Analysis

  • max time kernel
    131s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 19:48

General

  • Target

    17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe

  • Size

    536KB

  • MD5

    18bdbcf38fece4a57906d1795bbae04a

  • SHA1

    f5ddce66f3a80265391ed2457708615600d067fb

  • SHA256

    17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d

  • SHA512

    871888fdd94fba3a0c7c5fc38302d1d8fb5c97ae96dff43a27b4d123868691b00f9ee712b01b044af841f2d02f02c2b34e208260a1e2a510e82517eaeb7db7d3

  • SSDEEP

    12288:MMrEy90P0EyDyR9ZEpPzumd5+1CGgrDPhZBkYMgVZ2HARO:AyYLyg9WpPKF0Ggho/2oHL

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe
    "C:\Users\Admin\AppData\Local\Temp\17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 1564
          4⤵
          • Program crash
          PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4948
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 220 -ip 220
    1⤵
      PID:3920

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe

            Filesize

            175KB

            MD5

            b92a503e97092213bbe657a1664fec0d

            SHA1

            22a91428d88811969a5a2d43f5a91b795227e1ce

            SHA256

            82fef8f38d7f481bd2cdb3c7906ce237b103a14a001357da7fa3cfe2265d544c

            SHA512

            8c045dbb3c6b7e79ee97e21a40b004bd3bd896b6d7ee11f405df048ae62268afd76757a7e450c9f5114f4736705156531502a0caf9fbe19b191550be7f7399b3

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe

            Filesize

            175KB

            MD5

            b92a503e97092213bbe657a1664fec0d

            SHA1

            22a91428d88811969a5a2d43f5a91b795227e1ce

            SHA256

            82fef8f38d7f481bd2cdb3c7906ce237b103a14a001357da7fa3cfe2265d544c

            SHA512

            8c045dbb3c6b7e79ee97e21a40b004bd3bd896b6d7ee11f405df048ae62268afd76757a7e450c9f5114f4736705156531502a0caf9fbe19b191550be7f7399b3

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe

            Filesize

            391KB

            MD5

            a0fa9bab62b925c470a23260aefaec2b

            SHA1

            44533ed0a378f3975d18bbe0bf1cd9f84b5f91ff

            SHA256

            58b08c9cac4089e388f9b36752377a37498aeb815f54c649e341c55188968e49

            SHA512

            229fcc190c7581c0ce92dfd102534710fccaf2a3e94519d3c206102101e161066971fd57d41f10f2909bb824377e77de60f00c5bba8271fb5540fe8f3ab8d183

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe

            Filesize

            391KB

            MD5

            a0fa9bab62b925c470a23260aefaec2b

            SHA1

            44533ed0a378f3975d18bbe0bf1cd9f84b5f91ff

            SHA256

            58b08c9cac4089e388f9b36752377a37498aeb815f54c649e341c55188968e49

            SHA512

            229fcc190c7581c0ce92dfd102534710fccaf2a3e94519d3c206102101e161066971fd57d41f10f2909bb824377e77de60f00c5bba8271fb5540fe8f3ab8d183

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe

            Filesize

            11KB

            MD5

            30edfc9cc65763308cca008074b2b8e9

            SHA1

            820a638f4acdb4c9c0400349b2f9434afb852ff9

            SHA256

            226e5d807dd6a8f4d2dff71e4e607a803ee2b3bb1ae03ea517c588128a9d6002

            SHA512

            566b5971902b9e1c9766a79f5e87797493d7d9081d8866815bc1c7323387250d1ce1053ca50d720a2e5149641f802896ab61efdb035c9290c42913d948cfd284

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe

            Filesize

            11KB

            MD5

            30edfc9cc65763308cca008074b2b8e9

            SHA1

            820a638f4acdb4c9c0400349b2f9434afb852ff9

            SHA256

            226e5d807dd6a8f4d2dff71e4e607a803ee2b3bb1ae03ea517c588128a9d6002

            SHA512

            566b5971902b9e1c9766a79f5e87797493d7d9081d8866815bc1c7323387250d1ce1053ca50d720a2e5149641f802896ab61efdb035c9290c42913d948cfd284

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe

            Filesize

            303KB

            MD5

            003ebed48d2fda6c315c683d32b6a6dc

            SHA1

            677088017218065e750a178b68fe2388ac74920a

            SHA256

            0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

            SHA512

            26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe

            Filesize

            303KB

            MD5

            003ebed48d2fda6c315c683d32b6a6dc

            SHA1

            677088017218065e750a178b68fe2388ac74920a

            SHA256

            0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

            SHA512

            26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

          • memory/220-155-0x00000000020D0000-0x000000000211B000-memory.dmp

            Filesize

            300KB

          • memory/220-156-0x0000000002470000-0x0000000002480000-memory.dmp

            Filesize

            64KB

          • memory/220-157-0x0000000002470000-0x0000000002480000-memory.dmp

            Filesize

            64KB

          • memory/220-158-0x0000000004C40000-0x00000000051E4000-memory.dmp

            Filesize

            5.6MB

          • memory/220-159-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-160-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-164-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-162-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-166-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-168-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-170-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-172-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-174-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-176-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-178-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-180-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-182-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-184-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-186-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-188-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-190-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-192-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-194-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-196-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-198-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-200-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-202-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-206-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-208-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-204-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-210-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-212-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-214-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-216-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-218-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-220-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-222-0x0000000002750000-0x000000000278E000-memory.dmp

            Filesize

            248KB

          • memory/220-1065-0x00000000052F0000-0x0000000005908000-memory.dmp

            Filesize

            6.1MB

          • memory/220-1066-0x0000000005970000-0x0000000005A7A000-memory.dmp

            Filesize

            1.0MB

          • memory/220-1067-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

            Filesize

            72KB

          • memory/220-1068-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

            Filesize

            240KB

          • memory/220-1069-0x0000000002470000-0x0000000002480000-memory.dmp

            Filesize

            64KB

          • memory/220-1071-0x0000000002470000-0x0000000002480000-memory.dmp

            Filesize

            64KB

          • memory/220-1072-0x0000000005DC0000-0x0000000005E26000-memory.dmp

            Filesize

            408KB

          • memory/220-1073-0x0000000006480000-0x0000000006512000-memory.dmp

            Filesize

            584KB

          • memory/220-1074-0x0000000006580000-0x0000000006742000-memory.dmp

            Filesize

            1.8MB

          • memory/220-1075-0x0000000006750000-0x0000000006C7C000-memory.dmp

            Filesize

            5.2MB

          • memory/220-1076-0x0000000006EC0000-0x0000000006F36000-memory.dmp

            Filesize

            472KB

          • memory/220-1077-0x0000000006F40000-0x0000000006F90000-memory.dmp

            Filesize

            320KB

          • memory/220-1078-0x0000000002470000-0x0000000002480000-memory.dmp

            Filesize

            64KB

          • memory/4552-147-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

            Filesize

            40KB

          • memory/4948-1085-0x0000000000010000-0x0000000000042000-memory.dmp

            Filesize

            200KB

          • memory/4948-1086-0x00000000048E0000-0x00000000048F0000-memory.dmp

            Filesize

            64KB