Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 19:23

General

  • Target

    a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe

  • Size

    853KB

  • MD5

    307691fb4fbf96a0d80ee30313dff552

  • SHA1

    2ac5780fa1c001c60f8f2ae3705fd1f42475b2d1

  • SHA256

    a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d

  • SHA512

    f42900a8988cfabe92d17ed550f4d2f6dcb36f78e1de44ec7a6d89f867de886b654e7112faceaf4120efaf90a4160d0e99f8cb8cd854f81092eb1453e184824e

  • SSDEEP

    24576:XyoAWVgLDkntsf5ELge5jsLNsZuH0Wh2B7HTY:iqSiCiLL5QpHHthY7H

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe
    "C:\Users\Admin\AppData\Local\Temp\a41133503bb354385a96e98ec3a88ffdc8ec8ee8e3ab88de00435531299e694d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJZ6173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJZ6173.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnR8449.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnR8449.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mAZ00Pi.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mAZ00Pi.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4940
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 1080
            5⤵
            • Program crash
            PID:3892
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ncD16OT.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ncD16OT.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGp99VA.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGp99VA.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4660
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 1788
          4⤵
          • Program crash
          PID:4652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzR15SC.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzR15SC.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4940 -ip 4940
    1⤵
      PID:4692
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4660 -ip 4660
      1⤵
        PID:800
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:2696

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJZ6173.exe

        Filesize

        708KB

        MD5

        3b2b78d5872793dfaea8b501aacf3416

        SHA1

        a22a9ab5590a64eedfc7e78ece84808850692f33

        SHA256

        5e8d86f8f5335c3f226560165587554d3056b48b11974735d068e2cafa5cf22e

        SHA512

        49b051455b276cd9195586ca2005066dfb57d113aebcf715a53a63cb658b6849b8d28fb19b8b0bbb2408823248ca50edd5e79ce105d817411be62055f731f065

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dJZ6173.exe

        Filesize

        708KB

        MD5

        3b2b78d5872793dfaea8b501aacf3416

        SHA1

        a22a9ab5590a64eedfc7e78ece84808850692f33

        SHA256

        5e8d86f8f5335c3f226560165587554d3056b48b11974735d068e2cafa5cf22e

        SHA512

        49b051455b276cd9195586ca2005066dfb57d113aebcf715a53a63cb658b6849b8d28fb19b8b0bbb2408823248ca50edd5e79ce105d817411be62055f731f065

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzR15SC.exe

        Filesize

        175KB

        MD5

        ce5ef6aac94fdb2af40da676f6cab58f

        SHA1

        c393f24b1550955a686ee39067f20813415af95f

        SHA256

        ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

        SHA512

        2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pzR15SC.exe

        Filesize

        175KB

        MD5

        ce5ef6aac94fdb2af40da676f6cab58f

        SHA1

        c393f24b1550955a686ee39067f20813415af95f

        SHA256

        ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

        SHA512

        2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnR8449.exe

        Filesize

        375KB

        MD5

        35e250c6db89b7501d3e033a92301b67

        SHA1

        2f7ff3fe611b7cb7d851280abd6d0abf8e8ed3cf

        SHA256

        9a7f516eba4542a8ea4c366922b936887d5675d2079d75e7f6f5156632fceef5

        SHA512

        2bebc64a8e5abb9071bc2a488a59e79e746650aef64680683fcfbef0b9fc00d7021398c20bb592d66475cd52f6c389a2b5b63af230d6212d90e6974c03e794fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dnR8449.exe

        Filesize

        375KB

        MD5

        35e250c6db89b7501d3e033a92301b67

        SHA1

        2f7ff3fe611b7cb7d851280abd6d0abf8e8ed3cf

        SHA256

        9a7f516eba4542a8ea4c366922b936887d5675d2079d75e7f6f5156632fceef5

        SHA512

        2bebc64a8e5abb9071bc2a488a59e79e746650aef64680683fcfbef0b9fc00d7021398c20bb592d66475cd52f6c389a2b5b63af230d6212d90e6974c03e794fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGp99VA.exe

        Filesize

        299KB

        MD5

        2e21d812c7c00c3c91b1d632595fa0b3

        SHA1

        6ddc68edd4fea9376e8ce3988eb6506d52122402

        SHA256

        dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345

        SHA512

        27ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGp99VA.exe

        Filesize

        299KB

        MD5

        2e21d812c7c00c3c91b1d632595fa0b3

        SHA1

        6ddc68edd4fea9376e8ce3988eb6506d52122402

        SHA256

        dc31e785818a0e46f2342cc27a724276607d6115382ecbee8fa0530a534e6345

        SHA512

        27ad851dcb623165ef3c7af2aa8d226c40c3f89de188b0c284e1f69d305ea555f31dab4c07cfb994fd78f92f5906e147de478307e7995e822962aee9f426b706

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mAZ00Pi.exe

        Filesize

        241KB

        MD5

        f2bcb17a128cbfa928ca290d240f9601

        SHA1

        487e8bd83d6aa5a8633562ff09254ae922f158f6

        SHA256

        986bc0236c044a0f4a4e94f3232e1d7d34ce488c289639e059456fb80184b2e6

        SHA512

        4ee4abb1b4c7d4c23e9e40d9ab857b72fbf36f5688bcbb5a4b674620843a0f3f5fed178405f2ac587f9e2a56c91cb1b0d584ff876c5e5639f91fb42b76b1e923

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mAZ00Pi.exe

        Filesize

        241KB

        MD5

        f2bcb17a128cbfa928ca290d240f9601

        SHA1

        487e8bd83d6aa5a8633562ff09254ae922f158f6

        SHA256

        986bc0236c044a0f4a4e94f3232e1d7d34ce488c289639e059456fb80184b2e6

        SHA512

        4ee4abb1b4c7d4c23e9e40d9ab857b72fbf36f5688bcbb5a4b674620843a0f3f5fed178405f2ac587f9e2a56c91cb1b0d584ff876c5e5639f91fb42b76b1e923

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ncD16OT.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ncD16OT.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • memory/1584-159-0x0000000006220000-0x0000000006270000-memory.dmp

        Filesize

        320KB

      • memory/1584-154-0x0000000005130000-0x0000000005142000-memory.dmp

        Filesize

        72KB

      • memory/1584-161-0x00000000071F0000-0x000000000771C000-memory.dmp

        Filesize

        5.2MB

      • memory/1584-160-0x0000000006AF0000-0x0000000006CB2000-memory.dmp

        Filesize

        1.8MB

      • memory/1584-158-0x00000000061A0000-0x0000000006216000-memory.dmp

        Filesize

        472KB

      • memory/1584-157-0x0000000005D30000-0x0000000005D96000-memory.dmp

        Filesize

        408KB

      • memory/1584-152-0x00000000056A0000-0x0000000005CB8000-memory.dmp

        Filesize

        6.1MB

      • memory/1584-156-0x00000000054D0000-0x0000000005562000-memory.dmp

        Filesize

        584KB

      • memory/1584-153-0x0000000005200000-0x000000000530A000-memory.dmp

        Filesize

        1.0MB

      • memory/1584-151-0x0000000000760000-0x0000000000792000-memory.dmp

        Filesize

        200KB

      • memory/1584-155-0x0000000005310000-0x000000000534C000-memory.dmp

        Filesize

        240KB

      • memory/2320-173-0x0000000000CA0000-0x0000000000CD2000-memory.dmp

        Filesize

        200KB

      • memory/4660-169-0x0000000000400000-0x000000000057D000-memory.dmp

        Filesize

        1.5MB

      • memory/4660-168-0x0000000000650000-0x000000000067F000-memory.dmp

        Filesize

        188KB

      • memory/4660-167-0x0000000000400000-0x000000000057D000-memory.dmp

        Filesize

        1.5MB

      • memory/4660-166-0x00000000020D0000-0x000000000211B000-memory.dmp

        Filesize

        300KB

      • memory/4660-165-0x0000000000650000-0x000000000067F000-memory.dmp

        Filesize

        188KB

      • memory/4940-144-0x0000000000400000-0x000000000056E000-memory.dmp

        Filesize

        1.4MB

      • memory/4940-145-0x0000000000611000-0x0000000000631000-memory.dmp

        Filesize

        128KB

      • memory/4940-146-0x0000000000611000-0x0000000000631000-memory.dmp

        Filesize

        128KB

      • memory/4940-147-0x0000000000400000-0x000000000056E000-memory.dmp

        Filesize

        1.4MB

      • memory/4940-143-0x00000000005B0000-0x00000000005DD000-memory.dmp

        Filesize

        180KB

      • memory/4940-142-0x0000000000611000-0x0000000000631000-memory.dmp

        Filesize

        128KB

      • memory/4940-141-0x0000000004C90000-0x0000000005234000-memory.dmp

        Filesize

        5.6MB