Analysis

  • max time kernel
    142s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-03-2023 13:48

General

  • Target

    80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe

  • Size

    537KB

  • MD5

    30fbdfa08a52c8249c29fcd242c421d6

  • SHA1

    4304c3df69f08f513f4c83fcd3e9cca9abd58268

  • SHA256

    80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64

  • SHA512

    da3033709daf6089af11e95036bf959e098b03ad261a0c6ad9073b67d1e604c3aa1666f044435b0074f99532dbf4c6cbf77a1a1366209d228937c9c70058a139

  • SSDEEP

    12288:KMr4y90+D+wBVOgO5LvLNlITZYAVLpenLUYLR:OyscVtOZvplIaAVa9

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe
    "C:\Users\Admin\AppData\Local\Temp\80b99c541fc146e3cb7bb0545def0b5ac2877ecf726828a3328ae746f8b10b64.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuD4177yu.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuD4177yu.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73RX69GI60.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73RX69GI60.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tol69SK21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tol69SK21.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1592
          4⤵
          • Program crash
          PID:4436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEe48Dw97.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEe48Dw97.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4492
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4844 -ip 4844
    1⤵
      PID:3060

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEe48Dw97.exe

      Filesize

      177KB

      MD5

      7af8e0599a0c84145dd698a8a57bfc77

      SHA1

      a18daff5be79795239c91f7e397e113babfacda5

      SHA256

      2b6385b222dfe9ac938eb8c7d5d4a3be894ac8f7ffabf07fc40ca7f5ce62dcfb

      SHA512

      53729631b01f9737bc63f6f51323486e1505a47afaa525d99478b5ab8c018c31a0be800800b2c30ff2abd90dee5028fccbb7f28a4d0e9b73aec13b17d0819302

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEe48Dw97.exe

      Filesize

      177KB

      MD5

      7af8e0599a0c84145dd698a8a57bfc77

      SHA1

      a18daff5be79795239c91f7e397e113babfacda5

      SHA256

      2b6385b222dfe9ac938eb8c7d5d4a3be894ac8f7ffabf07fc40ca7f5ce62dcfb

      SHA512

      53729631b01f9737bc63f6f51323486e1505a47afaa525d99478b5ab8c018c31a0be800800b2c30ff2abd90dee5028fccbb7f28a4d0e9b73aec13b17d0819302

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuD4177yu.exe

      Filesize

      392KB

      MD5

      681f8ef123155252d85691b376be7e14

      SHA1

      64d0edecb5989d0b4d06112e769f88063c3b6e3a

      SHA256

      5c9459fd7fe4e571df1ccd49e06d830817a7585c32df6383d54c13863964a9fd

      SHA512

      53bdf90f2723280a275ccae1021cf46fac69fec9e7256b3297955c16c4ca9b23e61858ba86ce5e04f074cc59086a4e97ecbc8848132a1ab0c1747d5b7c42d8ff

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuD4177yu.exe

      Filesize

      392KB

      MD5

      681f8ef123155252d85691b376be7e14

      SHA1

      64d0edecb5989d0b4d06112e769f88063c3b6e3a

      SHA256

      5c9459fd7fe4e571df1ccd49e06d830817a7585c32df6383d54c13863964a9fd

      SHA512

      53bdf90f2723280a275ccae1021cf46fac69fec9e7256b3297955c16c4ca9b23e61858ba86ce5e04f074cc59086a4e97ecbc8848132a1ab0c1747d5b7c42d8ff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73RX69GI60.exe

      Filesize

      17KB

      MD5

      9c98e278efddc73229acd3b2e79f2172

      SHA1

      e843b4bb86dd4057b52a876f1b70253c1aa55a71

      SHA256

      b1f3e52b9a36ecfee645d1f506c768cbecbe998a5b66897387bf58b95f75d820

      SHA512

      d6a46e4df3463de962c6b5b9f935464e552a4b1c6227140b17d2ca6a0fc24f28c9660f9324e234ae9435da15f5295cc34f3bb3b4a670341fd32f5ac5cc9aebbf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73RX69GI60.exe

      Filesize

      17KB

      MD5

      9c98e278efddc73229acd3b2e79f2172

      SHA1

      e843b4bb86dd4057b52a876f1b70253c1aa55a71

      SHA256

      b1f3e52b9a36ecfee645d1f506c768cbecbe998a5b66897387bf58b95f75d820

      SHA512

      d6a46e4df3463de962c6b5b9f935464e552a4b1c6227140b17d2ca6a0fc24f28c9660f9324e234ae9435da15f5295cc34f3bb3b4a670341fd32f5ac5cc9aebbf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tol69SK21.exe

      Filesize

      304KB

      MD5

      ad61b513e0bbc3784d0c28ba13ab19ff

      SHA1

      0d86785da45331516385d7d72e18457e32b89aed

      SHA256

      5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

      SHA512

      80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tol69SK21.exe

      Filesize

      304KB

      MD5

      ad61b513e0bbc3784d0c28ba13ab19ff

      SHA1

      0d86785da45331516385d7d72e18457e32b89aed

      SHA256

      5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

      SHA512

      80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

    • memory/4372-147-0x0000000000470000-0x000000000047A000-memory.dmp

      Filesize

      40KB

    • memory/4492-1084-0x0000000000BC0000-0x0000000000BF2000-memory.dmp

      Filesize

      200KB

    • memory/4492-1085-0x0000000005760000-0x0000000005770000-memory.dmp

      Filesize

      64KB

    • memory/4844-186-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-198-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-155-0x0000000004BB0000-0x0000000005154000-memory.dmp

      Filesize

      5.6MB

    • memory/4844-156-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-157-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-159-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-161-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-163-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-165-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-167-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-169-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-171-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-173-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-175-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-178-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4844-177-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-180-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-182-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-184-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-153-0x00000000006F0000-0x000000000073B000-memory.dmp

      Filesize

      300KB

    • memory/4844-188-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-190-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-192-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-194-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-196-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-154-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4844-200-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-202-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-204-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-206-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-208-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-210-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-212-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-214-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-216-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-218-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-220-0x0000000004B50000-0x0000000004B8E000-memory.dmp

      Filesize

      248KB

    • memory/4844-1063-0x00000000052D0000-0x00000000058E8000-memory.dmp

      Filesize

      6.1MB

    • memory/4844-1064-0x0000000005970000-0x0000000005A7A000-memory.dmp

      Filesize

      1.0MB

    • memory/4844-1066-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

      Filesize

      72KB

    • memory/4844-1065-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4844-1067-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

      Filesize

      240KB

    • memory/4844-1069-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4844-1070-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4844-1071-0x0000000005DC0000-0x0000000005E26000-memory.dmp

      Filesize

      408KB

    • memory/4844-1072-0x0000000006480000-0x0000000006512000-memory.dmp

      Filesize

      584KB

    • memory/4844-1073-0x0000000006550000-0x00000000065C6000-memory.dmp

      Filesize

      472KB

    • memory/4844-1074-0x00000000065F0000-0x0000000006640000-memory.dmp

      Filesize

      320KB

    • memory/4844-1075-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4844-1076-0x0000000007A10000-0x0000000007BD2000-memory.dmp

      Filesize

      1.8MB

    • memory/4844-1077-0x0000000007BE0000-0x000000000810C000-memory.dmp

      Filesize

      5.2MB

    • memory/4844-1078-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB