Analysis

  • max time kernel
    84s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 01:14

General

  • Target

    6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe

  • Size

    695KB

  • MD5

    41e0491fd8419eece12787bc14a75ba9

  • SHA1

    8835b1e6ef410094c52e56bcbf663ec652ddf87d

  • SHA256

    6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3

  • SHA512

    3e5cdc90e18192ac06c52fe1bcca0aa849f1016635956c4a2bc776de4fe9a2c8929bea833b438a64bf37ad31825e4a12d5ed935d0768aa4364817ea643e01c94

  • SSDEEP

    12288:cMrhy90sFIPK2IHL6/UIht34lZgHaS2nIYgPfmZmx2g+kNUqkjSIH0+gBLPXYOgx:9yTF6K2IHLg3hbHaSgIYgnmZmX+/XSIB

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe
    "C:\Users\Admin\AppData\Local\Temp\6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycmP73CA00.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycmP73CA00.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urvH91js68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urvH91js68.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 1076
          4⤵
          • Program crash
          PID:2300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrbl57zy99.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrbl57zy99.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:348
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 348 -s 1908
          4⤵
          • Program crash
          PID:5112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWX44Ih16.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWX44Ih16.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2296
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3564 -ip 3564
    1⤵
      PID:332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 348 -ip 348
      1⤵
        PID:4336

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWX44Ih16.exe

        Filesize

        175KB

        MD5

        1de24310cc666cd05190e29ad5eb73e7

        SHA1

        2288615f6e99f2f2e857825efa7ccb22f31e331b

        SHA256

        402654166f42d5bb576dcf1fa20eff7b6a49e907854d0624e997bf33478142cf

        SHA512

        910eddd905038ac8af9e83fa1c148f4bb5eb8a18fda88bd5fc34a89ac04f258e96c438412cbb51454bb7f437e5b1191bbcff8aa7e7fbbb0ebe9731899504e23a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWX44Ih16.exe

        Filesize

        175KB

        MD5

        1de24310cc666cd05190e29ad5eb73e7

        SHA1

        2288615f6e99f2f2e857825efa7ccb22f31e331b

        SHA256

        402654166f42d5bb576dcf1fa20eff7b6a49e907854d0624e997bf33478142cf

        SHA512

        910eddd905038ac8af9e83fa1c148f4bb5eb8a18fda88bd5fc34a89ac04f258e96c438412cbb51454bb7f437e5b1191bbcff8aa7e7fbbb0ebe9731899504e23a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycmP73CA00.exe

        Filesize

        552KB

        MD5

        a9dd58497e7369b17b35d0389f009648

        SHA1

        b23f066298f8896998641bbe002f9045a9a66ca6

        SHA256

        d9005f0a3a4fa0cb5b2ecb55b13d79fd61664af1da21e5d7d47e0c24081dd81a

        SHA512

        327d04c0c83f720c63fcd09d09cbecf0133cc2c3addac85730f179afad055fee695d00c8778a11855fff1caa73e8c9f6c2c84818ef4ee942ce3934cf7a09c82c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycmP73CA00.exe

        Filesize

        552KB

        MD5

        a9dd58497e7369b17b35d0389f009648

        SHA1

        b23f066298f8896998641bbe002f9045a9a66ca6

        SHA256

        d9005f0a3a4fa0cb5b2ecb55b13d79fd61664af1da21e5d7d47e0c24081dd81a

        SHA512

        327d04c0c83f720c63fcd09d09cbecf0133cc2c3addac85730f179afad055fee695d00c8778a11855fff1caa73e8c9f6c2c84818ef4ee942ce3934cf7a09c82c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urvH91js68.exe

        Filesize

        351KB

        MD5

        a3ac753269229392fd140bf6bd7fce49

        SHA1

        509b078eadc0ea977f2266ea0ec36c226f5792e5

        SHA256

        0102e14179d6832a369e46e8f88f63a835cc9e1fc6d56541c81844898d608d8c

        SHA512

        4312a7b3ea471cfa47f969fc1870e36d1cc384af2dfd5a36d9e4dc441ce99b6520fc4b3b6d14c42f6e587be31db73d0fc056bd946b14bc65c82fc599ae286ae9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urvH91js68.exe

        Filesize

        351KB

        MD5

        a3ac753269229392fd140bf6bd7fce49

        SHA1

        509b078eadc0ea977f2266ea0ec36c226f5792e5

        SHA256

        0102e14179d6832a369e46e8f88f63a835cc9e1fc6d56541c81844898d608d8c

        SHA512

        4312a7b3ea471cfa47f969fc1870e36d1cc384af2dfd5a36d9e4dc441ce99b6520fc4b3b6d14c42f6e587be31db73d0fc056bd946b14bc65c82fc599ae286ae9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrbl57zy99.exe

        Filesize

        410KB

        MD5

        dd957a86774a219d7a7c1dc3b2f39fdc

        SHA1

        44158d89d13015254526a17a20a65a3ddd05e85c

        SHA256

        e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb

        SHA512

        a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrbl57zy99.exe

        Filesize

        410KB

        MD5

        dd957a86774a219d7a7c1dc3b2f39fdc

        SHA1

        44158d89d13015254526a17a20a65a3ddd05e85c

        SHA256

        e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb

        SHA512

        a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc

      • memory/348-1102-0x0000000007FD0000-0x00000000080DA000-memory.dmp

        Filesize

        1.0MB

      • memory/348-1101-0x00000000079B0000-0x0000000007FC8000-memory.dmp

        Filesize

        6.1MB

      • memory/348-222-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-220-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-204-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-206-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-1115-0x00000000095A0000-0x00000000095F0000-memory.dmp

        Filesize

        320KB

      • memory/348-1114-0x0000000009500000-0x0000000009576000-memory.dmp

        Filesize

        472KB

      • memory/348-1113-0x0000000008EB0000-0x00000000093DC000-memory.dmp

        Filesize

        5.2MB

      • memory/348-1112-0x0000000008CD0000-0x0000000008E92000-memory.dmp

        Filesize

        1.8MB

      • memory/348-208-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-1111-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-1110-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-1109-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-1108-0x00000000084C0000-0x0000000008526000-memory.dmp

        Filesize

        408KB

      • memory/348-1107-0x0000000008420000-0x00000000084B2000-memory.dmp

        Filesize

        584KB

      • memory/348-1105-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-1104-0x0000000008120000-0x000000000815C000-memory.dmp

        Filesize

        240KB

      • memory/348-1103-0x0000000008100000-0x0000000008112000-memory.dmp

        Filesize

        72KB

      • memory/348-223-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-228-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-226-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-224-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-191-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-192-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-194-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-196-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-198-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-200-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-202-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-218-0x0000000002D20000-0x0000000002D6B000-memory.dmp

        Filesize

        300KB

      • memory/348-1116-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-219-0x00000000073F0000-0x0000000007400000-memory.dmp

        Filesize

        64KB

      • memory/348-210-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-212-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-214-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/348-216-0x0000000004C20000-0x0000000004C5E000-memory.dmp

        Filesize

        248KB

      • memory/2296-1122-0x0000000000CF0000-0x0000000000D22000-memory.dmp

        Filesize

        200KB

      • memory/2296-1123-0x00000000055E0000-0x00000000055F0000-memory.dmp

        Filesize

        64KB

      • memory/3564-181-0x0000000000400000-0x0000000002BC5000-memory.dmp

        Filesize

        39.8MB

      • memory/3564-170-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-148-0x00000000072C0000-0x0000000007864000-memory.dmp

        Filesize

        5.6MB

      • memory/3564-152-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/3564-151-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-186-0x0000000000400000-0x0000000002BC5000-memory.dmp

        Filesize

        39.8MB

      • memory/3564-184-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/3564-150-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-183-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/3564-182-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/3564-154-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB

      • memory/3564-180-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-178-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-176-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-174-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-172-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-168-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-166-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-164-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-162-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-160-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-149-0x0000000002CD0000-0x0000000002CFD000-memory.dmp

        Filesize

        180KB

      • memory/3564-158-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-155-0x00000000049E0000-0x00000000049F2000-memory.dmp

        Filesize

        72KB

      • memory/3564-156-0x00000000072B0000-0x00000000072C0000-memory.dmp

        Filesize

        64KB