Analysis

  • max time kernel
    83s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 08:04

General

  • Target

    99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe

  • Size

    536KB

  • MD5

    13ce7fd7f946e0baa3fc2407b40b342e

  • SHA1

    226feff35d0ecce14041f1f03fa862f72307e24b

  • SHA256

    99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0

  • SHA512

    66fc38e1414b934ac51cb7dbf59affdbacb0c079b7a829af6719bdea8e541288cbb7d038d595a37f812f29e017ac449fe117139dc355c8e8d0f25f4e3af3e157

  • SSDEEP

    12288:QMruy90qv2On7/nSLbzIAL4kjenhJ2llUYKxxYY/o1xcUm1B+l:uyn77/SH8AxwhI0YYyYg1xcUQEl

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe
    "C:\Users\Admin\AppData\Local\Temp\99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGi7588Je.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGi7588Je.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw72bK45Sq62.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw72bK45Sq62.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuQ75rq89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuQ75rq89.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 1336
          4⤵
          • Program crash
          PID:1020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXZ37ku55.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXZ37ku55.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:956
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3332 -ip 3332
    1⤵
      PID:1924

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXZ37ku55.exe

            Filesize

            177KB

            MD5

            66499e6b91db0005b19b8bed8b1998ec

            SHA1

            b021d42adb309ad946d68fa4d9bbf7043a2c9675

            SHA256

            c017188b6fa533fd8e6ef8a7fd0c4ced0d7ee7e5c55ee8dcb4305d84be797e4b

            SHA512

            e846e1d7dbd30ce19c41821946d0f2e2e3ef1311b01ec1010d302956473b5a56a8beca173c43a1119ebd1d998b8fdcc4305a2c27091c5c933e7ec3e3caa3f80b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uXZ37ku55.exe

            Filesize

            177KB

            MD5

            66499e6b91db0005b19b8bed8b1998ec

            SHA1

            b021d42adb309ad946d68fa4d9bbf7043a2c9675

            SHA256

            c017188b6fa533fd8e6ef8a7fd0c4ced0d7ee7e5c55ee8dcb4305d84be797e4b

            SHA512

            e846e1d7dbd30ce19c41821946d0f2e2e3ef1311b01ec1010d302956473b5a56a8beca173c43a1119ebd1d998b8fdcc4305a2c27091c5c933e7ec3e3caa3f80b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGi7588Je.exe

            Filesize

            391KB

            MD5

            459f8b07d7521c580a6aecea7e40428d

            SHA1

            767a59fabead0b74a1c7210484b1258e25e0df7f

            SHA256

            4772e72eaf593b5e043c4f4011909d9fe2508f509f468387e1f056304aaf58ea

            SHA512

            78a5bc62f26b1009a9782e287117b0f0df80700e2b466b9a815ef411e85eb02b250b6fa4800bfacc94399fcbd1e13d9fe9e260f012652f38e123ebb28b9595be

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vGi7588Je.exe

            Filesize

            391KB

            MD5

            459f8b07d7521c580a6aecea7e40428d

            SHA1

            767a59fabead0b74a1c7210484b1258e25e0df7f

            SHA256

            4772e72eaf593b5e043c4f4011909d9fe2508f509f468387e1f056304aaf58ea

            SHA512

            78a5bc62f26b1009a9782e287117b0f0df80700e2b466b9a815ef411e85eb02b250b6fa4800bfacc94399fcbd1e13d9fe9e260f012652f38e123ebb28b9595be

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw72bK45Sq62.exe

            Filesize

            16KB

            MD5

            a148ed4afc5ecfc29c9397a470731b35

            SHA1

            70c87178da7e2f1e6b951400b885acf10d60ac56

            SHA256

            8ca3cbf08f438bdde1cac0625fdb3d652cba5b20bead49d2084b626f5e4b3b93

            SHA512

            b554be26fbdc1b39599899d0015639eed31b8d5540e43164be7646eb2eb3d79dd7d5f9f927075850bed04e5621436784fea8c4779a2d9ecf1ce4d54d231612d3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw72bK45Sq62.exe

            Filesize

            16KB

            MD5

            a148ed4afc5ecfc29c9397a470731b35

            SHA1

            70c87178da7e2f1e6b951400b885acf10d60ac56

            SHA256

            8ca3cbf08f438bdde1cac0625fdb3d652cba5b20bead49d2084b626f5e4b3b93

            SHA512

            b554be26fbdc1b39599899d0015639eed31b8d5540e43164be7646eb2eb3d79dd7d5f9f927075850bed04e5621436784fea8c4779a2d9ecf1ce4d54d231612d3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuQ75rq89.exe

            Filesize

            302KB

            MD5

            5b4052ee747278a02dac44898f59aaee

            SHA1

            6b59810f74916a6921ea2276b57b6f5f61c79654

            SHA256

            baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80

            SHA512

            9d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuQ75rq89.exe

            Filesize

            302KB

            MD5

            5b4052ee747278a02dac44898f59aaee

            SHA1

            6b59810f74916a6921ea2276b57b6f5f61c79654

            SHA256

            baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80

            SHA512

            9d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23

          • memory/912-147-0x0000000000270000-0x000000000027A000-memory.dmp

            Filesize

            40KB

          • memory/956-1083-0x0000000000050000-0x0000000000082000-memory.dmp

            Filesize

            200KB

          • memory/956-1084-0x0000000004950000-0x0000000004960000-memory.dmp

            Filesize

            64KB

          • memory/3332-188-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-198-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-155-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

            Filesize

            64KB

          • memory/3332-156-0x0000000004DF0000-0x0000000005394000-memory.dmp

            Filesize

            5.6MB

          • memory/3332-157-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-158-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-160-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-162-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-164-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-166-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-168-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-170-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-172-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-174-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-176-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-178-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-180-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-182-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-184-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-153-0x00000000021C0000-0x000000000220B000-memory.dmp

            Filesize

            300KB

          • memory/3332-186-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-190-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-192-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-194-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-196-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-154-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

            Filesize

            64KB

          • memory/3332-200-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-202-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-204-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-206-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-208-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-210-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-212-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-214-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-216-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-218-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-220-0x0000000004C70000-0x0000000004CAE000-memory.dmp

            Filesize

            248KB

          • memory/3332-1063-0x00000000053A0000-0x00000000059B8000-memory.dmp

            Filesize

            6.1MB

          • memory/3332-1064-0x00000000059C0000-0x0000000005ACA000-memory.dmp

            Filesize

            1.0MB

          • memory/3332-1065-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

            Filesize

            72KB

          • memory/3332-1066-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

            Filesize

            240KB

          • memory/3332-1067-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

            Filesize

            64KB

          • memory/3332-1069-0x0000000005DC0000-0x0000000005E26000-memory.dmp

            Filesize

            408KB

          • memory/3332-1070-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

            Filesize

            64KB

          • memory/3332-1071-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

            Filesize

            64KB

          • memory/3332-1072-0x0000000006470000-0x0000000006502000-memory.dmp

            Filesize

            584KB

          • memory/3332-1073-0x00000000066C0000-0x0000000006882000-memory.dmp

            Filesize

            1.8MB

          • memory/3332-1074-0x00000000068A0000-0x0000000006DCC000-memory.dmp

            Filesize

            5.2MB

          • memory/3332-1075-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

            Filesize

            64KB

          • memory/3332-1076-0x0000000007020000-0x0000000007096000-memory.dmp

            Filesize

            472KB

          • memory/3332-1077-0x00000000070A0000-0x00000000070F0000-memory.dmp

            Filesize

            320KB