Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2023 19:26

General

  • Target

    bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe

  • Size

    526KB

  • MD5

    311d873a22b8c3f8a00a8e8aa4828a63

  • SHA1

    bf74603fbaf334c8700e10b2e220b991fc57e433

  • SHA256

    bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866

  • SHA512

    3acd83a060e93995c64b9ab52ce74b253d3f30264c1d8c2bdce3bbded59bd65248f1e38f2d080908d6d6965bfecf706d67a5b73039ba22c8f4d07fd7455de424

  • SSDEEP

    12288:PMrUy90DYyUcMpsG0WYub8yNYEMW3FugO1e+YG5O:zyaYy42vDub8yySFEe+O

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe
    "C:\Users\Admin\AppData\Local\Temp\bb72baff6dc4c125110b48a1cd9cf5b2b509150cbab50df38959faa1810ca866.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhrt8855xn.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhrt8855xn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rx82mU45.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rx82mU45.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf84Fl12yD67.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf84Fl12yD67.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 1960
          4⤵
          • Program crash
          PID:736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhSG10tN67Lx.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhSG10tN67Lx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4248
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2840 -ip 2840
    1⤵
      PID:2808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhSG10tN67Lx.exe

      Filesize

      175KB

      MD5

      1ff813a23a00855892cbeee34abf6648

      SHA1

      54c9a2fa83ee80668e47423174de06f15a4b67ea

      SHA256

      3412d77cdb7a46be153b580a3d6add25e54e67f8e28c9852d893d997bfab4ca6

      SHA512

      e947d2fa6a95c880aa4ac2f2f5368457bb26c5850330c64b7454a6c1dcf505c2b85f5c5fe950d7fd83ae194b45205933c4902be6026a4a2e221c24cc4fb13a14

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhSG10tN67Lx.exe

      Filesize

      175KB

      MD5

      1ff813a23a00855892cbeee34abf6648

      SHA1

      54c9a2fa83ee80668e47423174de06f15a4b67ea

      SHA256

      3412d77cdb7a46be153b580a3d6add25e54e67f8e28c9852d893d997bfab4ca6

      SHA512

      e947d2fa6a95c880aa4ac2f2f5368457bb26c5850330c64b7454a6c1dcf505c2b85f5c5fe950d7fd83ae194b45205933c4902be6026a4a2e221c24cc4fb13a14

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhrt8855xn.exe

      Filesize

      381KB

      MD5

      2124158ee8eae0250220fdb25e3d77fd

      SHA1

      032fbbc6f8acac03c0f585331ea4c7f376cae717

      SHA256

      224687499cc1121b225f9a860f979232e2bdc40fba988854adf45db8b5751fe0

      SHA512

      50b0447b39c2cc917da808bd8464db529b5cc3fad4282c7a62208bdaf23d9f23f168348c6e71e9ed942c28dcddda251c3c3c11e91c3a8f3161ab4382dab7d0f7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhrt8855xn.exe

      Filesize

      381KB

      MD5

      2124158ee8eae0250220fdb25e3d77fd

      SHA1

      032fbbc6f8acac03c0f585331ea4c7f376cae717

      SHA256

      224687499cc1121b225f9a860f979232e2bdc40fba988854adf45db8b5751fe0

      SHA512

      50b0447b39c2cc917da808bd8464db529b5cc3fad4282c7a62208bdaf23d9f23f168348c6e71e9ed942c28dcddda251c3c3c11e91c3a8f3161ab4382dab7d0f7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rx82mU45.exe

      Filesize

      11KB

      MD5

      c223b21f10a9faeda79c1124b3746efd

      SHA1

      c80cb91330141bfe37ab8f869db188cda6e6e34d

      SHA256

      31b0d9c21e14e7a9e05aaaa58e7869179c49b6dacc169ccaf70bc264d0874349

      SHA512

      a1f9c003526d448aaa7371a79674353338187a65639530e5d2afd28a713f2e88b894bcedabd3d34ba13a895f224bdea2fcea04bdc0000a8cedab8baf8b751d10

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rx82mU45.exe

      Filesize

      11KB

      MD5

      c223b21f10a9faeda79c1124b3746efd

      SHA1

      c80cb91330141bfe37ab8f869db188cda6e6e34d

      SHA256

      31b0d9c21e14e7a9e05aaaa58e7869179c49b6dacc169ccaf70bc264d0874349

      SHA512

      a1f9c003526d448aaa7371a79674353338187a65639530e5d2afd28a713f2e88b894bcedabd3d34ba13a895f224bdea2fcea04bdc0000a8cedab8baf8b751d10

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf84Fl12yD67.exe

      Filesize

      292KB

      MD5

      bd407beaed8912f6f9f5b269e5a85686

      SHA1

      f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

      SHA256

      3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

      SHA512

      79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf84Fl12yD67.exe

      Filesize

      292KB

      MD5

      bd407beaed8912f6f9f5b269e5a85686

      SHA1

      f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

      SHA256

      3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

      SHA512

      79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

    • memory/432-147-0x0000000000F50000-0x0000000000F5A000-memory.dmp

      Filesize

      40KB

    • memory/2840-153-0x0000000004C60000-0x0000000005204000-memory.dmp

      Filesize

      5.6MB

    • memory/2840-154-0x0000000000660000-0x00000000006AB000-memory.dmp

      Filesize

      300KB

    • memory/2840-156-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-155-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-157-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-159-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-161-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-165-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-163-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-167-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-169-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-171-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-173-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-175-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-177-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-179-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-181-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-183-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/2840-1064-0x0000000005310000-0x0000000005928000-memory.dmp

      Filesize

      6.1MB

    • memory/2840-1065-0x0000000005970000-0x0000000005A7A000-memory.dmp

      Filesize

      1.0MB

    • memory/2840-1066-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

      Filesize

      72KB

    • memory/2840-1067-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

      Filesize

      240KB

    • memory/2840-1068-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-1070-0x0000000005DC0000-0x0000000005E52000-memory.dmp

      Filesize

      584KB

    • memory/2840-1071-0x0000000005E60000-0x0000000005EC6000-memory.dmp

      Filesize

      408KB

    • memory/2840-1072-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-1073-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-1074-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/2840-1075-0x0000000006590000-0x0000000006752000-memory.dmp

      Filesize

      1.8MB

    • memory/2840-1076-0x0000000006760000-0x0000000006C8C000-memory.dmp

      Filesize

      5.2MB

    • memory/2840-1077-0x0000000007000000-0x0000000007076000-memory.dmp

      Filesize

      472KB

    • memory/2840-1078-0x0000000007080000-0x00000000070D0000-memory.dmp

      Filesize

      320KB

    • memory/2840-1079-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/4248-1085-0x0000000000700000-0x0000000000732000-memory.dmp

      Filesize

      200KB

    • memory/4248-1086-0x0000000005360000-0x0000000005370000-memory.dmp

      Filesize

      64KB