Analysis

  • max time kernel
    143s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 07:07

General

  • Target

    d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2.exe

  • Size

    666KB

  • MD5

    a0e4036d230c140dfbac3ed770d81063

  • SHA1

    7376cda3fe96c47a7183430ecc46cbe087b80c3d

  • SHA256

    d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2

  • SHA512

    fd48d46ec852dd1dc57ad74da7844e1ca1b06326396132bf199a3a7feb53c24a38a987b3926bf9e5ea18c189ffad91f71ba851afdfe08a1b8ff26441a5e53457

  • SSDEEP

    12288:wMrmy90hwPxwBsiKAVKJNSRtCzXdGM5k4QZorHmR3X6NnPTB3WtPISYdAghnMmm:GyLwBsipkJCtudGM5vr23wLB3WtZghLm

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2.exe
    "C:\Users\Admin\AppData\Local\Temp\d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycXS43FE10.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycXS43FE10.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urHq18TA30.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urHq18TA30.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 1080
          4⤵
          • Program crash
          PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraT53Cw09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraT53Cw09.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1860
          4⤵
          • Program crash
          PID:4100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWw49Rn37.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWw49Rn37.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2780
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3844 -ip 3844
    1⤵
      PID:1600
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2480 -ip 2480
      1⤵
        PID:4372

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWw49Rn37.exe

              Filesize

              175KB

              MD5

              f050e47a697562fa284bf21b3dfa1425

              SHA1

              4bbcc9ff52b13cc1643d941b68861d3a399ddded

              SHA256

              fc46a11420dd835875b2341a0e46e1fdb74086a56e7a179aae535af534f4d4e5

              SHA512

              f4d8821bc135ca30077361e025b69981937ff27015a4827c05287ae12ac4755148138f36dd5519aa66be8da56fe56f4e1811d3aad801e8dbdc282c3e0b4c4160

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuWw49Rn37.exe

              Filesize

              175KB

              MD5

              f050e47a697562fa284bf21b3dfa1425

              SHA1

              4bbcc9ff52b13cc1643d941b68861d3a399ddded

              SHA256

              fc46a11420dd835875b2341a0e46e1fdb74086a56e7a179aae535af534f4d4e5

              SHA512

              f4d8821bc135ca30077361e025b69981937ff27015a4827c05287ae12ac4755148138f36dd5519aa66be8da56fe56f4e1811d3aad801e8dbdc282c3e0b4c4160

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycXS43FE10.exe

              Filesize

              522KB

              MD5

              3a590a13bc93ac78ba3dc3a81bd0a2ed

              SHA1

              285761d748da9dbc7aa137afceb1520200f1206e

              SHA256

              1447fb711113dfe0ab9c3980a372d15490c41f0baa8a0533b894e7cd59de309d

              SHA512

              c23751108cf622160dd93b29d7ce3905bdaca4eaa58e9b0c6bc816f19b4d84d6f6b84bbc43fc3f1b766045cda24ffac817ea36a973240ce8cdb4509b6bd140eb

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycXS43FE10.exe

              Filesize

              522KB

              MD5

              3a590a13bc93ac78ba3dc3a81bd0a2ed

              SHA1

              285761d748da9dbc7aa137afceb1520200f1206e

              SHA256

              1447fb711113dfe0ab9c3980a372d15490c41f0baa8a0533b894e7cd59de309d

              SHA512

              c23751108cf622160dd93b29d7ce3905bdaca4eaa58e9b0c6bc816f19b4d84d6f6b84bbc43fc3f1b766045cda24ffac817ea36a973240ce8cdb4509b6bd140eb

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urHq18TA30.exe

              Filesize

              250KB

              MD5

              452980bfe4732aaef2162c53c88f7ea4

              SHA1

              31b4e28e7ffdf36023ea859f0c343036dfb0470e

              SHA256

              855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

              SHA512

              7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urHq18TA30.exe

              Filesize

              250KB

              MD5

              452980bfe4732aaef2162c53c88f7ea4

              SHA1

              31b4e28e7ffdf36023ea859f0c343036dfb0470e

              SHA256

              855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

              SHA512

              7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraT53Cw09.exe

              Filesize

              309KB

              MD5

              284f5cacca006d191a474f8c3eada4c1

              SHA1

              05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

              SHA256

              52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

              SHA512

              26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraT53Cw09.exe

              Filesize

              309KB

              MD5

              284f5cacca006d191a474f8c3eada4c1

              SHA1

              05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

              SHA256

              52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

              SHA512

              26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

            • memory/2480-227-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-1102-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

              Filesize

              72KB

            • memory/2480-1113-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2480-1112-0x0000000006950000-0x0000000006E7C000-memory.dmp

              Filesize

              5.2MB

            • memory/2480-1111-0x0000000006780000-0x0000000006942000-memory.dmp

              Filesize

              1.8MB

            • memory/2480-1110-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2480-1109-0x0000000006600000-0x0000000006650000-memory.dmp

              Filesize

              320KB

            • memory/2480-1108-0x0000000006570000-0x00000000065E6000-memory.dmp

              Filesize

              472KB

            • memory/2480-1107-0x00000000064B0000-0x0000000006542000-memory.dmp

              Filesize

              584KB

            • memory/2480-1106-0x0000000005DE0000-0x0000000005E46000-memory.dmp

              Filesize

              408KB

            • memory/2480-1104-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2480-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

              Filesize

              240KB

            • memory/2480-1101-0x0000000005A10000-0x0000000005B1A000-memory.dmp

              Filesize

              1.0MB

            • memory/2480-1100-0x00000000053F0000-0x0000000005A08000-memory.dmp

              Filesize

              6.1MB

            • memory/2480-225-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-223-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-221-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-219-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-217-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-215-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-213-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-211-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-209-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-192-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-191-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-194-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-196-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-199-0x0000000000950000-0x000000000099B000-memory.dmp

              Filesize

              300KB

            • memory/2480-198-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-200-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2480-203-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-202-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2480-205-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2480-207-0x0000000002730000-0x000000000276E000-memory.dmp

              Filesize

              248KB

            • memory/2780-1119-0x0000000000840000-0x0000000000872000-memory.dmp

              Filesize

              200KB

            • memory/2780-1121-0x00000000054B0000-0x00000000054C0000-memory.dmp

              Filesize

              64KB

            • memory/2780-1120-0x00000000054B0000-0x00000000054C0000-memory.dmp

              Filesize

              64KB

            • memory/3844-170-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-166-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-182-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/3844-181-0x0000000000400000-0x0000000000582000-memory.dmp

              Filesize

              1.5MB

            • memory/3844-180-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-178-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-150-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/3844-176-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-174-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-153-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-172-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-151-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/3844-168-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-183-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/3844-164-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-162-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-160-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-158-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-156-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-154-0x0000000004AF0000-0x0000000004B02000-memory.dmp

              Filesize

              72KB

            • memory/3844-149-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/3844-148-0x00000000021E0000-0x000000000220D000-memory.dmp

              Filesize

              180KB

            • memory/3844-184-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/3844-186-0x0000000000400000-0x0000000000582000-memory.dmp

              Filesize

              1.5MB

            • memory/3844-152-0x0000000004C90000-0x0000000005234000-memory.dmp

              Filesize

              5.6MB