Resubmissions

29-10-2024 12:18

241029-pgkf6awpan 10

16-02-2023 10:35

230216-mmtwnshb57 10

Analysis

  • max time kernel
    62s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2023 10:35

General

  • Target

    17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a.exe

  • Size

    1001KB

  • MD5

    39742638fabeb3020be7ec5c9892dd9d

  • SHA1

    3fec0db807df472b3e8518464a9aec7e8fa603fb

  • SHA256

    17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a

  • SHA512

    82f48aa9a7ace708b9d18ede40f36083bc74ab2be70f5bed2770609c62ef34ba5634b043b980c57d95750991be24a10454b99134e9e379307765daffefc7b3f6

  • SSDEEP

    24576:OyOTmUxmLGILy6+yhCklNjk+Bn1w8aKWaTRjw:dOTmUx9cy6VkkbjhOvW

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

nock

C2

176.113.115.17:4132

Attributes
  • auth_value

    f32d3c6ff0a9a7632c60a2b045a9cde6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a.exe
    "C:\Users\Admin\AppData\Local\Temp\17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5116
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3140
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:396
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 1064
              6⤵
              • Program crash
              PID:3044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGu11Yc.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGu11Yc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 1348
          4⤵
          • Program crash
          PID:3340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pnb06Ah.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pnb06Ah.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 396 -ip 396
    1⤵
      PID:616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3476 -ip 3476
      1⤵
        PID:4728

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe

        Filesize

        856KB

        MD5

        f9dc829803856d6d7a8474aad32dd9b5

        SHA1

        6a390ba1369911cce72e939821289eae5c5c7b01

        SHA256

        9030053d0292a8f235f8b387e0c9ec1ccae5e21492c8c567c4d07888b69a2a9e

        SHA512

        51379874f016d933015bb25f7a28b556a79331e883c37dc37bff39da1b41157aeb598e3d5016327c9c10383cd29139808326be7d852702a032c98f2710913633

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe

        Filesize

        856KB

        MD5

        f9dc829803856d6d7a8474aad32dd9b5

        SHA1

        6a390ba1369911cce72e939821289eae5c5c7b01

        SHA256

        9030053d0292a8f235f8b387e0c9ec1ccae5e21492c8c567c4d07888b69a2a9e

        SHA512

        51379874f016d933015bb25f7a28b556a79331e883c37dc37bff39da1b41157aeb598e3d5016327c9c10383cd29139808326be7d852702a032c98f2710913633

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pnb06Ah.exe

        Filesize

        175KB

        MD5

        8f2223375414f5a6708a342a1efb714e

        SHA1

        b9342d91cef91c550ec054e4ef8ad8a8785f06a0

        SHA256

        38a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e

        SHA512

        1af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pnb06Ah.exe

        Filesize

        175KB

        MD5

        8f2223375414f5a6708a342a1efb714e

        SHA1

        b9342d91cef91c550ec054e4ef8ad8a8785f06a0

        SHA256

        38a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e

        SHA512

        1af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe

        Filesize

        501KB

        MD5

        de872b15338d5fab4fadd1988d99df7c

        SHA1

        e966fae9e7cee76be7161627299882c61c75a3f4

        SHA256

        ecbc5cad08d36f5f07d60cb48663e54a0bea8cb56bc1bc707e5d6e67b0c0915b

        SHA512

        c1aa69752fa7541b48c4eddac2208a7daa5f9aa58a7a957ed28586ca2a95cfcae6e6007c821df50df644f115a26c7279e23c4729c7f9f972b41484e13bcb605a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe

        Filesize

        501KB

        MD5

        de872b15338d5fab4fadd1988d99df7c

        SHA1

        e966fae9e7cee76be7161627299882c61c75a3f4

        SHA256

        ecbc5cad08d36f5f07d60cb48663e54a0bea8cb56bc1bc707e5d6e67b0c0915b

        SHA512

        c1aa69752fa7541b48c4eddac2208a7daa5f9aa58a7a957ed28586ca2a95cfcae6e6007c821df50df644f115a26c7279e23c4729c7f9f972b41484e13bcb605a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGu11Yc.exe

        Filesize

        351KB

        MD5

        91ffdf1b0eaf9389a1b01216b858c74e

        SHA1

        986dace7f76bb4dbd655861ae0e4a4d3d3f328a5

        SHA256

        50b9d8908639522b0a775b489917af0c4964ce2f13b7a0c685c9e214e39f851a

        SHA512

        5b093f5c23481dc8f74109b994f532bdbdaf013f9e2ed921a624ccc009a7a08f67658d2597f45de3d7b876bbf7f4f52e6a92a675f7ea6a572670cb5ba9a78c6f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGu11Yc.exe

        Filesize

        351KB

        MD5

        91ffdf1b0eaf9389a1b01216b858c74e

        SHA1

        986dace7f76bb4dbd655861ae0e4a4d3d3f328a5

        SHA256

        50b9d8908639522b0a775b489917af0c4964ce2f13b7a0c685c9e214e39f851a

        SHA512

        5b093f5c23481dc8f74109b994f532bdbdaf013f9e2ed921a624ccc009a7a08f67658d2597f45de3d7b876bbf7f4f52e6a92a675f7ea6a572670cb5ba9a78c6f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe

        Filesize

        356KB

        MD5

        6800300a4dc511788b6980b9112c91fc

        SHA1

        52e82d6d034c9805d91656a3bc547dd48719f9c2

        SHA256

        a1840f132b113618f8e9e9838b26269a9ebe8ba7e832025a2b72ef68387c605e

        SHA512

        5d87e11b27fafe69b9fea06b7705b7dae8ffe45e3043e2c7dc7509a14ce4c1436c23e660c351fd605b73fe0275f53463989eed54bdc5198601de86d5670f6635

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe

        Filesize

        356KB

        MD5

        6800300a4dc511788b6980b9112c91fc

        SHA1

        52e82d6d034c9805d91656a3bc547dd48719f9c2

        SHA256

        a1840f132b113618f8e9e9838b26269a9ebe8ba7e832025a2b72ef68387c605e

        SHA512

        5d87e11b27fafe69b9fea06b7705b7dae8ffe45e3043e2c7dc7509a14ce4c1436c23e660c351fd605b73fe0275f53463989eed54bdc5198601de86d5670f6635

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe

        Filesize

        295KB

        MD5

        2338c84711b756237e614c3869cf6100

        SHA1

        6146eace912945070cb084fe3839c8d2dc27c403

        SHA256

        fbfd8bd7e7ff54ce43c209c34a9959ad1abe7325209756decc04e3d9a44ff87b

        SHA512

        24bd3e70fc0ac61f6fcc432de5e93ac38c66eb3fb0e9b09337acc526873dd42f779f2741761ffb1677936e8f219f3c3b683c9476d8ab604803795fc323c7bae6

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe

        Filesize

        295KB

        MD5

        2338c84711b756237e614c3869cf6100

        SHA1

        6146eace912945070cb084fe3839c8d2dc27c403

        SHA256

        fbfd8bd7e7ff54ce43c209c34a9959ad1abe7325209756decc04e3d9a44ff87b

        SHA512

        24bd3e70fc0ac61f6fcc432de5e93ac38c66eb3fb0e9b09337acc526873dd42f779f2741761ffb1677936e8f219f3c3b683c9476d8ab604803795fc323c7bae6

      • memory/396-150-0x0000000004AA0000-0x0000000005044000-memory.dmp

        Filesize

        5.6MB

      • memory/396-151-0x0000000000813000-0x0000000000833000-memory.dmp

        Filesize

        128KB

      • memory/396-153-0x0000000000400000-0x000000000057B000-memory.dmp

        Filesize

        1.5MB

      • memory/396-152-0x00000000007C0000-0x00000000007ED000-memory.dmp

        Filesize

        180KB

      • memory/396-154-0x0000000000813000-0x0000000000833000-memory.dmp

        Filesize

        128KB

      • memory/396-155-0x0000000000400000-0x000000000057B000-memory.dmp

        Filesize

        1.5MB

      • memory/2436-168-0x00000000069B0000-0x0000000006B72000-memory.dmp

        Filesize

        1.8MB

      • memory/2436-169-0x00000000070B0000-0x00000000075DC000-memory.dmp

        Filesize

        5.2MB

      • memory/2436-159-0x00000000006F0000-0x0000000000722000-memory.dmp

        Filesize

        200KB

      • memory/2436-160-0x0000000005610000-0x0000000005C28000-memory.dmp

        Filesize

        6.1MB

      • memory/2436-161-0x0000000005190000-0x000000000529A000-memory.dmp

        Filesize

        1.0MB

      • memory/2436-162-0x00000000050C0000-0x00000000050D2000-memory.dmp

        Filesize

        72KB

      • memory/2436-163-0x0000000005120000-0x000000000515C000-memory.dmp

        Filesize

        240KB

      • memory/2436-164-0x0000000005480000-0x0000000005512000-memory.dmp

        Filesize

        584KB

      • memory/2436-165-0x0000000005520000-0x0000000005586000-memory.dmp

        Filesize

        408KB

      • memory/2436-166-0x0000000006130000-0x00000000061A6000-memory.dmp

        Filesize

        472KB

      • memory/2436-167-0x0000000006790000-0x00000000067E0000-memory.dmp

        Filesize

        320KB

      • memory/3140-146-0x00007FFC3AA50000-0x00007FFC3B511000-memory.dmp

        Filesize

        10.8MB

      • memory/3140-145-0x00007FFC3AA50000-0x00007FFC3B511000-memory.dmp

        Filesize

        10.8MB

      • memory/3140-144-0x0000000000D60000-0x0000000000D6A000-memory.dmp

        Filesize

        40KB

      • memory/3476-174-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/3476-173-0x00000000007E3000-0x0000000000811000-memory.dmp

        Filesize

        184KB

      • memory/3476-175-0x0000000000400000-0x0000000000589000-memory.dmp

        Filesize

        1.5MB

      • memory/3476-176-0x00000000007E3000-0x0000000000811000-memory.dmp

        Filesize

        184KB

      • memory/3476-177-0x0000000000400000-0x0000000000589000-memory.dmp

        Filesize

        1.5MB

      • memory/3540-181-0x0000000000DE0000-0x0000000000E12000-memory.dmp

        Filesize

        200KB