Analysis

  • max time kernel
    61s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2023 01:49

General

  • Target

    226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77.exe

  • Size

    809KB

  • MD5

    8cfc23acc4b7244de4787364ea539a8b

  • SHA1

    80b06e9196e4a70ec69b4dc49b42b805bcef3144

  • SHA256

    226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77

  • SHA512

    8be27c6b49b94fe588c43f2ff0b00d9a29a7bd7224c24a2591af98cf5e1df091caaf0605d9f2f1471f1b228272a5c9647d3b1ac60b0c916edc7864d228dd745c

  • SSDEEP

    24576:DymAvW/b1LCDCY7QDGAGEjcJGuvflKOOMG1:WpvsbpdftjKG8fHP

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77.exe
    "C:\Users\Admin\AppData\Local\Temp\226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vzV6999.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vzV6999.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vWb5622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vWb5622.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4312
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rvQ8467.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rvQ8467.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sko9405.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sko9405.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1204
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 1080
            5⤵
            • Program crash
            PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVL06kH.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVL06kH.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNQ49RY.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNQ49RY.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3856
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 1336
        3⤵
        • Program crash
        PID:4280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1204 -ip 1204
    1⤵
      PID:1384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3856 -ip 3856
      1⤵
        PID:3128

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNQ49RY.exe

        Filesize

        293KB

        MD5

        9d2ece9bae37548f0be58d711f977647

        SHA1

        db356b94934548dc49d0d3027cf361186e723283

        SHA256

        f694dfbcdf1d702da1ac259657feee06e660643ac3b2618afb6623eb7a548303

        SHA512

        8bc59b70201014220ae17810f455e70cd942acd26f152529d02e29e2476a90fd6d6153815ddf2775d0036e0ceadde36b959823aecb29f2b1b23bf2d384e2bdf3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNQ49RY.exe

        Filesize

        293KB

        MD5

        9d2ece9bae37548f0be58d711f977647

        SHA1

        db356b94934548dc49d0d3027cf361186e723283

        SHA256

        f694dfbcdf1d702da1ac259657feee06e660643ac3b2618afb6623eb7a548303

        SHA512

        8bc59b70201014220ae17810f455e70cd942acd26f152529d02e29e2476a90fd6d6153815ddf2775d0036e0ceadde36b959823aecb29f2b1b23bf2d384e2bdf3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vzV6999.exe

        Filesize

        478KB

        MD5

        1a767e2b8134eb8fd13053db34b0e6d0

        SHA1

        20a152700c843ff6227ccf14b8ee3ef99f1f615d

        SHA256

        c3375e5c615bd91261d2abef12e51309c471d6e80f195b958d517141b3d95a47

        SHA512

        de42ae0bfb0afd3d4f0a63dae6349b2f11eac4919541e11de0ccfee4390547509d79a4644130839c2ccf6884a1dee6794a4757845eb33ddfe7fc90f1aab79b2a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vzV6999.exe

        Filesize

        478KB

        MD5

        1a767e2b8134eb8fd13053db34b0e6d0

        SHA1

        20a152700c843ff6227ccf14b8ee3ef99f1f615d

        SHA256

        c3375e5c615bd91261d2abef12e51309c471d6e80f195b958d517141b3d95a47

        SHA512

        de42ae0bfb0afd3d4f0a63dae6349b2f11eac4919541e11de0ccfee4390547509d79a4644130839c2ccf6884a1dee6794a4757845eb33ddfe7fc90f1aab79b2a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVL06kH.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVL06kH.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vWb5622.exe

        Filesize

        333KB

        MD5

        c74cde5db229624dc5f85cd9737a6511

        SHA1

        47851d28d9f399409ae5f2b60dfc611023092698

        SHA256

        1d044ff4723959027c3ef5a0ed47e6144eeb6008760e70ba83d39a19f5f7cb8b

        SHA512

        373c91664bc127fe429c54f0b2d0620cb3a660ad0de08640973fafd191d442ebcf9da448294c3c6dc74c98d27223962f666a29e21c98332a41dc2b731051c2c2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vWb5622.exe

        Filesize

        333KB

        MD5

        c74cde5db229624dc5f85cd9737a6511

        SHA1

        47851d28d9f399409ae5f2b60dfc611023092698

        SHA256

        1d044ff4723959027c3ef5a0ed47e6144eeb6008760e70ba83d39a19f5f7cb8b

        SHA512

        373c91664bc127fe429c54f0b2d0620cb3a660ad0de08640973fafd191d442ebcf9da448294c3c6dc74c98d27223962f666a29e21c98332a41dc2b731051c2c2

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rvQ8467.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rvQ8467.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sko9405.exe

        Filesize

        235KB

        MD5

        a83f871ff3ff4702c68b94e0ba9ed0da

        SHA1

        6a7ceb6521559ec069e0067036d6d2de3a8294b4

        SHA256

        a7804907253a51461b3a23f3f54f59060707f4672c38f9b09d9cbb16b00e8fe8

        SHA512

        91d7e6c48afc6f334338aff3f0253f4593c03ab3d2657aa659fc67fb6288113e97211a89f58dd1c7906f662af14ca9dcd2d76c205ba5c121baf4e21fecfc8f6f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sko9405.exe

        Filesize

        235KB

        MD5

        a83f871ff3ff4702c68b94e0ba9ed0da

        SHA1

        6a7ceb6521559ec069e0067036d6d2de3a8294b4

        SHA256

        a7804907253a51461b3a23f3f54f59060707f4672c38f9b09d9cbb16b00e8fe8

        SHA512

        91d7e6c48afc6f334338aff3f0253f4593c03ab3d2657aa659fc67fb6288113e97211a89f58dd1c7906f662af14ca9dcd2d76c205ba5c121baf4e21fecfc8f6f

      • memory/1204-151-0x0000000000AF3000-0x0000000000B13000-memory.dmp

        Filesize

        128KB

      • memory/1204-152-0x0000000000400000-0x0000000000759000-memory.dmp

        Filesize

        3.3MB

      • memory/1204-144-0x0000000000000000-mapping.dmp

      • memory/1204-147-0x0000000004ED0000-0x0000000005474000-memory.dmp

        Filesize

        5.6MB

      • memory/1204-148-0x0000000000AF3000-0x0000000000B13000-memory.dmp

        Filesize

        128KB

      • memory/1204-149-0x00000000008B0000-0x00000000008DD000-memory.dmp

        Filesize

        180KB

      • memory/1204-150-0x0000000000400000-0x0000000000759000-memory.dmp

        Filesize

        3.3MB

      • memory/2128-165-0x0000000007BD0000-0x0000000007D92000-memory.dmp

        Filesize

        1.8MB

      • memory/2128-164-0x00000000078B0000-0x0000000007900000-memory.dmp

        Filesize

        320KB

      • memory/2128-166-0x00000000082D0000-0x00000000087FC000-memory.dmp

        Filesize

        5.2MB

      • memory/2128-156-0x00000000006E0000-0x0000000000712000-memory.dmp

        Filesize

        200KB

      • memory/2128-163-0x0000000007830000-0x00000000078A6000-memory.dmp

        Filesize

        472KB

      • memory/2128-153-0x0000000000000000-mapping.dmp

      • memory/2128-157-0x00000000054C0000-0x0000000005AD8000-memory.dmp

        Filesize

        6.1MB

      • memory/2128-158-0x0000000005040000-0x000000000514A000-memory.dmp

        Filesize

        1.0MB

      • memory/2128-159-0x0000000004F80000-0x0000000004F92000-memory.dmp

        Filesize

        72KB

      • memory/2128-160-0x0000000004FE0000-0x000000000501C000-memory.dmp

        Filesize

        240KB

      • memory/2128-161-0x0000000005AE0000-0x0000000005B72000-memory.dmp

        Filesize

        584KB

      • memory/2128-162-0x0000000005420000-0x0000000005486000-memory.dmp

        Filesize

        408KB

      • memory/3684-132-0x0000000000000000-mapping.dmp

      • memory/3856-171-0x0000000000900000-0x000000000094B000-memory.dmp

        Filesize

        300KB

      • memory/3856-167-0x0000000000000000-mapping.dmp

      • memory/3856-170-0x00000000009E3000-0x0000000000A11000-memory.dmp

        Filesize

        184KB

      • memory/3856-172-0x0000000000400000-0x0000000000767000-memory.dmp

        Filesize

        3.4MB

      • memory/3856-173-0x00000000009E3000-0x0000000000A11000-memory.dmp

        Filesize

        184KB

      • memory/3856-174-0x00000000009E3000-0x0000000000A11000-memory.dmp

        Filesize

        184KB

      • memory/3856-175-0x0000000000400000-0x0000000000767000-memory.dmp

        Filesize

        3.4MB

      • memory/4232-138-0x0000000000000000-mapping.dmp

      • memory/4232-142-0x00007FFCFF2D0000-0x00007FFCFFD91000-memory.dmp

        Filesize

        10.8MB

      • memory/4232-143-0x00007FFCFF2D0000-0x00007FFCFFD91000-memory.dmp

        Filesize

        10.8MB

      • memory/4232-141-0x0000000000F90000-0x0000000000F9A000-memory.dmp

        Filesize

        40KB

      • memory/4312-135-0x0000000000000000-mapping.dmp