Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 18:50

General

  • Target

    250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe

  • Size

    536KB

  • MD5

    cb365dc0e729bf457ea3f77af824bc7e

  • SHA1

    ec538147b23a314f288ce6c3b477ef3588a0d10e

  • SHA256

    250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580

  • SHA512

    fa04862a5d51a1c208bad1788b009f8958909f1fc03057cc2770f2e122d504e8de632db49f214392e314d1da287c5b67a00339080cf7d11de6b818937dd81208

  • SSDEEP

    12288:EMray90nSALTqYkBgUu5q/kfjkoH9BNZt9fwxAD7Q5t:2yUfL+YKgUcfAxA4t

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe
    "C:\Users\Admin\AppData\Local\Temp\250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vde3890AQ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vde3890AQ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06kq91LO74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06kq91LO74.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tHo90sQ98.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tHo90sQ98.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 1340
          4⤵
          • Program crash
          PID:1904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uIf61iC78.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uIf61iC78.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1120
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3448 -ip 3448
    1⤵
      PID:1240

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uIf61iC78.exe

            Filesize

            175KB

            MD5

            d0e6f4315ef19511b39d0e77a5e9ec7a

            SHA1

            1363c14d06493d3ded8afa29615c55658075456b

            SHA256

            49ad3a373d6c8b960894179085d5b05559b3b648f09f1cf377e673da3f3cce21

            SHA512

            f6698c9b8d812d2b134c150ce15c6302fbd9f2f8c9e1559458abd5f20fce448f57a377d54b68477e1122df35e815a3ee7dabb2d19de4e4fbe934aa1d096aa716

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uIf61iC78.exe

            Filesize

            175KB

            MD5

            d0e6f4315ef19511b39d0e77a5e9ec7a

            SHA1

            1363c14d06493d3ded8afa29615c55658075456b

            SHA256

            49ad3a373d6c8b960894179085d5b05559b3b648f09f1cf377e673da3f3cce21

            SHA512

            f6698c9b8d812d2b134c150ce15c6302fbd9f2f8c9e1559458abd5f20fce448f57a377d54b68477e1122df35e815a3ee7dabb2d19de4e4fbe934aa1d096aa716

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vde3890AQ.exe

            Filesize

            391KB

            MD5

            744b2c56ba8cb13c9e0d2d052aa18a9b

            SHA1

            97f628806d214dc71f9982692c9a9fcc410340f5

            SHA256

            7612bedd7603854a88df22e65ff56676d9ed1583739c2be1f28837805e4aff76

            SHA512

            eae4dceb1583e4508651d16037ffe646cd6ea895c22923258cd2677b3ce718f1473c21f63efca8982f3da8961850450f96f8884632d266a90040428f2520e840

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vde3890AQ.exe

            Filesize

            391KB

            MD5

            744b2c56ba8cb13c9e0d2d052aa18a9b

            SHA1

            97f628806d214dc71f9982692c9a9fcc410340f5

            SHA256

            7612bedd7603854a88df22e65ff56676d9ed1583739c2be1f28837805e4aff76

            SHA512

            eae4dceb1583e4508651d16037ffe646cd6ea895c22923258cd2677b3ce718f1473c21f63efca8982f3da8961850450f96f8884632d266a90040428f2520e840

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06kq91LO74.exe

            Filesize

            11KB

            MD5

            c0d906a1ffda7971fda2303da0cd76f9

            SHA1

            3fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2

            SHA256

            c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa

            SHA512

            349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw06kq91LO74.exe

            Filesize

            11KB

            MD5

            c0d906a1ffda7971fda2303da0cd76f9

            SHA1

            3fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2

            SHA256

            c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa

            SHA512

            349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tHo90sQ98.exe

            Filesize

            304KB

            MD5

            9c3e7c5879f2758bb2add2fbf488ed16

            SHA1

            c5a2662767f97a4860f33a9fe6cace435a3c1b02

            SHA256

            7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

            SHA512

            0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tHo90sQ98.exe

            Filesize

            304KB

            MD5

            9c3e7c5879f2758bb2add2fbf488ed16

            SHA1

            c5a2662767f97a4860f33a9fe6cace435a3c1b02

            SHA256

            7ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf

            SHA512

            0808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a

          • memory/916-147-0x00000000007E0000-0x00000000007EA000-memory.dmp

            Filesize

            40KB

          • memory/1120-1085-0x0000000000230000-0x0000000000262000-memory.dmp

            Filesize

            200KB

          • memory/1120-1086-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/3448-189-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-203-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-156-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-155-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-157-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-158-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-161-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-159-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-163-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-165-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-167-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-169-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-171-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-173-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-175-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-179-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-177-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-181-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-183-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-185-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-187-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-153-0x0000000004BF0000-0x0000000005194000-memory.dmp

            Filesize

            5.6MB

          • memory/3448-191-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-193-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-195-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-199-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-197-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-154-0x0000000000710000-0x000000000075B000-memory.dmp

            Filesize

            300KB

          • memory/3448-201-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-205-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-207-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-209-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-211-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-213-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-215-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-217-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-219-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-221-0x00000000025D0000-0x000000000260E000-memory.dmp

            Filesize

            248KB

          • memory/3448-1064-0x00000000052E0000-0x00000000058F8000-memory.dmp

            Filesize

            6.1MB

          • memory/3448-1065-0x0000000005970000-0x0000000005A7A000-memory.dmp

            Filesize

            1.0MB

          • memory/3448-1066-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

            Filesize

            72KB

          • memory/3448-1067-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

            Filesize

            240KB

          • memory/3448-1068-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-1070-0x0000000005DC0000-0x0000000005E52000-memory.dmp

            Filesize

            584KB

          • memory/3448-1071-0x0000000005E60000-0x0000000005EC6000-memory.dmp

            Filesize

            408KB

          • memory/3448-1072-0x0000000006580000-0x0000000006742000-memory.dmp

            Filesize

            1.8MB

          • memory/3448-1073-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-1074-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-1075-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB

          • memory/3448-1076-0x0000000006750000-0x0000000006C7C000-memory.dmp

            Filesize

            5.2MB

          • memory/3448-1077-0x0000000006ED0000-0x0000000006F46000-memory.dmp

            Filesize

            472KB

          • memory/3448-1078-0x0000000006F50000-0x0000000006FA0000-memory.dmp

            Filesize

            320KB

          • memory/3448-1079-0x0000000002610000-0x0000000002620000-memory.dmp

            Filesize

            64KB