Analysis

  • max time kernel
    130s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 05:57

General

  • Target

    4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c.exe

  • Size

    666KB

  • MD5

    0c9778e3bd70c313dd3277be818477ae

  • SHA1

    6c25fe888c18f27f67453603dc650dc93f00e499

  • SHA256

    4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c

  • SHA512

    09781bd5bf7aac6de5e678a2941f989fb38f4a32f2d5c4e5db81adb20c9f38840740dd9f13390ef654b4f73ec547ec70c3cd4006d7903e31ef08b0c5077768c1

  • SSDEEP

    12288:3MrEy90Cq0QSSfm5BdFFwhCXdGI5k4H4oPrmR3X6NzP/B374PISYd+8:ry6Bm5Bn+hodGI53PK3wbB374H8

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c.exe
    "C:\Users\Admin\AppData\Local\Temp\4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaI51uL82.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaI51uL82.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urGz19Mh26.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urGz19Mh26.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 1084
          4⤵
          • Program crash
          PID:2084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrRD30Vc45.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrRD30Vc45.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 1636
          4⤵
          • Program crash
          PID:3800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuto87rp88.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuto87rp88.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4692
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1412 -ip 1412
    1⤵
      PID:3972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1784 -ip 1784
      1⤵
        PID:4796
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4832

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuto87rp88.exe

              Filesize

              175KB

              MD5

              e6e4b7ed4747402b050b5fff52d9d069

              SHA1

              805774b6c5bada1a56b5a9e59d3a3b9b2e56b381

              SHA256

              2a4c38b88fbe1d2f3710db1c986a6e340f22e444e63a90b785b9eb8174bf8c27

              SHA512

              d85f261f6176c7238180b078a9c97dba178deaf166008e526849b43d7862c55cfc8682ee375e7caba51d0642ae2c5360ea2ab71f6e9f1ec8c25c84d5ba60fa4c

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuto87rp88.exe

              Filesize

              175KB

              MD5

              e6e4b7ed4747402b050b5fff52d9d069

              SHA1

              805774b6c5bada1a56b5a9e59d3a3b9b2e56b381

              SHA256

              2a4c38b88fbe1d2f3710db1c986a6e340f22e444e63a90b785b9eb8174bf8c27

              SHA512

              d85f261f6176c7238180b078a9c97dba178deaf166008e526849b43d7862c55cfc8682ee375e7caba51d0642ae2c5360ea2ab71f6e9f1ec8c25c84d5ba60fa4c

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaI51uL82.exe

              Filesize

              522KB

              MD5

              e88650088bd20f4d4f59441576a31cad

              SHA1

              749615187b86a1b04662a1f5610a22284f774eea

              SHA256

              e101d7bbb5bcada122f27c36c65f63dbaf5ea0dcc8189b3697f3d567d69f7250

              SHA512

              f088e73d9d80f7a2bb1e30555ed4d4b86ad8e871efda49ffecaf50ca5c7d8349cc955f193e5c16b391acdb2b0f4085a5d3856597ef1102df46e48f3cad569924

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycaI51uL82.exe

              Filesize

              522KB

              MD5

              e88650088bd20f4d4f59441576a31cad

              SHA1

              749615187b86a1b04662a1f5610a22284f774eea

              SHA256

              e101d7bbb5bcada122f27c36c65f63dbaf5ea0dcc8189b3697f3d567d69f7250

              SHA512

              f088e73d9d80f7a2bb1e30555ed4d4b86ad8e871efda49ffecaf50ca5c7d8349cc955f193e5c16b391acdb2b0f4085a5d3856597ef1102df46e48f3cad569924

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urGz19Mh26.exe

              Filesize

              250KB

              MD5

              452980bfe4732aaef2162c53c88f7ea4

              SHA1

              31b4e28e7ffdf36023ea859f0c343036dfb0470e

              SHA256

              855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

              SHA512

              7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urGz19Mh26.exe

              Filesize

              250KB

              MD5

              452980bfe4732aaef2162c53c88f7ea4

              SHA1

              31b4e28e7ffdf36023ea859f0c343036dfb0470e

              SHA256

              855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

              SHA512

              7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrRD30Vc45.exe

              Filesize

              309KB

              MD5

              284f5cacca006d191a474f8c3eada4c1

              SHA1

              05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

              SHA256

              52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

              SHA512

              26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrRD30Vc45.exe

              Filesize

              309KB

              MD5

              284f5cacca006d191a474f8c3eada4c1

              SHA1

              05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

              SHA256

              52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

              SHA512

              26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

            • memory/1412-148-0x0000000004E20000-0x00000000053C4000-memory.dmp

              Filesize

              5.6MB

            • memory/1412-149-0x0000000000700000-0x000000000072D000-memory.dmp

              Filesize

              180KB

            • memory/1412-150-0x0000000004E10000-0x0000000004E20000-memory.dmp

              Filesize

              64KB

            • memory/1412-152-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-151-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-154-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-156-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-158-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-160-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-162-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-164-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-166-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-168-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-170-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-172-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-174-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-176-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-178-0x0000000002580000-0x0000000002592000-memory.dmp

              Filesize

              72KB

            • memory/1412-179-0x0000000000400000-0x0000000000582000-memory.dmp

              Filesize

              1.5MB

            • memory/1412-180-0x0000000004E10000-0x0000000004E20000-memory.dmp

              Filesize

              64KB

            • memory/1412-181-0x0000000004E10000-0x0000000004E20000-memory.dmp

              Filesize

              64KB

            • memory/1412-182-0x0000000004E10000-0x0000000004E20000-memory.dmp

              Filesize

              64KB

            • memory/1412-184-0x0000000000400000-0x0000000000582000-memory.dmp

              Filesize

              1.5MB

            • memory/1784-189-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-190-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-192-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-194-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-196-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-198-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-200-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-202-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-204-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-206-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-208-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-210-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-212-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-214-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-216-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-218-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-220-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-222-0x0000000005110000-0x000000000514E000-memory.dmp

              Filesize

              248KB

            • memory/1784-267-0x0000000002200000-0x000000000224B000-memory.dmp

              Filesize

              300KB

            • memory/1784-269-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/1784-270-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/1784-272-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/1784-1099-0x00000000052E0000-0x00000000058F8000-memory.dmp

              Filesize

              6.1MB

            • memory/1784-1100-0x0000000005980000-0x0000000005A8A000-memory.dmp

              Filesize

              1.0MB

            • memory/1784-1101-0x0000000005AC0000-0x0000000005AD2000-memory.dmp

              Filesize

              72KB

            • memory/1784-1102-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/1784-1103-0x0000000005AE0000-0x0000000005B1C000-memory.dmp

              Filesize

              240KB

            • memory/1784-1104-0x0000000005DE0000-0x0000000005E72000-memory.dmp

              Filesize

              584KB

            • memory/1784-1105-0x0000000005E80000-0x0000000005EE6000-memory.dmp

              Filesize

              408KB

            • memory/1784-1106-0x0000000006590000-0x0000000006752000-memory.dmp

              Filesize

              1.8MB

            • memory/1784-1108-0x0000000006770000-0x0000000006C9C000-memory.dmp

              Filesize

              5.2MB

            • memory/1784-1109-0x0000000006EF0000-0x0000000006F66000-memory.dmp

              Filesize

              472KB

            • memory/1784-1110-0x0000000006F70000-0x0000000006FC0000-memory.dmp

              Filesize

              320KB

            • memory/1784-1111-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/1784-1112-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/1784-1113-0x0000000004B10000-0x0000000004B20000-memory.dmp

              Filesize

              64KB

            • memory/4692-1119-0x0000000000B50000-0x0000000000B82000-memory.dmp

              Filesize

              200KB

            • memory/4692-1120-0x00000000057A0000-0x00000000057B0000-memory.dmp

              Filesize

              64KB