

            29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nXL42.exe

            Filesize

            175KB

            MD5

            dd0c9e110c68ce1fa5308979ef718f7b

            SHA1

            473deb8069f0841d47b74b7f414dacc6f96eca78

            SHA256

            dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

            SHA512

            29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTW34.exe

            Filesize

            491KB

            MD5

            0027395bec2d869625d3f20bdfea8d5d

            SHA1

            0736b7f94e6263fe9d8eb8e00fb8c7fed7e9b457

            SHA256

            5587198b8915228f3b719ab18e94d32305cb245e2cbc686b0e70e69649256d2e

            SHA512

            72f2bdea983adb05e8f07362099fe37633a1de9464c603c43586b6ae6f0fa7c2a6c222b6c0f7f9690a6fdcadddc700747157f8b43010e653700bb2554b8b2547

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vTW34.exe

            Filesize

            491KB

            MD5

            0027395bec2d869625d3f20bdfea8d5d

            SHA1

            0736b7f94e6263fe9d8eb8e00fb8c7fed7e9b457

            SHA256

            5587198b8915228f3b719ab18e94d32305cb245e2cbc686b0e70e69649256d2e

            SHA512

            72f2bdea983adb05e8f07362099fe37633a1de9464c603c43586b6ae6f0fa7c2a6c222b6c0f7f9690a6fdcadddc700747157f8b43010e653700bb2554b8b2547

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJo17.exe

            Filesize

            293KB

            MD5

            b5b088e47af91c344e3583ef9391586f

            SHA1

            81c28284f693f66d1d30b8ee09f0d69e27457333

            SHA256

            3f201ce75b624c56d73e6aa11e0d93825455d0ee88d3fdcc8e2f3bafae6cc739

            SHA512

            9d0789dfa16b849709e3bb04159ed2bf6ccd74975472efe87aeb9d8ff0539b8953cb0937b4d646fba7d1460ea8c1fd0ee4dfb9ec2debfefdee70ab9b05ca1a3b

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJo17.exe

            Filesize

            293KB

            MD5

            b5b088e47af91c344e3583ef9391586f

            SHA1

            81c28284f693f66d1d30b8ee09f0d69e27457333

            SHA256

            3f201ce75b624c56d73e6aa11e0d93825455d0ee88d3fdcc8e2f3bafae6cc739

            SHA512

            9d0789dfa16b849709e3bb04159ed2bf6ccd74975472efe87aeb9d8ff0539b8953cb0937b4d646fba7d1460ea8c1fd0ee4dfb9ec2debfefdee70ab9b05ca1a3b

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrC80.exe

            Filesize

            265KB

            MD5

            b9eedd1c8b16c4481c3cadbe6ed97280

            SHA1

            6d44e5ced475bda87d1282b30ebc84bd25595e1f

            SHA256

            ceb59e6ddd127fcc56e7dca136002b8552290a954c92dd565706c4dc472bad17

            SHA512

            335b334750f8de4e366c7eb3ddc854a46b0d8cbd4d5479671131c9ce9a93fe679ae728b970b6ce3489a6863472bd2172870c6c8e4f1271234b23717a6dc957f1

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lrC80.exe

            Filesize

            265KB

            MD5

            b9eedd1c8b16c4481c3cadbe6ed97280

            SHA1

            6d44e5ced475bda87d1282b30ebc84bd25595e1f

            SHA256

            ceb59e6ddd127fcc56e7dca136002b8552290a954c92dd565706c4dc472bad17

            SHA512

            335b334750f8de4e366c7eb3ddc854a46b0d8cbd4d5479671131c9ce9a93fe679ae728b970b6ce3489a6863472bd2172870c6c8e4f1271234b23717a6dc957f1

          • memory/1972-152-0x00000000069A0000-0x0000000006A16000-memory.dmp

            Filesize

            472KB

          • memory/1972-144-0x0000000004F10000-0x00000000054B4000-memory.dmp

            Filesize

            5.6MB

          • memory/1972-147-0x0000000004E50000-0x0000000004E62000-memory.dmp

            Filesize

            72KB

          • memory/1972-148-0x0000000004E70000-0x0000000004EAC000-memory.dmp

            Filesize

            240KB

          • memory/1972-149-0x0000000005E50000-0x0000000005EE2000-memory.dmp

            Filesize

            584KB

          • memory/1972-150-0x0000000005EF0000-0x0000000005F56000-memory.dmp

            Filesize

            408KB

          • memory/1972-151-0x0000000000934000-0x0000000000962000-memory.dmp

            Filesize

            184KB

          • memory/1972-145-0x00000000054C0000-0x0000000005AD8000-memory.dmp

            Filesize

            6.1MB

          • memory/1972-153-0x0000000006A20000-0x0000000006A70000-memory.dmp

            Filesize

            320KB

          • memory/1972-154-0x0000000006AB0000-0x0000000006C72000-memory.dmp

            Filesize

            1.8MB

          • memory/1972-155-0x0000000006C80000-0x00000000071AC000-memory.dmp

            Filesize

            5.2MB

          • memory/1972-156-0x0000000000934000-0x0000000000962000-memory.dmp

            Filesize

            184KB

          • memory/1972-157-0x0000000000400000-0x0000000000767000-memory.dmp

            Filesize

            3.4MB

          • memory/1972-146-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

            Filesize

            1.0MB

          • memory/1972-143-0x0000000000400000-0x0000000000767000-memory.dmp

            Filesize

            3.4MB

          • memory/1972-141-0x0000000000934000-0x0000000000962000-memory.dmp

            Filesize

            184KB

          • memory/1972-142-0x0000000000A10000-0x0000000000A5B000-memory.dmp

            Filesize

            300KB

          • memory/3108-174-0x00000000009D0000-0x00000000009DA000-memory.dmp

            Filesize

            40KB

          • memory/3108-175-0x00007FFAE2910000-0x00007FFAE33D1000-memory.dmp

            Filesize

            10.8MB

          • memory/3108-176-0x00007FFAE2910000-0x00007FFAE33D1000-memory.dmp

            Filesize

            10.8MB

          • memory/3816-162-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/5068-170-0x0000000000800000-0x0000000000832000-memory.dmp

            Filesize

            200KB