Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2023 18:57

General

  • Target

    b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe

  • Size

    855KB

  • MD5

    c0f1be41ef253acfe0c45555261ec0b6

  • SHA1

    1bab831ebe65c65c38bc35d1dd2da825de50a4e2

  • SHA256

    b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87

  • SHA512

    6ffc51d37675c90160abca9a4084a8fd4189b442b92612d75785512ea5ddccefbbdcfff8c54fb5e72a1873b8b1506839a73cfe401f04a5d4145efc050a3659ef

  • SSDEEP

    12288:aMr2y90qJ0sgCwHiWHrOb5tP2XR1gk9SGG4S8W6nPu7tqSQOwU4EnVKhR3S:Uyf01lCQrgvPkjZSF6nPUqzOSEnVKW

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe
    "C:\Users\Admin\AppData\Local\Temp\b915dc1a0c1978fc6f5fa76a30a22a475d9c546b4f29cabbc0db8c6a86e94f87.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFR6602.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFR6602.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vhq5962.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vhq5962.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roN3912.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roN3912.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szp6192.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szp6192.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5044
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1040
            5⤵
            • Program crash
            PID:2812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tts32Gb.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tts32Gb.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwe98At.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwe98At.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1340
        3⤵
        • Program crash
        PID:1904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5044 -ip 5044
    1⤵
      PID:4488
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2604 -ip 2604
      1⤵
        PID:2736

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwe98At.exe

        Filesize

        352KB

        MD5

        1f4fa5e9d77b2414bc8e643866ef39db

        SHA1

        d3baa3f3a3d3e1988d5c6192f3754c333c3ec091

        SHA256

        6677b0604339c9e81fa0abf5616b712be3e7c64e590dae250368afb1ce7858bf

        SHA512

        66c48871608885176a2c533889f931265a55202cbb0d6240b662632b308fd87c478d2deff3c743ee92ef5d36e0219bf16bb580a099d9790b3748093d6dea2d61

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwe98At.exe

        Filesize

        352KB

        MD5

        1f4fa5e9d77b2414bc8e643866ef39db

        SHA1

        d3baa3f3a3d3e1988d5c6192f3754c333c3ec091

        SHA256

        6677b0604339c9e81fa0abf5616b712be3e7c64e590dae250368afb1ce7858bf

        SHA512

        66c48871608885176a2c533889f931265a55202cbb0d6240b662632b308fd87c478d2deff3c743ee92ef5d36e0219bf16bb580a099d9790b3748093d6dea2d61

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFR6602.exe

        Filesize

        500KB

        MD5

        93316fa5e4451975c0a31eb86fe8349d

        SHA1

        1c6f8989da610abbfc023c1a8656f934285e41d6

        SHA256

        4f330d37cf07ae295997b2360c2eadf39861382d32f1774adad793cd3fe5d153

        SHA512

        9d88eda61527ceecfa1e1fb57a2a9b976ee9c0cf8a757fed806d7f1b1e6ec24f83f792dd45e215ea876feb697cbb748dad565833958747e255dc501ede955694

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFR6602.exe

        Filesize

        500KB

        MD5

        93316fa5e4451975c0a31eb86fe8349d

        SHA1

        1c6f8989da610abbfc023c1a8656f934285e41d6

        SHA256

        4f330d37cf07ae295997b2360c2eadf39861382d32f1774adad793cd3fe5d153

        SHA512

        9d88eda61527ceecfa1e1fb57a2a9b976ee9c0cf8a757fed806d7f1b1e6ec24f83f792dd45e215ea876feb697cbb748dad565833958747e255dc501ede955694

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tts32Gb.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tts32Gb.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vhq5962.exe

        Filesize

        355KB

        MD5

        c5514a649e7f1f1cfe11bfe4bfd3de59

        SHA1

        30694d9ecf2b133ec118dcc11db7699c27b3c2e6

        SHA256

        3c53974d7b2b762514847688a868dcc9bc27394a1fa1a3e92cbe1cb785927782

        SHA512

        744b843e9db41f19a7eb5ffde9cf93dfb456fe3033a9e4ca4f9703428c7ec75108004916c094a081eee5bd12ba5d6d7ff1107981ed3691396a082a8b55388d0c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vhq5962.exe

        Filesize

        355KB

        MD5

        c5514a649e7f1f1cfe11bfe4bfd3de59

        SHA1

        30694d9ecf2b133ec118dcc11db7699c27b3c2e6

        SHA256

        3c53974d7b2b762514847688a868dcc9bc27394a1fa1a3e92cbe1cb785927782

        SHA512

        744b843e9db41f19a7eb5ffde9cf93dfb456fe3033a9e4ca4f9703428c7ec75108004916c094a081eee5bd12ba5d6d7ff1107981ed3691396a082a8b55388d0c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roN3912.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\roN3912.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szp6192.exe

        Filesize

        294KB

        MD5

        e756f652b55d5cdea64c99e99dd2944b

        SHA1

        4b029d66a9191401600ce49ee339978e51655c4d

        SHA256

        43e64e06e9b8d9beef5843448023d8741fc39f96ac82dabf28d5daa2a4ec74a8

        SHA512

        9cae586c698a5b6061cc2b52e2cea9de7baaf266f24259c1833588c9448a416a59dd45921de2e17597ce8b03447c83f26ec83e3f4c2e23f7d53345856ca8c457

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\szp6192.exe

        Filesize

        294KB

        MD5

        e756f652b55d5cdea64c99e99dd2944b

        SHA1

        4b029d66a9191401600ce49ee339978e51655c4d

        SHA256

        43e64e06e9b8d9beef5843448023d8741fc39f96ac82dabf28d5daa2a4ec74a8

        SHA512

        9cae586c698a5b6061cc2b52e2cea9de7baaf266f24259c1833588c9448a416a59dd45921de2e17597ce8b03447c83f26ec83e3f4c2e23f7d53345856ca8c457

      • memory/2008-165-0x0000000006FA0000-0x00000000074CC000-memory.dmp

        Filesize

        5.2MB

      • memory/2008-166-0x0000000006760000-0x00000000067D6000-memory.dmp

        Filesize

        472KB

      • memory/2008-167-0x00000000067E0000-0x0000000006830000-memory.dmp

        Filesize

        320KB

      • memory/2008-164-0x00000000068A0000-0x0000000006A62000-memory.dmp

        Filesize

        1.8MB

      • memory/2008-163-0x00000000054D0000-0x0000000005536000-memory.dmp

        Filesize

        408KB

      • memory/2008-162-0x0000000005390000-0x0000000005422000-memory.dmp

        Filesize

        584KB

      • memory/2008-161-0x0000000005070000-0x00000000050AC000-memory.dmp

        Filesize

        240KB

      • memory/2008-160-0x0000000004FF0000-0x0000000005002000-memory.dmp

        Filesize

        72KB

      • memory/2008-159-0x00000000050C0000-0x00000000051CA000-memory.dmp

        Filesize

        1.0MB

      • memory/2008-158-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/2008-157-0x0000000000620000-0x0000000000652000-memory.dmp

        Filesize

        200KB

      • memory/2604-175-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/2604-174-0x00000000006C4000-0x00000000006F2000-memory.dmp

        Filesize

        184KB

      • memory/2604-173-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/2604-172-0x0000000002210000-0x000000000225B000-memory.dmp

        Filesize

        300KB

      • memory/2604-171-0x00000000006C4000-0x00000000006F2000-memory.dmp

        Filesize

        184KB

      • memory/2648-143-0x00007FFB24D10000-0x00007FFB257D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2648-142-0x00007FFB24D10000-0x00007FFB257D1000-memory.dmp

        Filesize

        10.8MB

      • memory/2648-141-0x0000000000570000-0x000000000057A000-memory.dmp

        Filesize

        40KB

      • memory/5044-149-0x0000000000400000-0x00000000005C6000-memory.dmp

        Filesize

        1.8MB

      • memory/5044-148-0x0000000002200000-0x000000000222D000-memory.dmp

        Filesize

        180KB

      • memory/5044-150-0x0000000004C70000-0x0000000005214000-memory.dmp

        Filesize

        5.6MB

      • memory/5044-151-0x0000000000604000-0x0000000000624000-memory.dmp

        Filesize

        128KB

      • memory/5044-152-0x0000000000604000-0x0000000000624000-memory.dmp

        Filesize

        128KB

      • memory/5044-153-0x0000000000400000-0x00000000005C6000-memory.dmp

        Filesize

        1.8MB

      • memory/5044-147-0x0000000000604000-0x0000000000624000-memory.dmp

        Filesize

        128KB