Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 05:42

General

  • Target

    057c7f87d54eae45885bea4bb9fcc0ec40834c642ccac4636dff1c516e3d7663.exe

  • Size

    693KB

  • MD5

    a01680fa508a3c33265a952d6adb673d

  • SHA1

    83da31059f1c9bc4be2200313616d5f766ebb6c1

  • SHA256

    057c7f87d54eae45885bea4bb9fcc0ec40834c642ccac4636dff1c516e3d7663

  • SHA512

    114537432fde9328cd160fab4d02d5a5c4eec06e5de854dba7d92a7c0bfdc3b13930295fa9732d26e07bbefe726dbcfcf46424efec4596d2c34b1633a3e2d86d

  • SSDEEP

    12288:TMr/y90eBT2UnVWwasYk5SAVdX3/JcT1TT3pdH24skl0QB+4Lw:wyLVVFasYk5S0dXPJEbH7flrBLw

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\057c7f87d54eae45885bea4bb9fcc0ec40834c642ccac4636dff1c516e3d7663.exe
    "C:\Users\Admin\AppData\Local\Temp\057c7f87d54eae45885bea4bb9fcc0ec40834c642ccac4636dff1c516e3d7663.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ychE60ES03.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ychE60ES03.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urzr98Wj46.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urzr98Wj46.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1076
          4⤵
          • Program crash
          PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wran57fG61.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wran57fG61.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 1408
          4⤵
          • Program crash
          PID:4464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuqp88GP12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuqp88GP12.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2324
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1924 -ip 1924
    1⤵
      PID:4884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4456 -ip 4456
      1⤵
        PID:2084

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuqp88GP12.exe

              Filesize

              175KB

              MD5

              74add4ffc4f5e2655a473c81a257a822

              SHA1

              e0e17f663c50d8d8aa127f762d9e4b046964b203

              SHA256

              c1c1a109d7f9085880d0a0553b543f3474bb0ce47d3036f9a8716f8d3a262951

              SHA512

              af674f484e00d7644bf63f3ae156679b96731ffb3df7095d8c427358987f4103ccf97b2f036cd32a6bd4173dd9cc42fb11375d6244897a47d100510b5a5ca958

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuqp88GP12.exe

              Filesize

              175KB

              MD5

              74add4ffc4f5e2655a473c81a257a822

              SHA1

              e0e17f663c50d8d8aa127f762d9e4b046964b203

              SHA256

              c1c1a109d7f9085880d0a0553b543f3474bb0ce47d3036f9a8716f8d3a262951

              SHA512

              af674f484e00d7644bf63f3ae156679b96731ffb3df7095d8c427358987f4103ccf97b2f036cd32a6bd4173dd9cc42fb11375d6244897a47d100510b5a5ca958

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ychE60ES03.exe

              Filesize

              549KB

              MD5

              83018b2f80825cd83726b6479c8220c3

              SHA1

              012a450703dde5cccc6bdd170530cc06fb6f4e07

              SHA256

              45b0ef01a05ef0d924123b2f3818e66089fd5321d13d4aa29e151d2ee874592d

              SHA512

              83b6575891b6d2143717378e9f5ec7d2370db60e2d7c0e4cc218054280af4d635be301a2d1ed3762527fa2df57a5a26e07e0279399082212c3ef22dbab176610

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ychE60ES03.exe

              Filesize

              549KB

              MD5

              83018b2f80825cd83726b6479c8220c3

              SHA1

              012a450703dde5cccc6bdd170530cc06fb6f4e07

              SHA256

              45b0ef01a05ef0d924123b2f3818e66089fd5321d13d4aa29e151d2ee874592d

              SHA512

              83b6575891b6d2143717378e9f5ec7d2370db60e2d7c0e4cc218054280af4d635be301a2d1ed3762527fa2df57a5a26e07e0279399082212c3ef22dbab176610

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urzr98Wj46.exe

              Filesize

              352KB

              MD5

              1f2dffeb3be61b7f59bea1593b2542fa

              SHA1

              92c410b0dc87bcdd8722a0cbb6bc72e8742f3e4e

              SHA256

              b6a85958be9314965b992380492628808c92bea16b4a4e84637c0bb2d2851266

              SHA512

              abecf645ea38dfd5bf8769df9c015cd16251fbde0b22a1662bd493f256225bc3b3ac7bd2dee4a0678b855f619545a09d8a3a7810a949b399b1f27e192b3d4952

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urzr98Wj46.exe

              Filesize

              352KB

              MD5

              1f2dffeb3be61b7f59bea1593b2542fa

              SHA1

              92c410b0dc87bcdd8722a0cbb6bc72e8742f3e4e

              SHA256

              b6a85958be9314965b992380492628808c92bea16b4a4e84637c0bb2d2851266

              SHA512

              abecf645ea38dfd5bf8769df9c015cd16251fbde0b22a1662bd493f256225bc3b3ac7bd2dee4a0678b855f619545a09d8a3a7810a949b399b1f27e192b3d4952

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wran57fG61.exe

              Filesize

              410KB

              MD5

              97581d18424b6968bffda63f4e27c2b0

              SHA1

              501bc8daae8308a502ceae32244e79e55d2282c3

              SHA256

              99908812a3e7d39049e6a424c5eaed09d067384e8997d55ea8804be915a6df30

              SHA512

              bb82a81e022d658c76192e97266feec3731260ac514f7f0c12ee96a9a81c8947c7ac756969b3671c1eef648a69f3bb39ec0fb3fb4cd4d0de272d3f2aeec2b1ba

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wran57fG61.exe

              Filesize

              410KB

              MD5

              97581d18424b6968bffda63f4e27c2b0

              SHA1

              501bc8daae8308a502ceae32244e79e55d2282c3

              SHA256

              99908812a3e7d39049e6a424c5eaed09d067384e8997d55ea8804be915a6df30

              SHA512

              bb82a81e022d658c76192e97266feec3731260ac514f7f0c12ee96a9a81c8947c7ac756969b3671c1eef648a69f3bb39ec0fb3fb4cd4d0de272d3f2aeec2b1ba

            • memory/1924-148-0x0000000007320000-0x00000000078C4000-memory.dmp

              Filesize

              5.6MB

            • memory/1924-149-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

              Filesize

              180KB

            • memory/1924-151-0x0000000002F30000-0x0000000002F40000-memory.dmp

              Filesize

              64KB

            • memory/1924-150-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-153-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-155-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-152-0x0000000002F30000-0x0000000002F40000-memory.dmp

              Filesize

              64KB

            • memory/1924-157-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-159-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-161-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-163-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-165-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-167-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-169-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-171-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-173-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-175-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-177-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-179-0x0000000004B90000-0x0000000004BA2000-memory.dmp

              Filesize

              72KB

            • memory/1924-180-0x0000000000400000-0x0000000002BC5000-memory.dmp

              Filesize

              39.8MB

            • memory/1924-181-0x0000000002F30000-0x0000000002F40000-memory.dmp

              Filesize

              64KB

            • memory/1924-183-0x0000000002F30000-0x0000000002F40000-memory.dmp

              Filesize

              64KB

            • memory/1924-184-0x0000000002F30000-0x0000000002F40000-memory.dmp

              Filesize

              64KB

            • memory/1924-185-0x0000000000400000-0x0000000002BC5000-memory.dmp

              Filesize

              39.8MB

            • memory/2324-1121-0x0000000000670000-0x00000000006A2000-memory.dmp

              Filesize

              200KB

            • memory/2324-1122-0x00000000052C0000-0x00000000052D0000-memory.dmp

              Filesize

              64KB

            • memory/4456-190-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-225-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-195-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-197-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-199-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-201-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-203-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-205-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-206-0x00000000045E0000-0x000000000462B000-memory.dmp

              Filesize

              300KB

            • memory/4456-209-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-208-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-210-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-213-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-215-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-217-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-212-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-219-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-221-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-223-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-193-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-227-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-1100-0x0000000007920000-0x0000000007F38000-memory.dmp

              Filesize

              6.1MB

            • memory/4456-1101-0x0000000007FC0000-0x00000000080CA000-memory.dmp

              Filesize

              1.0MB

            • memory/4456-1102-0x0000000008100000-0x0000000008112000-memory.dmp

              Filesize

              72KB

            • memory/4456-1103-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-1104-0x0000000008120000-0x000000000815C000-memory.dmp

              Filesize

              240KB

            • memory/4456-1106-0x0000000008420000-0x00000000084B2000-memory.dmp

              Filesize

              584KB

            • memory/4456-1107-0x00000000084C0000-0x0000000008526000-memory.dmp

              Filesize

              408KB

            • memory/4456-1108-0x0000000008BD0000-0x0000000008D92000-memory.dmp

              Filesize

              1.8MB

            • memory/4456-1109-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-1110-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-1111-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/4456-1112-0x0000000008DB0000-0x00000000092DC000-memory.dmp

              Filesize

              5.2MB

            • memory/4456-191-0x0000000007750000-0x000000000778E000-memory.dmp

              Filesize

              248KB

            • memory/4456-1113-0x0000000009650000-0x00000000096C6000-memory.dmp

              Filesize

              472KB

            • memory/4456-1114-0x00000000096E0000-0x0000000009730000-memory.dmp

              Filesize

              320KB

            • memory/4456-1115-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB