Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2023 12:40

General

  • Target

    b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe

  • Size

    560KB

  • MD5

    f7d6e41f97b216302defeda03e3bab37

  • SHA1

    0a59320e832351f1bd63538cd38a164f5957bcd5

  • SHA256

    b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96

  • SHA512

    29197448000a20a239f0c86a2bfe1f500d9507aeaebd7cc84a0c6a8a472ef97e98a781e327ad535cc18d29efd7266044f5bf6f7a5bdec5dd74b1b040a0b5a5de

  • SSDEEP

    12288:JMrWy90BHwABGoo8QUseVgko8Fo3mGRnBM82elP8LTROq2u:ry4XxoDe1oH37p2eET5

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe
    "C:\Users\Admin\AppData\Local\Temp\b9462d962545ea8c887d588a62ffb218b60af7da0c7be9886f4df6e8cf0f4f96.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhOD4908om.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhOD4908om.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04oS05pP43.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04oS05pP43.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49hV78AQ47.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49hV78AQ47.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3336
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 1360
          4⤵
          • Program crash
          PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAU25FB80HF.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAU25FB80HF.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3112
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3336 -ip 3336
    1⤵
      PID:4220

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAU25FB80HF.exe

      Filesize

      176KB

      MD5

      83c79b4efbf772201aec168bf28f02f4

      SHA1

      4b0335879698f789f640b9522f79bafd79001071

      SHA256

      f296295c63b3b774f3307456b0b7522b51ccadf6784ad57f08b63432fdac42a3

      SHA512

      d164687a8b7cf1561cc31faca95fb735edd4624c5de1f7c4e76f0cebcca7ca8f1398681aa068056849e49f721aaa90fae1870bb59d13836edd1b9c761da51578

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhAU25FB80HF.exe

      Filesize

      176KB

      MD5

      83c79b4efbf772201aec168bf28f02f4

      SHA1

      4b0335879698f789f640b9522f79bafd79001071

      SHA256

      f296295c63b3b774f3307456b0b7522b51ccadf6784ad57f08b63432fdac42a3

      SHA512

      d164687a8b7cf1561cc31faca95fb735edd4624c5de1f7c4e76f0cebcca7ca8f1398681aa068056849e49f721aaa90fae1870bb59d13836edd1b9c761da51578

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhOD4908om.exe

      Filesize

      416KB

      MD5

      a00f2a0c1548e1557c8f2d2d04e03cc3

      SHA1

      7505789b374f56f9327f8bc1c596fafdb3cb4225

      SHA256

      4f79112ad10172a7fcb9df63d7d0167d22c9b00a7a32cbc203167345be1bb912

      SHA512

      70e93984af9aac359503d0f356c3e76fd2ddbabe1f49d35b374c0ad0cb410ff026eabed72de9f93ab74d695af3897d0b1e3c839274a66994cd2e84c9f2381ac9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhOD4908om.exe

      Filesize

      416KB

      MD5

      a00f2a0c1548e1557c8f2d2d04e03cc3

      SHA1

      7505789b374f56f9327f8bc1c596fafdb3cb4225

      SHA256

      4f79112ad10172a7fcb9df63d7d0167d22c9b00a7a32cbc203167345be1bb912

      SHA512

      70e93984af9aac359503d0f356c3e76fd2ddbabe1f49d35b374c0ad0cb410ff026eabed72de9f93ab74d695af3897d0b1e3c839274a66994cd2e84c9f2381ac9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04oS05pP43.exe

      Filesize

      11KB

      MD5

      77c06d90742d8a47aaa9a0de251e354c

      SHA1

      7093e1dfd6707015b4d55e0cae3bd895de53ef97

      SHA256

      d26e443a261981f9b6d556f0ffa0afea82e397b727b99910706252cb1b3bd012

      SHA512

      3e10d699112f347f9e1706339222a3ae1776b8540480466f065d208be9283bd52492387c80e713ec2dca576093c24e889a63150683853798b46535dbd509268f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf04oS05pP43.exe

      Filesize

      11KB

      MD5

      77c06d90742d8a47aaa9a0de251e354c

      SHA1

      7093e1dfd6707015b4d55e0cae3bd895de53ef97

      SHA256

      d26e443a261981f9b6d556f0ffa0afea82e397b727b99910706252cb1b3bd012

      SHA512

      3e10d699112f347f9e1706339222a3ae1776b8540480466f065d208be9283bd52492387c80e713ec2dca576093c24e889a63150683853798b46535dbd509268f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49hV78AQ47.exe

      Filesize

      415KB

      MD5

      79645f4c4f6de9b74ca0120b7a2ff217

      SHA1

      e093a94b5415be8ebbc90a52807b811eb339823e

      SHA256

      cfa90800c04f1f257f52d7f8d63b001b37796b3f1da67b271d6c76feeda8306a

      SHA512

      13ae7f81ffa0ff1196334f870cdcaa7ac46be0bd6de36caceda5251b77a3dac0ccc8b33dc2ec7ca4a06bb96bf5017d68ea74ba373ebcdebf0e9318bb11803cd0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf49hV78AQ47.exe

      Filesize

      415KB

      MD5

      79645f4c4f6de9b74ca0120b7a2ff217

      SHA1

      e093a94b5415be8ebbc90a52807b811eb339823e

      SHA256

      cfa90800c04f1f257f52d7f8d63b001b37796b3f1da67b271d6c76feeda8306a

      SHA512

      13ae7f81ffa0ff1196334f870cdcaa7ac46be0bd6de36caceda5251b77a3dac0ccc8b33dc2ec7ca4a06bb96bf5017d68ea74ba373ebcdebf0e9318bb11803cd0

    • memory/368-147-0x0000000000350000-0x000000000035A000-memory.dmp

      Filesize

      40KB

    • memory/3112-1083-0x0000000000630000-0x0000000000662000-memory.dmp

      Filesize

      200KB

    • memory/3112-1084-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/3336-185-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-199-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-155-0x0000000007370000-0x0000000007914000-memory.dmp

      Filesize

      5.6MB

    • memory/3336-156-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-157-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-159-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-161-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-163-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-165-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-167-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-169-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-171-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-173-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-175-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-177-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-179-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-181-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-183-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-187-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-153-0x0000000002BE0000-0x0000000002C2B000-memory.dmp

      Filesize

      300KB

    • memory/3336-189-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-191-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-193-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-195-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-197-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-154-0x0000000007360000-0x0000000007370000-memory.dmp

      Filesize

      64KB

    • memory/3336-201-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-203-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-205-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-207-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-209-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-211-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-213-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-215-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-217-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-219-0x0000000007920000-0x000000000795E000-memory.dmp

      Filesize

      248KB

    • memory/3336-1062-0x0000000007960000-0x0000000007F78000-memory.dmp

      Filesize

      6.1MB

    • memory/3336-1063-0x0000000007FC0000-0x00000000080CA000-memory.dmp

      Filesize

      1.0MB

    • memory/3336-1064-0x0000000008100000-0x0000000008112000-memory.dmp

      Filesize

      72KB

    • memory/3336-1065-0x0000000008120000-0x000000000815C000-memory.dmp

      Filesize

      240KB

    • memory/3336-1066-0x0000000007360000-0x0000000007370000-memory.dmp

      Filesize

      64KB

    • memory/3336-1067-0x0000000008410000-0x00000000084A2000-memory.dmp

      Filesize

      584KB

    • memory/3336-1068-0x00000000084B0000-0x0000000008516000-memory.dmp

      Filesize

      408KB

    • memory/3336-1070-0x0000000007360000-0x0000000007370000-memory.dmp

      Filesize

      64KB

    • memory/3336-1071-0x0000000007360000-0x0000000007370000-memory.dmp

      Filesize

      64KB

    • memory/3336-1072-0x0000000007360000-0x0000000007370000-memory.dmp

      Filesize

      64KB

    • memory/3336-1073-0x0000000008D10000-0x0000000008ED2000-memory.dmp

      Filesize

      1.8MB

    • memory/3336-1074-0x0000000008EF0000-0x000000000941C000-memory.dmp

      Filesize

      5.2MB

    • memory/3336-1075-0x0000000009790000-0x0000000009806000-memory.dmp

      Filesize

      472KB

    • memory/3336-1076-0x0000000009820000-0x0000000009870000-memory.dmp

      Filesize

      320KB

    • memory/3336-1077-0x0000000007360000-0x0000000007370000-memory.dmp

      Filesize

      64KB