Analysis

  • max time kernel
    145s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2023 20:05

General

  • Target

    62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe

  • Size

    658KB

  • MD5

    4c74fc8bc1e64eed54d5a500882f718d

  • SHA1

    e23b317e9d45bf3ee3c2128f416ef0b223b999ad

  • SHA256

    62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2

  • SHA512

    a5968c0de83e464349ba53b184b4f95ac520759cb46194283b8a470113cd1d7ba7de20572a31553a3bf0aef70fae1172e505b264633bf751648170cc4b8df838

  • SSDEEP

    12288:YMryy90qg2e3OcstkRT/NnWdWz3rrgpRJIqV5WqEH4:ay7gv3KtkT/trIpfRG4

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe
    "C:\Users\Admin\AppData\Local\Temp\62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycAc05UC30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycAc05UC30.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNw29Xk46.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNw29Xk46.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 1080
          4⤵
          • Program crash
          PID:4176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrdX54nG71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrdX54nG71.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 1408
          4⤵
          • Program crash
          PID:220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuOG21Rw39.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuOG21Rw39.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 668 -ip 668
    1⤵
      PID:1428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2404 -ip 2404
      1⤵
        PID:3852

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuOG21Rw39.exe

        Filesize

        175KB

        MD5

        75ced8ad0d8cd237ebc9cb7b00852651

        SHA1

        adab63df3e0a40fd9f170ab57da66f01f226141c

        SHA256

        a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

        SHA512

        f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuOG21Rw39.exe

        Filesize

        175KB

        MD5

        75ced8ad0d8cd237ebc9cb7b00852651

        SHA1

        adab63df3e0a40fd9f170ab57da66f01f226141c

        SHA256

        a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

        SHA512

        f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycAc05UC30.exe

        Filesize

        513KB

        MD5

        92bc2f87d50f6b4d770e63fd5c195936

        SHA1

        015ca07944abf111831c7451f5189fbe946df2d9

        SHA256

        8b9c1ce117d11199a801f21d7d395f415ccd5c3cf31a4a34a161d7c211d2a169

        SHA512

        063e77bd5783cd8c772ebb56483c996e3d0ce4cc2f1d5dcd94299e3ac3f1c72f3e10582543d66e681c9d0af4519588e7eeb345583adaa196461c41a96f0dd6bc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycAc05UC30.exe

        Filesize

        513KB

        MD5

        92bc2f87d50f6b4d770e63fd5c195936

        SHA1

        015ca07944abf111831c7451f5189fbe946df2d9

        SHA256

        8b9c1ce117d11199a801f21d7d395f415ccd5c3cf31a4a34a161d7c211d2a169

        SHA512

        063e77bd5783cd8c772ebb56483c996e3d0ce4cc2f1d5dcd94299e3ac3f1c72f3e10582543d66e681c9d0af4519588e7eeb345583adaa196461c41a96f0dd6bc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNw29Xk46.exe

        Filesize

        231KB

        MD5

        22b881080c5443070fcb5bf47fd14536

        SHA1

        9a81a5c111385c1d3bde3e017a553c55b9e8f376

        SHA256

        77d200f4afd1696760e4a0fd4f7ff8fbe2023789bbfb424b45a9805e50e3ea25

        SHA512

        7dfa621e59c40f5535f8cbd4ad453873b73b6e070baa0148abfc7063e9b2bc56a2773abc3a58642f50d8bdcb35c6ead0e0505fd49fe7733e05763396d88bc0c3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNw29Xk46.exe

        Filesize

        231KB

        MD5

        22b881080c5443070fcb5bf47fd14536

        SHA1

        9a81a5c111385c1d3bde3e017a553c55b9e8f376

        SHA256

        77d200f4afd1696760e4a0fd4f7ff8fbe2023789bbfb424b45a9805e50e3ea25

        SHA512

        7dfa621e59c40f5535f8cbd4ad453873b73b6e070baa0148abfc7063e9b2bc56a2773abc3a58642f50d8bdcb35c6ead0e0505fd49fe7733e05763396d88bc0c3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrdX54nG71.exe

        Filesize

        289KB

        MD5

        f719d70ebe5b666b482c91b61516218e

        SHA1

        61da23978f14b2ef38e7d14113172346145fe6ba

        SHA256

        439904dbd91520dd5e82eb107d025d3f0e7a74e30f1e1743976c046d5b28e568

        SHA512

        be894aa89bf97710e2eeb77425880a452abffebdc742c3426222aa433d558636398b36df659d6cea3eae614a1a5fc624da514f17074bcf8034039ddb1a12ee72

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrdX54nG71.exe

        Filesize

        289KB

        MD5

        f719d70ebe5b666b482c91b61516218e

        SHA1

        61da23978f14b2ef38e7d14113172346145fe6ba

        SHA256

        439904dbd91520dd5e82eb107d025d3f0e7a74e30f1e1743976c046d5b28e568

        SHA512

        be894aa89bf97710e2eeb77425880a452abffebdc742c3426222aa433d558636398b36df659d6cea3eae614a1a5fc624da514f17074bcf8034039ddb1a12ee72

      • memory/668-148-0x0000000004C60000-0x0000000005204000-memory.dmp

        Filesize

        5.6MB

      • memory/668-149-0x0000000000650000-0x000000000067D000-memory.dmp

        Filesize

        180KB

      • memory/668-150-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/668-151-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-152-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-154-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-156-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-158-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-160-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-162-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-164-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-166-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-168-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-170-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-172-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-174-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-176-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-178-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/668-179-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/668-180-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/668-181-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/668-182-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/668-184-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/1412-1120-0x00000000001F0000-0x0000000000222000-memory.dmp

        Filesize

        200KB

      • memory/1412-1121-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/2404-192-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-290-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-194-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-196-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-198-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-200-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-202-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-204-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-206-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-208-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-210-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-212-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-214-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-216-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-218-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-220-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-222-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-286-0x00000000006B0000-0x00000000006FB000-memory.dmp

        Filesize

        300KB

      • memory/2404-287-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-189-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-292-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1099-0x00000000052D0000-0x00000000058E8000-memory.dmp

        Filesize

        6.1MB

      • memory/2404-1100-0x0000000005970000-0x0000000005A7A000-memory.dmp

        Filesize

        1.0MB

      • memory/2404-1101-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

        Filesize

        72KB

      • memory/2404-1102-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

        Filesize

        240KB

      • memory/2404-1103-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1105-0x0000000005DD0000-0x0000000005E62000-memory.dmp

        Filesize

        584KB

      • memory/2404-1106-0x0000000005E70000-0x0000000005ED6000-memory.dmp

        Filesize

        408KB

      • memory/2404-1107-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1108-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1109-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1110-0x00000000067C0000-0x0000000006982000-memory.dmp

        Filesize

        1.8MB

      • memory/2404-1111-0x00000000069B0000-0x0000000006EDC000-memory.dmp

        Filesize

        5.2MB

      • memory/2404-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp

        Filesize

        248KB

      • memory/2404-1112-0x0000000007200000-0x0000000007276000-memory.dmp

        Filesize

        472KB

      • memory/2404-1113-0x00000000072A0000-0x00000000072F0000-memory.dmp

        Filesize

        320KB

      • memory/2404-1114-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB