Analysis

  • max time kernel
    78s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-03-2023 17:06

General

  • Target

    5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe

  • Size

    535KB

  • MD5

    a7ea9d2012cfa9c142248b1fd2f84685

  • SHA1

    47bef3ad663ec38aa73d57674b929ce78d11bd78

  • SHA256

    5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae

  • SHA512

    a481015cf1807af4e331be930136b3f2f90ac224afc7e5c8b2b722717714f677ecc262e759ebe777b8cb1193c8546282e6ca6cd1c9cc37df5e09cd75ce4a7148

  • SSDEEP

    12288:hMrpy90qE0mgIVf3T61Zr5WQGGYU3Mn6FXMGOJuGMRNagl+DJ:MyzyVqWQAUcaXZXLMDJ

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe
    "C:\Users\Admin\AppData\Local\Temp\5dedf59b9990a24937f8141bed72f5723a710e4f2e8107c13e664321e81fe7ae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vut5659tz.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vut5659tz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw75Eo73UE72.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw75Eo73UE72.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tCR74TO34.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tCR74TO34.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 1908
          4⤵
          • Program crash
          PID:1036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHo86gv71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHo86gv71.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4756 -ip 4756
    1⤵
      PID:3384

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHo86gv71.exe

      Filesize

      177KB

      MD5

      370d09bbb49187efc8fd509f6ce74163

      SHA1

      c68c9f75750066acc105bf3b6ded2b86314b6a52

      SHA256

      a7e8f9e37a5063c87f4b3b447776d0879718304b75fe13a8f18036b117d9765b

      SHA512

      6c82e0d1614fb08495815fea21599267cd0b9e32299dd695937d9c447e41c4347d769850e7b915f8ed440f841a70b5645fecda193767a8b7aca383a99e0a71ac

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uHo86gv71.exe

      Filesize

      177KB

      MD5

      370d09bbb49187efc8fd509f6ce74163

      SHA1

      c68c9f75750066acc105bf3b6ded2b86314b6a52

      SHA256

      a7e8f9e37a5063c87f4b3b447776d0879718304b75fe13a8f18036b117d9765b

      SHA512

      6c82e0d1614fb08495815fea21599267cd0b9e32299dd695937d9c447e41c4347d769850e7b915f8ed440f841a70b5645fecda193767a8b7aca383a99e0a71ac

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vut5659tz.exe

      Filesize

      391KB

      MD5

      220de64ec1fe1ce1fa82a247dee39345

      SHA1

      947f57e6861d30330ef603712b0646b8aec0d878

      SHA256

      ae76f641f50d641f62d5bbd680b910ec70dd58b220c2099d96f5abf88df12da5

      SHA512

      b16ee261d52c11393595874d1d9d73751859f0cc7ca5030244bbae469bfe9e91b642d687c8a96f25ca03c23dd14eafb8a58da20ce402c88477b75ec04d51a731

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vut5659tz.exe

      Filesize

      391KB

      MD5

      220de64ec1fe1ce1fa82a247dee39345

      SHA1

      947f57e6861d30330ef603712b0646b8aec0d878

      SHA256

      ae76f641f50d641f62d5bbd680b910ec70dd58b220c2099d96f5abf88df12da5

      SHA512

      b16ee261d52c11393595874d1d9d73751859f0cc7ca5030244bbae469bfe9e91b642d687c8a96f25ca03c23dd14eafb8a58da20ce402c88477b75ec04d51a731

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw75Eo73UE72.exe

      Filesize

      17KB

      MD5

      20c04327ffd1cc1fe4efd79b8505dfe3

      SHA1

      990366ff09b7d3f9a46bb547228c62ab1d49f247

      SHA256

      45da3bd94c3e54acda0aa988469b733ad701ec44b279323634cdd8ee772d2c69

      SHA512

      5d4c4216718445278cac9b0cfc02aaf65db81d7cfb015787275b1783fd31a006ae3177952b4c792125b11b8bf8333c4e2018afef673dc270742a55beebc074de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw75Eo73UE72.exe

      Filesize

      17KB

      MD5

      20c04327ffd1cc1fe4efd79b8505dfe3

      SHA1

      990366ff09b7d3f9a46bb547228c62ab1d49f247

      SHA256

      45da3bd94c3e54acda0aa988469b733ad701ec44b279323634cdd8ee772d2c69

      SHA512

      5d4c4216718445278cac9b0cfc02aaf65db81d7cfb015787275b1783fd31a006ae3177952b4c792125b11b8bf8333c4e2018afef673dc270742a55beebc074de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tCR74TO34.exe

      Filesize

      302KB

      MD5

      b0b07df44fd27fecf8a8ed8735a76c78

      SHA1

      33e2470f3dea8a97ecff3109daed706e174201b4

      SHA256

      c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

      SHA512

      3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tCR74TO34.exe

      Filesize

      302KB

      MD5

      b0b07df44fd27fecf8a8ed8735a76c78

      SHA1

      33e2470f3dea8a97ecff3109daed706e174201b4

      SHA256

      c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

      SHA512

      3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

    • memory/1608-147-0x0000000000630000-0x000000000063A000-memory.dmp

      Filesize

      40KB

    • memory/2480-1083-0x0000000000150000-0x0000000000182000-memory.dmp

      Filesize

      200KB

    • memory/2480-1084-0x0000000004D30000-0x0000000004D40000-memory.dmp

      Filesize

      64KB

    • memory/4756-188-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-200-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-155-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4756-157-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-158-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-160-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-162-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-164-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-166-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-168-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-170-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-172-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-174-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-176-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-178-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-180-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-182-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-184-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-186-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-154-0x00000000006E0000-0x000000000072B000-memory.dmp

      Filesize

      300KB

    • memory/4756-190-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-192-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-194-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-196-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-198-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-156-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4756-202-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-204-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-206-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-208-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-210-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-212-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-214-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-216-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-218-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-220-0x00000000051A0000-0x00000000051DE000-memory.dmp

      Filesize

      248KB

    • memory/4756-1063-0x00000000051E0000-0x00000000057F8000-memory.dmp

      Filesize

      6.1MB

    • memory/4756-1064-0x0000000005840000-0x000000000594A000-memory.dmp

      Filesize

      1.0MB

    • memory/4756-1065-0x0000000005970000-0x0000000005982000-memory.dmp

      Filesize

      72KB

    • memory/4756-1066-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4756-1067-0x00000000059D0000-0x0000000005A0C000-memory.dmp

      Filesize

      240KB

    • memory/4756-1069-0x0000000005C80000-0x0000000005D12000-memory.dmp

      Filesize

      584KB

    • memory/4756-1070-0x0000000005D20000-0x0000000005D86000-memory.dmp

      Filesize

      408KB

    • memory/4756-1071-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4756-1072-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB

    • memory/4756-1073-0x0000000006540000-0x00000000065B6000-memory.dmp

      Filesize

      472KB

    • memory/4756-1074-0x00000000065C0000-0x0000000006610000-memory.dmp

      Filesize

      320KB

    • memory/4756-153-0x0000000004BB0000-0x0000000005154000-memory.dmp

      Filesize

      5.6MB

    • memory/4756-1075-0x0000000006630000-0x00000000067F2000-memory.dmp

      Filesize

      1.8MB

    • memory/4756-1076-0x0000000006810000-0x0000000006D3C000-memory.dmp

      Filesize

      5.2MB

    • memory/4756-1077-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB