Analysis

  • max time kernel
    90s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2023, 00:57

General

  • Target

    133366da4e309219b815783ff376bea6488581b54b1c71cfcd4a9e228496804d.exe

  • Size

    557KB

  • MD5

    d6a817dbf8e61ee54a02ad0f8813d891

  • SHA1

    6283a375ca053b488e86b3131b888ae80178ba34

  • SHA256

    133366da4e309219b815783ff376bea6488581b54b1c71cfcd4a9e228496804d

  • SHA512

    05255f2a2b6a0e133cb0c2b64bb8bd3d921ed0081443a429691df56d8ad15c23c51f6b9e3b5d78a54e9c73198dd7a28afde4af4bdb2844f78f9004001fd96668

  • SSDEEP

    12288:9Mr+y90s2p3A97rLqO74fLi48VfVfSpqw5/cdUE:fyep3AlrLLq85hSpqw5Uz

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\133366da4e309219b815783ff376bea6488581b54b1c71cfcd4a9e228496804d.exe
    "C:\Users\Admin\AppData\Local\Temp\133366da4e309219b815783ff376bea6488581b54b1c71cfcd4a9e228496804d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nJE07qJ99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nJE07qJ99.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMo91Ni.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMo91Ni.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ehz97lO.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ehz97lO.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 1352
          4⤵
          • Program crash
          PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fMu05lb.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fMu05lb.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1084 -ip 1084
    1⤵
      PID:2292

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fMu05lb.exe

            Filesize

            175KB

            MD5

            a5f5c5d6291c7ae9e1d1b7ed1e551490

            SHA1

            3d06413341893b838549939e15f8f1eec423d71a

            SHA256

            1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

            SHA512

            d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fMu05lb.exe

            Filesize

            175KB

            MD5

            a5f5c5d6291c7ae9e1d1b7ed1e551490

            SHA1

            3d06413341893b838549939e15f8f1eec423d71a

            SHA256

            1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

            SHA512

            d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nJE07qJ99.exe

            Filesize

            413KB

            MD5

            fe87efe19373fe67fd6db64ad0fd6612

            SHA1

            6b54f3461d0f92ac5ef87bbad88d1535b48bebe3

            SHA256

            c45dee8e89bf2b719cc1b3cc3a2c3a047a3ce187f32abba78e4276bdbee189bd

            SHA512

            3e782dbcd91336eca1fff4153f1476961151de8972c32b70ece5049c68d65aca16fbf17f2df53e07c54cdc7ce64cdd91632a7d0531666d538ff20e725bba9c30

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nJE07qJ99.exe

            Filesize

            413KB

            MD5

            fe87efe19373fe67fd6db64ad0fd6612

            SHA1

            6b54f3461d0f92ac5ef87bbad88d1535b48bebe3

            SHA256

            c45dee8e89bf2b719cc1b3cc3a2c3a047a3ce187f32abba78e4276bdbee189bd

            SHA512

            3e782dbcd91336eca1fff4153f1476961151de8972c32b70ece5049c68d65aca16fbf17f2df53e07c54cdc7ce64cdd91632a7d0531666d538ff20e725bba9c30

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMo91Ni.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dMo91Ni.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ehz97lO.exe

            Filesize

            352KB

            MD5

            63b0cb9489c4c25ac9807cc76289624a

            SHA1

            7d7f83d83cc126dfbc8e2beac9a305100088d39f

            SHA256

            add02f47b506d7832798a176511b05e9dd5e2d04f6105436b7d7a49907ad811c

            SHA512

            68a5d29184031690fb310b1b263d81f5b1039aa03d8d3d9b14e1d7fa93210bd472fccaf101575a2076ce20b5f13785009885208283c57276e99e428c9dea6261

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ehz97lO.exe

            Filesize

            352KB

            MD5

            63b0cb9489c4c25ac9807cc76289624a

            SHA1

            7d7f83d83cc126dfbc8e2beac9a305100088d39f

            SHA256

            add02f47b506d7832798a176511b05e9dd5e2d04f6105436b7d7a49907ad811c

            SHA512

            68a5d29184031690fb310b1b263d81f5b1039aa03d8d3d9b14e1d7fa93210bd472fccaf101575a2076ce20b5f13785009885208283c57276e99e428c9dea6261

          • memory/212-164-0x0000000000690000-0x00000000006C2000-memory.dmp

            Filesize

            200KB

          • memory/1084-156-0x0000000009B70000-0x0000000009BC0000-memory.dmp

            Filesize

            320KB

          • memory/1084-153-0x0000000005D80000-0x0000000005DE6000-memory.dmp

            Filesize

            408KB

          • memory/1084-144-0x0000000004D50000-0x00000000052F4000-memory.dmp

            Filesize

            5.6MB

          • memory/1084-145-0x0000000000873000-0x00000000008A1000-memory.dmp

            Filesize

            184KB

          • memory/1084-146-0x00000000007C0000-0x000000000080B000-memory.dmp

            Filesize

            300KB

          • memory/1084-147-0x0000000000400000-0x00000000005F2000-memory.dmp

            Filesize

            1.9MB

          • memory/1084-148-0x0000000005300000-0x0000000005918000-memory.dmp

            Filesize

            6.1MB

          • memory/1084-149-0x0000000005920000-0x0000000005A2A000-memory.dmp

            Filesize

            1.0MB

          • memory/1084-150-0x0000000004CE0000-0x0000000004CF2000-memory.dmp

            Filesize

            72KB

          • memory/1084-151-0x0000000004D00000-0x0000000004D3C000-memory.dmp

            Filesize

            240KB

          • memory/1084-152-0x0000000005CE0000-0x0000000005D72000-memory.dmp

            Filesize

            584KB

          • memory/1084-154-0x0000000000873000-0x00000000008A1000-memory.dmp

            Filesize

            184KB

          • memory/1084-155-0x00000000024D0000-0x0000000002546000-memory.dmp

            Filesize

            472KB

          • memory/1084-160-0x0000000000400000-0x00000000005F2000-memory.dmp

            Filesize

            1.9MB

          • memory/1084-157-0x0000000009BC0000-0x0000000009D82000-memory.dmp

            Filesize

            1.8MB

          • memory/1084-158-0x0000000009D90000-0x000000000A2BC000-memory.dmp

            Filesize

            5.2MB

          • memory/1084-159-0x0000000000873000-0x00000000008A1000-memory.dmp

            Filesize

            184KB

          • memory/1164-140-0x00007FFD3F160000-0x00007FFD3FC21000-memory.dmp

            Filesize

            10.8MB

          • memory/1164-139-0x00007FFD3F160000-0x00007FFD3FC21000-memory.dmp

            Filesize

            10.8MB

          • memory/1164-138-0x0000000000700000-0x000000000070A000-memory.dmp

            Filesize

            40KB