Analysis

  • max time kernel
    106s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2023 00:25

General

  • Target

    77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe

  • Size

    701KB

  • MD5

    bfc20875ffe2530e5c8e4f56ecc7cb3d

  • SHA1

    2ec991cd1c5ecb5836967927fa11271e21774611

  • SHA256

    77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7

  • SHA512

    a3cceaf968a73342307b7da8a81584e64fae6c2ac72d9c460c667fce6ab54ebe6c546f680923edeed306c9fe205f19c2ed27bbc657817cb6787d6c7a08003104

  • SSDEEP

    12288:1MrNy90LkdvZ3o4yVTWhulzPMFrc1x/iSrdSvn9AgI35oa9fTYS8P:cyYkLoDFj2FrWieuymyTiP

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

nock

C2

176.113.115.17:4132

Attributes
  • auth_value

    f32d3c6ff0a9a7632c60a2b045a9cde6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe
    "C:\Users\Admin\AppData\Local\Temp\77cfdfc330a73a21a2e24498a7b44aa69597f4ef45ca470e68e654108acc2ff7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnv4202.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnv4202.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDY6089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDY6089.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4368
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOj15Hj.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOj15Hj.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nBp84XC.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nBp84XC.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGB68hK.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGB68hK.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 1352
          4⤵
          • Program crash
          PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pwA78Kd.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pwA78Kd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3604
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2708 -ip 2708
    1⤵
      PID:3708

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnv4202.exe

      Filesize

      556KB

      MD5

      4d82515238532fe83c781ef4031b3509

      SHA1

      dcb2e81e9227893de67bb851e5b8de172ac1549b

      SHA256

      8d8ff9580282d4ab6a7a00cef5f1309cd012671b88eea4d40b1a54778f2e1a15

      SHA512

      680b4c6867f48c363f8cdf81c5bfecf41fea1ffbf779d57083bf8e1b3ec9747b21bfc502fdfb6695d34e4991077f20fa51219f04cd8c439403601ebae21024ef

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dnv4202.exe

      Filesize

      556KB

      MD5

      4d82515238532fe83c781ef4031b3509

      SHA1

      dcb2e81e9227893de67bb851e5b8de172ac1549b

      SHA256

      8d8ff9580282d4ab6a7a00cef5f1309cd012671b88eea4d40b1a54778f2e1a15

      SHA512

      680b4c6867f48c363f8cdf81c5bfecf41fea1ffbf779d57083bf8e1b3ec9747b21bfc502fdfb6695d34e4991077f20fa51219f04cd8c439403601ebae21024ef

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pwA78Kd.exe

      Filesize

      175KB

      MD5

      8f2223375414f5a6708a342a1efb714e

      SHA1

      b9342d91cef91c550ec054e4ef8ad8a8785f06a0

      SHA256

      38a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e

      SHA512

      1af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pwA78Kd.exe

      Filesize

      175KB

      MD5

      8f2223375414f5a6708a342a1efb714e

      SHA1

      b9342d91cef91c550ec054e4ef8ad8a8785f06a0

      SHA256

      38a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e

      SHA512

      1af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDY6089.exe

      Filesize

      202KB

      MD5

      1debbf9d3c9e7da1571a169541607a66

      SHA1

      4df2365843dbd2b22cf09f6109b31c9fab7906ed

      SHA256

      fb74c02ff113e5584a2c77eb511fc3ce07aa90e9edeb49d894224b55c09857bb

      SHA512

      b40eff793a8ff75887f7f15fee5622ca2b4edc0528ff557dd9283e93e39e73dd0295822c67243cc35466a148f5f9b3bf956f9df637ce68287930f038da5f8aeb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDY6089.exe

      Filesize

      202KB

      MD5

      1debbf9d3c9e7da1571a169541607a66

      SHA1

      4df2365843dbd2b22cf09f6109b31c9fab7906ed

      SHA256

      fb74c02ff113e5584a2c77eb511fc3ce07aa90e9edeb49d894224b55c09857bb

      SHA512

      b40eff793a8ff75887f7f15fee5622ca2b4edc0528ff557dd9283e93e39e73dd0295822c67243cc35466a148f5f9b3bf956f9df637ce68287930f038da5f8aeb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGB68hK.exe

      Filesize

      352KB

      MD5

      6246fa8e2a0bf5c5ec6e8d171a6a14c8

      SHA1

      ef73e775020044458242bdc2350acdadb62aaff2

      SHA256

      77f8f1fbb3492807055191ffad8c8f94eed7a7865d983788c43a2e399fc7c0d8

      SHA512

      700f14073e301b560cb252df10589cb07349cae6f962714668a59ded5b0d6b8769c478fe730a05cbdf5ade644e8b4a38c107645e16ebaa1e8d401703f1b6180b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oGB68hK.exe

      Filesize

      352KB

      MD5

      6246fa8e2a0bf5c5ec6e8d171a6a14c8

      SHA1

      ef73e775020044458242bdc2350acdadb62aaff2

      SHA256

      77f8f1fbb3492807055191ffad8c8f94eed7a7865d983788c43a2e399fc7c0d8

      SHA512

      700f14073e301b560cb252df10589cb07349cae6f962714668a59ded5b0d6b8769c478fe730a05cbdf5ade644e8b4a38c107645e16ebaa1e8d401703f1b6180b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOj15Hj.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kOj15Hj.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nBp84XC.exe

      Filesize

      175KB

      MD5

      dd0c9e110c68ce1fa5308979ef718f7b

      SHA1

      473deb8069f0841d47b74b7f414dacc6f96eca78

      SHA256

      dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

      SHA512

      29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nBp84XC.exe

      Filesize

      175KB

      MD5

      dd0c9e110c68ce1fa5308979ef718f7b

      SHA1

      473deb8069f0841d47b74b7f414dacc6f96eca78

      SHA256

      dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

      SHA512

      29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

    • memory/1992-150-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/1992-158-0x0000000007060000-0x000000000758C000-memory.dmp

      Filesize

      5.2MB

    • memory/1992-147-0x0000000000530000-0x0000000000562000-memory.dmp

      Filesize

      200KB

    • memory/1992-148-0x00000000053A0000-0x00000000059B8000-memory.dmp

      Filesize

      6.1MB

    • memory/1992-149-0x0000000004E90000-0x0000000004F9A000-memory.dmp

      Filesize

      1.0MB

    • memory/1992-157-0x0000000006960000-0x0000000006B22000-memory.dmp

      Filesize

      1.8MB

    • memory/1992-151-0x0000000004E20000-0x0000000004E5C000-memory.dmp

      Filesize

      240KB

    • memory/1992-152-0x0000000005180000-0x00000000051E6000-memory.dmp

      Filesize

      408KB

    • memory/1992-153-0x0000000005D60000-0x0000000005DF2000-memory.dmp

      Filesize

      584KB

    • memory/1992-154-0x00000000063B0000-0x0000000006954000-memory.dmp

      Filesize

      5.6MB

    • memory/1992-155-0x0000000005E80000-0x0000000005EF6000-memory.dmp

      Filesize

      472KB

    • memory/1992-156-0x0000000005E00000-0x0000000005E50000-memory.dmp

      Filesize

      320KB

    • memory/2184-142-0x00007FFED9250000-0x00007FFED9D11000-memory.dmp

      Filesize

      10.8MB

    • memory/2184-141-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

      Filesize

      40KB

    • memory/2184-143-0x00007FFED9250000-0x00007FFED9D11000-memory.dmp

      Filesize

      10.8MB

    • memory/2708-164-0x0000000000400000-0x00000000005F2000-memory.dmp

      Filesize

      1.9MB

    • memory/2708-162-0x0000000000734000-0x0000000000762000-memory.dmp

      Filesize

      184KB

    • memory/2708-163-0x0000000002260000-0x00000000022AB000-memory.dmp

      Filesize

      300KB

    • memory/2708-165-0x0000000000734000-0x0000000000762000-memory.dmp

      Filesize

      184KB

    • memory/2708-166-0x0000000000734000-0x0000000000762000-memory.dmp

      Filesize

      184KB

    • memory/2708-167-0x0000000000400000-0x00000000005F2000-memory.dmp

      Filesize

      1.9MB

    • memory/3604-171-0x00000000000C0000-0x00000000000F2000-memory.dmp

      Filesize

      200KB