Analysis

  • max time kernel
    102s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 05:43

General

  • Target

    ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe

  • Size

    549KB

  • MD5

    65137342ff16a939e374c22b42bf4e97

  • SHA1

    aee062a461d84b5b01d7d5b0abe5b1a70cf8fa13

  • SHA256

    ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a

  • SHA512

    9eeeef9adadf6521b93caf15ac03894debcb073621cdbfe0f955c3921610f88326cc0fc8881cc4e086b9519d8ce220b22258df5fe43db188d2d440ff66305055

  • SSDEEP

    12288:PMr7y901VFFuXKw/un3zznvVZ+ObGH7ridgjwesU:symvuKL/+KdgR

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe
    "C:\Users\Admin\AppData\Local\Temp\ce6a1c67567aa4b17d3fa0113a1d50dd8748db34ab1cfa421bcfe40435c4d31a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBP6843NJ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBP6843NJ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw98zb19mI31.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw98zb19mI31.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIW10KN39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIW10KN39.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 1768
          4⤵
          • Program crash
          PID:3392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upG59Yi72.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upG59Yi72.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4128 -ip 4128
    1⤵
      PID:1704

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upG59Yi72.exe

            Filesize

            175KB

            MD5

            d688d5eb18a8f51764026c262979a853

            SHA1

            183c21a5cea88392309e3e479792338b7264fd71

            SHA256

            84fb6f8f7f1682949585ea23173500318c3e986ac9c1522be23d01ba48955b07

            SHA512

            0ade489cb6e1d6b3ecd2d62d0300a5b8ec3ffbf4958a0da47710ed176cf3f938175e25a65b6737b3ed201216db4efe8881c6b1f3da97c8a6754a62e0d4d886e2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upG59Yi72.exe

            Filesize

            175KB

            MD5

            d688d5eb18a8f51764026c262979a853

            SHA1

            183c21a5cea88392309e3e479792338b7264fd71

            SHA256

            84fb6f8f7f1682949585ea23173500318c3e986ac9c1522be23d01ba48955b07

            SHA512

            0ade489cb6e1d6b3ecd2d62d0300a5b8ec3ffbf4958a0da47710ed176cf3f938175e25a65b6737b3ed201216db4efe8881c6b1f3da97c8a6754a62e0d4d886e2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBP6843NJ.exe

            Filesize

            404KB

            MD5

            f3dccdbc8cec122c6754ea1aefef3a05

            SHA1

            203e325fd778f5e664b6393b2100bb42432c7553

            SHA256

            20366724a0081c90d336e8e41fe1c4914485a4ea8d53f4d1e6fcb95ccb020e5e

            SHA512

            e1d71cdf49b2b18be0cb28c5359fdb62729976f460fa328c53790b8558f78c0f9e6b5a3e2526286aa54045f83b1fcd9d2c8be37f640a860e288b306368f93949

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vBP6843NJ.exe

            Filesize

            404KB

            MD5

            f3dccdbc8cec122c6754ea1aefef3a05

            SHA1

            203e325fd778f5e664b6393b2100bb42432c7553

            SHA256

            20366724a0081c90d336e8e41fe1c4914485a4ea8d53f4d1e6fcb95ccb020e5e

            SHA512

            e1d71cdf49b2b18be0cb28c5359fdb62729976f460fa328c53790b8558f78c0f9e6b5a3e2526286aa54045f83b1fcd9d2c8be37f640a860e288b306368f93949

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw98zb19mI31.exe

            Filesize

            12KB

            MD5

            6d7fa0f8e72a2d81923ea483a5935451

            SHA1

            5d101bc189018b05dde2320e9b4f092f02258c87

            SHA256

            b4a804aafb9b172fdd5131d362ec45dc189e196c5001b17e1581f936410bb0c3

            SHA512

            584aa901782bab7623c806a243f02fce767cf46a73493b62fa2773653b6e81cd2dfcc0deff1ba7d9222d60ea16e030d65370ec53434b8b0fbe125fd4ca139b4f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw98zb19mI31.exe

            Filesize

            12KB

            MD5

            6d7fa0f8e72a2d81923ea483a5935451

            SHA1

            5d101bc189018b05dde2320e9b4f092f02258c87

            SHA256

            b4a804aafb9b172fdd5131d362ec45dc189e196c5001b17e1581f936410bb0c3

            SHA512

            584aa901782bab7623c806a243f02fce767cf46a73493b62fa2773653b6e81cd2dfcc0deff1ba7d9222d60ea16e030d65370ec53434b8b0fbe125fd4ca139b4f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIW10KN39.exe

            Filesize

            381KB

            MD5

            57b4e73c1d36751cb60a4d2e68594087

            SHA1

            0e371eaad20ebbb81735876f0f1703adee193117

            SHA256

            39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

            SHA512

            e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tIW10KN39.exe

            Filesize

            381KB

            MD5

            57b4e73c1d36751cb60a4d2e68594087

            SHA1

            0e371eaad20ebbb81735876f0f1703adee193117

            SHA256

            39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

            SHA512

            e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

          • memory/992-1085-0x0000000000D10000-0x0000000000D42000-memory.dmp

            Filesize

            200KB

          • memory/992-1086-0x00000000058F0000-0x0000000005900000-memory.dmp

            Filesize

            64KB

          • memory/3592-147-0x00000000008F0000-0x00000000008FA000-memory.dmp

            Filesize

            40KB

          • memory/4128-191-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-203-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-156-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-157-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-158-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-159-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-161-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-163-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-165-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-167-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-169-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-171-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-173-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-175-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-177-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-179-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-181-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-183-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-185-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-187-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-189-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-154-0x0000000003120000-0x000000000316B000-memory.dmp

            Filesize

            300KB

          • memory/4128-193-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-195-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-197-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-199-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-201-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-155-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-205-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-207-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-211-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-209-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-213-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-215-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-217-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-219-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-221-0x0000000004E20000-0x0000000004E5E000-memory.dmp

            Filesize

            248KB

          • memory/4128-1064-0x00000000079B0000-0x0000000007FC8000-memory.dmp

            Filesize

            6.1MB

          • memory/4128-1065-0x0000000007FD0000-0x00000000080DA000-memory.dmp

            Filesize

            1.0MB

          • memory/4128-1066-0x00000000080F0000-0x0000000008102000-memory.dmp

            Filesize

            72KB

          • memory/4128-1067-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-1068-0x0000000008110000-0x000000000814C000-memory.dmp

            Filesize

            240KB

          • memory/4128-1070-0x0000000008400000-0x0000000008466000-memory.dmp

            Filesize

            408KB

          • memory/4128-1071-0x0000000008BF0000-0x0000000008C82000-memory.dmp

            Filesize

            584KB

          • memory/4128-1072-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-1073-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-1074-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-1075-0x0000000008E00000-0x0000000008FC2000-memory.dmp

            Filesize

            1.8MB

          • memory/4128-1076-0x0000000008FE0000-0x000000000950C000-memory.dmp

            Filesize

            5.2MB

          • memory/4128-153-0x0000000007400000-0x00000000079A4000-memory.dmp

            Filesize

            5.6MB

          • memory/4128-1077-0x0000000009660000-0x00000000096D6000-memory.dmp

            Filesize

            472KB

          • memory/4128-1078-0x00000000073F0000-0x0000000007400000-memory.dmp

            Filesize

            64KB

          • memory/4128-1079-0x00000000096E0000-0x0000000009730000-memory.dmp

            Filesize

            320KB