Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2023, 23:00

General

  • Target

    c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe

  • Size

    546KB

  • MD5

    091186aa650f22c4eec511e7d3ab3d07

  • SHA1

    b512ff78f1c38e850131ee6fe159cad056f40bd5

  • SHA256

    c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5

  • SHA512

    95ff58e7b1541da087d2379e50e886f69791ae71e8c80af237d54910926eaf9f43820c3a5d66dbdf86f17756a4a7a72d6f5dec096b7d4c09dd22ff1716d435b6

  • SSDEEP

    12288:GMrKy90FlkG3KblfzQyzsZBpiJ5xpqziL:cyGufz5sZHo5xpqzk

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe
    "C:\Users\Admin\AppData\Local\Temp\c56e97783408253eeba6f0c46515008f8f7af4d1ea8b36baf8fb74b0784e77f5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRv9763sa.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRv9763sa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw43VI48UW47.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw43VI48UW47.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tLR31YC66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tLR31YC66.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 1352
          4⤵
          • Program crash
          PID:4896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usA65zW47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usA65zW47.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4044
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4620 -ip 4620
    1⤵
      PID:4100

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usA65zW47.exe

            Filesize

            176KB

            MD5

            b9048e960ccb89e58ae039ae84c426cb

            SHA1

            44284b61a210701b1adb984743046ac17e64e33e

            SHA256

            647f6af747635e2a0e98aa3d768a3e9a197a9bbd04a704c7ea8f0e57f57e7def

            SHA512

            ca5d33ce00fd7473bf0bd5eb1922a100daff90fe95539a70530c8035252a4d069b16e7a659c33959aa78a98926c1f6d676ccbd3e0129f88ee70c3d4fed0181a2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usA65zW47.exe

            Filesize

            176KB

            MD5

            b9048e960ccb89e58ae039ae84c426cb

            SHA1

            44284b61a210701b1adb984743046ac17e64e33e

            SHA256

            647f6af747635e2a0e98aa3d768a3e9a197a9bbd04a704c7ea8f0e57f57e7def

            SHA512

            ca5d33ce00fd7473bf0bd5eb1922a100daff90fe95539a70530c8035252a4d069b16e7a659c33959aa78a98926c1f6d676ccbd3e0129f88ee70c3d4fed0181a2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRv9763sa.exe

            Filesize

            401KB

            MD5

            638177005058639eef689854741015b2

            SHA1

            01489af16249091994ef1ebdacd5ddd3fb980f3e

            SHA256

            2a0399e4734d1390e2764711520d5c68f1e6e52d5c904b3e92de5dff2aa99085

            SHA512

            7703b673662c13a3220a602831db8dd5269076700bd825f2be3e47a37277b3424c8202765538c430ac698972566a6000e740436963d55b5f869f2e5ac0f1ef2b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRv9763sa.exe

            Filesize

            401KB

            MD5

            638177005058639eef689854741015b2

            SHA1

            01489af16249091994ef1ebdacd5ddd3fb980f3e

            SHA256

            2a0399e4734d1390e2764711520d5c68f1e6e52d5c904b3e92de5dff2aa99085

            SHA512

            7703b673662c13a3220a602831db8dd5269076700bd825f2be3e47a37277b3424c8202765538c430ac698972566a6000e740436963d55b5f869f2e5ac0f1ef2b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw43VI48UW47.exe

            Filesize

            15KB

            MD5

            6f91e5fa212b7819ec3944b2178f1313

            SHA1

            49ea3d1cfe00c25231ad9c47385476610907fd5c

            SHA256

            192189d8db8e948ebb9308a539bf636419f015f1624d4aeb162781e07c05559b

            SHA512

            b611776ed5d6bb28ceee191e4bb90a5433ad51a5f625478d63fd530b577ff685b8e55cfb6ca009b4f189c674492bbe329ae5c61b147c0300fe65d679fa0cdee1

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw43VI48UW47.exe

            Filesize

            15KB

            MD5

            6f91e5fa212b7819ec3944b2178f1313

            SHA1

            49ea3d1cfe00c25231ad9c47385476610907fd5c

            SHA256

            192189d8db8e948ebb9308a539bf636419f015f1624d4aeb162781e07c05559b

            SHA512

            b611776ed5d6bb28ceee191e4bb90a5433ad51a5f625478d63fd530b577ff685b8e55cfb6ca009b4f189c674492bbe329ae5c61b147c0300fe65d679fa0cdee1

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tLR31YC66.exe

            Filesize

            375KB

            MD5

            cd6966060f9f437f1933aba4b8703cca

            SHA1

            9f69f3f9317a4a6526c99074bb851bc4a1c30788

            SHA256

            24a0f1a482ffbadb53221d40b7669cfb6352b0ccffb786a595cfeb4d9805b9f0

            SHA512

            d7249fb6f039225e99d30293f69453c0c08a44bf12887d656d4e30fa896aaf51d31fab132ed6840ffe0f305f3ce8cf0be315835bf221745a7b4dac27640c1929

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tLR31YC66.exe

            Filesize

            375KB

            MD5

            cd6966060f9f437f1933aba4b8703cca

            SHA1

            9f69f3f9317a4a6526c99074bb851bc4a1c30788

            SHA256

            24a0f1a482ffbadb53221d40b7669cfb6352b0ccffb786a595cfeb4d9805b9f0

            SHA512

            d7249fb6f039225e99d30293f69453c0c08a44bf12887d656d4e30fa896aaf51d31fab132ed6840ffe0f305f3ce8cf0be315835bf221745a7b4dac27640c1929

          • memory/400-147-0x00000000006A0000-0x00000000006AA000-memory.dmp

            Filesize

            40KB

          • memory/4044-1085-0x00000000003D0000-0x0000000000402000-memory.dmp

            Filesize

            200KB

          • memory/4044-1086-0x0000000004C50000-0x0000000004C60000-memory.dmp

            Filesize

            64KB

          • memory/4620-187-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-201-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-155-0x0000000007350000-0x00000000078F4000-memory.dmp

            Filesize

            5.6MB

          • memory/4620-156-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-159-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-157-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-161-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-163-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-165-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-167-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-169-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-171-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-173-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-175-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-177-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-179-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-181-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-184-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-183-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-186-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-189-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-153-0x0000000002D80000-0x0000000002DCB000-memory.dmp

            Filesize

            300KB

          • memory/4620-191-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-193-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-195-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-197-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-199-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-154-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-203-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-205-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-207-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-209-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-211-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-213-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-215-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-217-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-219-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-221-0x0000000004D40000-0x0000000004D7E000-memory.dmp

            Filesize

            248KB

          • memory/4620-1064-0x0000000007910000-0x0000000007F28000-memory.dmp

            Filesize

            6.1MB

          • memory/4620-1065-0x0000000007FB0000-0x00000000080BA000-memory.dmp

            Filesize

            1.0MB

          • memory/4620-1066-0x00000000080F0000-0x0000000008102000-memory.dmp

            Filesize

            72KB

          • memory/4620-1067-0x0000000008110000-0x000000000814C000-memory.dmp

            Filesize

            240KB

          • memory/4620-1068-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-1069-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-1071-0x0000000008400000-0x0000000008492000-memory.dmp

            Filesize

            584KB

          • memory/4620-1072-0x00000000084A0000-0x0000000008506000-memory.dmp

            Filesize

            408KB

          • memory/4620-1073-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-1074-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB

          • memory/4620-1075-0x0000000008CC0000-0x0000000008D36000-memory.dmp

            Filesize

            472KB

          • memory/4620-1076-0x0000000008D50000-0x0000000008DA0000-memory.dmp

            Filesize

            320KB

          • memory/4620-1077-0x0000000008DE0000-0x0000000008FA2000-memory.dmp

            Filesize

            1.8MB

          • memory/4620-1078-0x0000000008FB0000-0x00000000094DC000-memory.dmp

            Filesize

            5.2MB

          • memory/4620-1079-0x0000000007340000-0x0000000007350000-memory.dmp

            Filesize

            64KB