Analysis

  • max time kernel
    79s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 06:11

General

  • Target

    dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe

  • Size

    538KB

  • MD5

    9e3473013bb526f5e1d78fd99cdf0b08

  • SHA1

    394eff0c8fadd58e9678cbba4bc263e38bf86469

  • SHA256

    dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780

  • SHA512

    8593b60d6b3ab0b29636ee6625df7c80e7f6b1a07e1f9dcda31790d4e54f9da80bc0738e03a9a9b146f6392c80c7d37b1b2ed9c5e9b8a4f4854f9294100a7f93

  • SSDEEP

    12288:4MrLy90u44oCQmIcpBCdo9PZ73z22yM5uNAe6z3at6b7rOg:Dyj442cb4ob7+wz306b2g

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe
    "C:\Users\Admin\AppData\Local\Temp\dde64f7669c607d355386f46886a0bdf4b2af337355ba201121f8433dfb8a780.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkHu6451Ph.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkHu6451Ph.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw36iG79zy60.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw36iG79zy60.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmA96Zs15HD.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmA96Zs15HD.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 2096
          4⤵
          • Program crash
          PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upyz72er55UH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upyz72er55UH.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 380 -ip 380
    1⤵
      PID:4384

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upyz72er55UH.exe

            Filesize

            175KB

            MD5

            617af5e3d26db77b1029fcf44b9ac807

            SHA1

            16a59169abd39f71452acf63de839e6906153cb5

            SHA256

            4b45a491c069c06309350a3de84cd17402dfc1d9ff76103e2f5cf0fcfe645f0d

            SHA512

            a96639d53b3b00e7cb9cdfc92c1334e799bd59d9dacee6b0be0ea1d6c8792f5b3e3d62c3a7d93c6576d20ce994c20ae7c8b57df44b33ed9fb930995477a44a6c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upyz72er55UH.exe

            Filesize

            175KB

            MD5

            617af5e3d26db77b1029fcf44b9ac807

            SHA1

            16a59169abd39f71452acf63de839e6906153cb5

            SHA256

            4b45a491c069c06309350a3de84cd17402dfc1d9ff76103e2f5cf0fcfe645f0d

            SHA512

            a96639d53b3b00e7cb9cdfc92c1334e799bd59d9dacee6b0be0ea1d6c8792f5b3e3d62c3a7d93c6576d20ce994c20ae7c8b57df44b33ed9fb930995477a44a6c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkHu6451Ph.exe

            Filesize

            393KB

            MD5

            a47063c320c75d66af211fcabfbae7a0

            SHA1

            880a0c843325901f47289fa14fa5c2f39896c84f

            SHA256

            3a842fa06715a08ee324759bd1daecef7d5cffd46daa0486ded6b96bddb897b2

            SHA512

            3ae331dbee082713c92702cb39aa59fec9cc61602a7f689451df4015699b0018dab3213004a61ce364b4b1b8e6bb77c8f7690dce01b5dca8fcfc3a7a98a26f68

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkHu6451Ph.exe

            Filesize

            393KB

            MD5

            a47063c320c75d66af211fcabfbae7a0

            SHA1

            880a0c843325901f47289fa14fa5c2f39896c84f

            SHA256

            3a842fa06715a08ee324759bd1daecef7d5cffd46daa0486ded6b96bddb897b2

            SHA512

            3ae331dbee082713c92702cb39aa59fec9cc61602a7f689451df4015699b0018dab3213004a61ce364b4b1b8e6bb77c8f7690dce01b5dca8fcfc3a7a98a26f68

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw36iG79zy60.exe

            Filesize

            18KB

            MD5

            823e8c70d9f15dae9cb2721dd63e2a2d

            SHA1

            cf7795e4533bd8475678b1c8413e5a4f5e0049e9

            SHA256

            ff0bd3930782887615a28e199883100ee57feb6d5d9dbe0214dd98cc0d5a2685

            SHA512

            c10d9e39a4004bb1ebb26f1680335eab22995549498ba9a4681b6c43a6036b58bafe1455cfd9b9223f7b62bb74840530ab307557d27231ff6caac47747eba8a4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw36iG79zy60.exe

            Filesize

            18KB

            MD5

            823e8c70d9f15dae9cb2721dd63e2a2d

            SHA1

            cf7795e4533bd8475678b1c8413e5a4f5e0049e9

            SHA256

            ff0bd3930782887615a28e199883100ee57feb6d5d9dbe0214dd98cc0d5a2685

            SHA512

            c10d9e39a4004bb1ebb26f1680335eab22995549498ba9a4681b6c43a6036b58bafe1455cfd9b9223f7b62bb74840530ab307557d27231ff6caac47747eba8a4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmA96Zs15HD.exe

            Filesize

            309KB

            MD5

            284f5cacca006d191a474f8c3eada4c1

            SHA1

            05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

            SHA256

            52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

            SHA512

            26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmA96Zs15HD.exe

            Filesize

            309KB

            MD5

            284f5cacca006d191a474f8c3eada4c1

            SHA1

            05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

            SHA256

            52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

            SHA512

            26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

          • memory/380-153-0x0000000004E10000-0x00000000053B4000-memory.dmp

            Filesize

            5.6MB

          • memory/380-156-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-154-0x0000000000700000-0x000000000074B000-memory.dmp

            Filesize

            300KB

          • memory/380-155-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-157-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-158-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-159-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-161-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-163-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-165-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-167-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-169-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-171-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-173-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-175-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-177-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-179-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-181-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-183-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-185-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-187-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-189-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-191-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-193-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-195-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-197-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-199-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-201-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-203-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-205-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-207-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-209-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-211-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-213-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-215-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-217-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-219-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-221-0x0000000002740000-0x000000000277E000-memory.dmp

            Filesize

            248KB

          • memory/380-1064-0x00000000053C0000-0x00000000059D8000-memory.dmp

            Filesize

            6.1MB

          • memory/380-1065-0x0000000004C60000-0x0000000004D6A000-memory.dmp

            Filesize

            1.0MB

          • memory/380-1066-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

            Filesize

            72KB

          • memory/380-1067-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-1068-0x0000000004DC0000-0x0000000004DFC000-memory.dmp

            Filesize

            240KB

          • memory/380-1070-0x0000000005CA0000-0x0000000005D06000-memory.dmp

            Filesize

            408KB

          • memory/380-1071-0x0000000006370000-0x0000000006402000-memory.dmp

            Filesize

            584KB

          • memory/380-1072-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-1073-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-1074-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-1075-0x0000000006530000-0x00000000065A6000-memory.dmp

            Filesize

            472KB

          • memory/380-1076-0x00000000065C0000-0x0000000006610000-memory.dmp

            Filesize

            320KB

          • memory/380-1077-0x0000000004E00000-0x0000000004E10000-memory.dmp

            Filesize

            64KB

          • memory/380-1078-0x0000000006640000-0x0000000006802000-memory.dmp

            Filesize

            1.8MB

          • memory/380-1079-0x0000000006820000-0x0000000006D4C000-memory.dmp

            Filesize

            5.2MB

          • memory/440-147-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

            Filesize

            40KB

          • memory/1856-1085-0x0000000000BA0000-0x0000000000BD2000-memory.dmp

            Filesize

            200KB

          • memory/1856-1086-0x0000000005730000-0x0000000005740000-memory.dmp

            Filesize

            64KB