Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 19:32

General

  • Target

    0a6f8bdd75d3726c00fe8eb92e545ff7ece1d0556463cbeea4b532e2ced9251c.exe

  • Size

    658KB

  • MD5

    14430974559c8ac1df4a65a7a5224e7f

  • SHA1

    2252155747006dac7e8464a8761a6839b66f1cf7

  • SHA256

    0a6f8bdd75d3726c00fe8eb92e545ff7ece1d0556463cbeea4b532e2ced9251c

  • SHA512

    782a6c4e2e2a16870b3ed6d99bfceaff5b355bc21e9550fdc72cad45317b512b9251abe438bdee414ce2fceb9be804184f9962b7989bcdcb361578918757a180

  • SSDEEP

    12288:5Mr1y90FHl4wWSGp530SOqC6NndxP1JINDeg5RJIql5+qyH/83yy:gyKHrWSGp53nOqXDy95fZoTy

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a6f8bdd75d3726c00fe8eb92e545ff7ece1d0556463cbeea4b532e2ced9251c.exe
    "C:\Users\Admin\AppData\Local\Temp\0a6f8bdd75d3726c00fe8eb92e545ff7ece1d0556463cbeea4b532e2ced9251c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycQp37Vq48.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycQp37Vq48.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urYv49Bj06.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urYv49Bj06.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 1080
          4⤵
          • Program crash
          PID:2768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrhD60dn57.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrhD60dn57.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1912
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 1896
          4⤵
          • Program crash
          PID:3108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuIW14lH71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuIW14lH71.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1332 -ip 1332
    1⤵
      PID:3292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1912 -ip 1912
      1⤵
        PID:1572
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1812

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuIW14lH71.exe

        Filesize

        175KB

        MD5

        75ced8ad0d8cd237ebc9cb7b00852651

        SHA1

        adab63df3e0a40fd9f170ab57da66f01f226141c

        SHA256

        a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

        SHA512

        f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuIW14lH71.exe

        Filesize

        175KB

        MD5

        75ced8ad0d8cd237ebc9cb7b00852651

        SHA1

        adab63df3e0a40fd9f170ab57da66f01f226141c

        SHA256

        a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

        SHA512

        f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycQp37Vq48.exe

        Filesize

        513KB

        MD5

        d9baa8c5fc33c4437b3c4e637cf6c40e

        SHA1

        7cbfe926400be264e5856f3aaf5426b323a43c02

        SHA256

        7963a9a48ea76e5ce950c52d8988b380b6ea34a8352aae1df63e0343e8368714

        SHA512

        5dae2ff9c33d839fd12e8187d77be9e93f731e67a695dff64fb3a289b4201485409d07ef1b73006816b7c672b2aa4c10ac2e4844d74b4b204ed08551a714084b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycQp37Vq48.exe

        Filesize

        513KB

        MD5

        d9baa8c5fc33c4437b3c4e637cf6c40e

        SHA1

        7cbfe926400be264e5856f3aaf5426b323a43c02

        SHA256

        7963a9a48ea76e5ce950c52d8988b380b6ea34a8352aae1df63e0343e8368714

        SHA512

        5dae2ff9c33d839fd12e8187d77be9e93f731e67a695dff64fb3a289b4201485409d07ef1b73006816b7c672b2aa4c10ac2e4844d74b4b204ed08551a714084b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urYv49Bj06.exe

        Filesize

        231KB

        MD5

        22b881080c5443070fcb5bf47fd14536

        SHA1

        9a81a5c111385c1d3bde3e017a553c55b9e8f376

        SHA256

        77d200f4afd1696760e4a0fd4f7ff8fbe2023789bbfb424b45a9805e50e3ea25

        SHA512

        7dfa621e59c40f5535f8cbd4ad453873b73b6e070baa0148abfc7063e9b2bc56a2773abc3a58642f50d8bdcb35c6ead0e0505fd49fe7733e05763396d88bc0c3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urYv49Bj06.exe

        Filesize

        231KB

        MD5

        22b881080c5443070fcb5bf47fd14536

        SHA1

        9a81a5c111385c1d3bde3e017a553c55b9e8f376

        SHA256

        77d200f4afd1696760e4a0fd4f7ff8fbe2023789bbfb424b45a9805e50e3ea25

        SHA512

        7dfa621e59c40f5535f8cbd4ad453873b73b6e070baa0148abfc7063e9b2bc56a2773abc3a58642f50d8bdcb35c6ead0e0505fd49fe7733e05763396d88bc0c3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrhD60dn57.exe

        Filesize

        289KB

        MD5

        f719d70ebe5b666b482c91b61516218e

        SHA1

        61da23978f14b2ef38e7d14113172346145fe6ba

        SHA256

        439904dbd91520dd5e82eb107d025d3f0e7a74e30f1e1743976c046d5b28e568

        SHA512

        be894aa89bf97710e2eeb77425880a452abffebdc742c3426222aa433d558636398b36df659d6cea3eae614a1a5fc624da514f17074bcf8034039ddb1a12ee72

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrhD60dn57.exe

        Filesize

        289KB

        MD5

        f719d70ebe5b666b482c91b61516218e

        SHA1

        61da23978f14b2ef38e7d14113172346145fe6ba

        SHA256

        439904dbd91520dd5e82eb107d025d3f0e7a74e30f1e1743976c046d5b28e568

        SHA512

        be894aa89bf97710e2eeb77425880a452abffebdc742c3426222aa433d558636398b36df659d6cea3eae614a1a5fc624da514f17074bcf8034039ddb1a12ee72

      • memory/1332-148-0x00000000006E0000-0x000000000070D000-memory.dmp

        Filesize

        180KB

      • memory/1332-149-0x0000000004B70000-0x0000000004B80000-memory.dmp

        Filesize

        64KB

      • memory/1332-150-0x0000000004B70000-0x0000000004B80000-memory.dmp

        Filesize

        64KB

      • memory/1332-151-0x0000000004B70000-0x0000000004B80000-memory.dmp

        Filesize

        64KB

      • memory/1332-152-0x0000000004B80000-0x0000000005124000-memory.dmp

        Filesize

        5.6MB

      • memory/1332-153-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-154-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-158-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-156-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-160-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-164-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-170-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-168-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-176-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-180-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-178-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-174-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-172-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-166-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-162-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/1332-181-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/1332-183-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/1764-1119-0x0000000005A10000-0x0000000005A20000-memory.dmp

        Filesize

        64KB

      • memory/1764-1118-0x0000000000E50000-0x0000000000E82000-memory.dmp

        Filesize

        200KB

      • memory/1912-195-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1912-222-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-191-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-192-0x0000000000660000-0x00000000006AB000-memory.dmp

        Filesize

        300KB

      • memory/1912-196-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-198-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-200-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-202-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-204-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-206-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-208-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-210-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-212-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-214-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-216-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-218-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-220-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-193-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1912-224-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-1097-0x00000000051A0000-0x00000000057B8000-memory.dmp

        Filesize

        6.1MB

      • memory/1912-1098-0x0000000005830000-0x000000000593A000-memory.dmp

        Filesize

        1.0MB

      • memory/1912-1099-0x0000000005970000-0x0000000005982000-memory.dmp

        Filesize

        72KB

      • memory/1912-1100-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1912-1101-0x0000000005990000-0x00000000059CC000-memory.dmp

        Filesize

        240KB

      • memory/1912-1103-0x0000000005C90000-0x0000000005D22000-memory.dmp

        Filesize

        584KB

      • memory/1912-1104-0x0000000005D30000-0x0000000005D96000-memory.dmp

        Filesize

        408KB

      • memory/1912-1105-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1912-1106-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1912-1107-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1912-1108-0x0000000006680000-0x00000000066F6000-memory.dmp

        Filesize

        472KB

      • memory/1912-1109-0x0000000006710000-0x0000000006760000-memory.dmp

        Filesize

        320KB

      • memory/1912-1110-0x0000000006780000-0x0000000006942000-memory.dmp

        Filesize

        1.8MB

      • memory/1912-188-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-189-0x0000000004B60000-0x0000000004B9E000-memory.dmp

        Filesize

        248KB

      • memory/1912-1111-0x0000000006B50000-0x000000000707C000-memory.dmp

        Filesize

        5.2MB

      • memory/1912-1112-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB