Analysis

  • max time kernel
    61s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2023, 05:37

General

  • Target

    50df0dab93b85bea3825e327a75b39bc504bf9eebf4f31632d33035574f9bc1a.exe

  • Size

    556KB

  • MD5

    0864976d1f1031291b9d2ba886b98af7

  • SHA1

    d7646a7bf72e6e3326ec6eceaacd81ebfa94714d

  • SHA256

    50df0dab93b85bea3825e327a75b39bc504bf9eebf4f31632d33035574f9bc1a

  • SHA512

    8a190a90e192fcad833f83f196f912a5580c605727d54befc2aec35fd27b9f877f8039da2df2133d93a38b010d190d0f8f11b18c8cba352d606a16b98018fd53

  • SSDEEP

    12288:AMrsy90T8dlBPN+0CzypK1Gh7aidUN/pWcC:8ykIldN+NRG11UN/YT

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50df0dab93b85bea3825e327a75b39bc504bf9eebf4f31632d33035574f9bc1a.exe
    "C:\Users\Admin\AppData\Local\Temp\50df0dab93b85bea3825e327a75b39bc504bf9eebf4f31632d33035574f9bc1a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vew8259.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vew8259.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIS1371.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIS1371.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tnK74lZ.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tnK74lZ.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNU23rM.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNU23rM.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1576
        3⤵
        • Program crash
        PID:4992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4948 -ip 4948
    1⤵
      PID:1720

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNU23rM.exe

            Filesize

            353KB

            MD5

            94f5bbd7361fb45db933ad6822a44d6e

            SHA1

            ab1b9d0cb3048695c2bb652a6070b4f7e783bb5c

            SHA256

            91b28b1274413d5d47917d8e88616e6fa7bc9e7d05e707626126fb34e03e77ed

            SHA512

            967bba2af8862311bfed70346086e5643d35a8938811604168dd955ae2b258c7012da70479cd1c6a50a4ac18a1871ab8e7ffe7ede965f797c5841cd77905af97

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uNU23rM.exe

            Filesize

            353KB

            MD5

            94f5bbd7361fb45db933ad6822a44d6e

            SHA1

            ab1b9d0cb3048695c2bb652a6070b4f7e783bb5c

            SHA256

            91b28b1274413d5d47917d8e88616e6fa7bc9e7d05e707626126fb34e03e77ed

            SHA512

            967bba2af8862311bfed70346086e5643d35a8938811604168dd955ae2b258c7012da70479cd1c6a50a4ac18a1871ab8e7ffe7ede965f797c5841cd77905af97

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vew8259.exe

            Filesize

            202KB

            MD5

            59c13332116ca06ed1749d12c648f9ac

            SHA1

            742b8ec735d0a986bbb1cdb4962625570589c0d2

            SHA256

            6170de1ec648531a57350c8b8cb8776121f88eaf9fcab61c485c10b8a768dd60

            SHA512

            aed269303b8c0bc4156b94657eb1299bdf3dbfeb8ceab1abdbf0d5426b67a7615601108e4593518e224565cf6078df5a1bf827f52f87fb22ebde791e52f59d43

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vew8259.exe

            Filesize

            202KB

            MD5

            59c13332116ca06ed1749d12c648f9ac

            SHA1

            742b8ec735d0a986bbb1cdb4962625570589c0d2

            SHA256

            6170de1ec648531a57350c8b8cb8776121f88eaf9fcab61c485c10b8a768dd60

            SHA512

            aed269303b8c0bc4156b94657eb1299bdf3dbfeb8ceab1abdbf0d5426b67a7615601108e4593518e224565cf6078df5a1bf827f52f87fb22ebde791e52f59d43

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIS1371.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rIS1371.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tnK74lZ.exe

            Filesize

            175KB

            MD5

            dd0c9e110c68ce1fa5308979ef718f7b

            SHA1

            473deb8069f0841d47b74b7f414dacc6f96eca78

            SHA256

            dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

            SHA512

            29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tnK74lZ.exe

            Filesize

            175KB

            MD5

            dd0c9e110c68ce1fa5308979ef718f7b

            SHA1

            473deb8069f0841d47b74b7f414dacc6f96eca78

            SHA256

            dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

            SHA512

            29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

          • memory/2684-145-0x00000000053D0000-0x00000000059E8000-memory.dmp

            Filesize

            6.1MB

          • memory/2684-153-0x0000000006E20000-0x000000000734C000-memory.dmp

            Filesize

            5.2MB

          • memory/2684-154-0x0000000006970000-0x00000000069E6000-memory.dmp

            Filesize

            472KB

          • memory/2684-144-0x0000000000410000-0x0000000000442000-memory.dmp

            Filesize

            200KB

          • memory/2684-155-0x00000000069F0000-0x0000000006A40000-memory.dmp

            Filesize

            320KB

          • memory/2684-146-0x0000000004EC0000-0x0000000004FCA000-memory.dmp

            Filesize

            1.0MB

          • memory/2684-147-0x0000000004E00000-0x0000000004E12000-memory.dmp

            Filesize

            72KB

          • memory/2684-148-0x0000000004E60000-0x0000000004E9C000-memory.dmp

            Filesize

            240KB

          • memory/2684-149-0x0000000005FA0000-0x0000000006544000-memory.dmp

            Filesize

            5.6MB

          • memory/2684-150-0x00000000052B0000-0x0000000005342000-memory.dmp

            Filesize

            584KB

          • memory/2684-151-0x0000000005350000-0x00000000053B6000-memory.dmp

            Filesize

            408KB

          • memory/2684-152-0x0000000006720000-0x00000000068E2000-memory.dmp

            Filesize

            1.8MB

          • memory/4792-140-0x00007FFD37D30000-0x00007FFD387F1000-memory.dmp

            Filesize

            10.8MB

          • memory/4792-139-0x00007FFD37D30000-0x00007FFD387F1000-memory.dmp

            Filesize

            10.8MB

          • memory/4792-138-0x0000000000370000-0x000000000037A000-memory.dmp

            Filesize

            40KB

          • memory/4948-159-0x0000000000753000-0x0000000000781000-memory.dmp

            Filesize

            184KB

          • memory/4948-160-0x00000000006D0000-0x000000000071B000-memory.dmp

            Filesize

            300KB

          • memory/4948-161-0x0000000000400000-0x00000000005F2000-memory.dmp

            Filesize

            1.9MB

          • memory/4948-162-0x0000000000753000-0x0000000000781000-memory.dmp

            Filesize

            184KB

          • memory/4948-163-0x0000000000400000-0x00000000005F2000-memory.dmp

            Filesize

            1.9MB