Analysis

  • max time kernel
    84s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2023 15:39

General

  • Target

    2f990c9a701879b86041641931c9332939a5ea833af726a653eb6ae07834d4fc.exe

  • Size

    562KB

  • MD5

    1a9500015d954217cba644416167ddd5

  • SHA1

    87285e82b1b809b4d0a6b8d21953c9b03f7d3c61

  • SHA256

    2f990c9a701879b86041641931c9332939a5ea833af726a653eb6ae07834d4fc

  • SHA512

    18e9cd6f86309d7b2dc59456a952a6367a68efb254a61a6d7c4a23230b6a79b032952a9d654ef216954219009b903d71f66df8aa1ea820eb78cb479221f835fa

  • SSDEEP

    12288:DMrMy90uN0shnQrXxeAt4kj5RznGPRC1FD7fTk:zyFhYx/rXzIMXfTk

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f990c9a701879b86041641931c9332939a5ea833af726a653eb6ae07834d4fc.exe
    "C:\Users\Admin\AppData\Local\Temp\2f990c9a701879b86041641931c9332939a5ea833af726a653eb6ae07834d4fc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhjy0216JI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhjy0216JI.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf28yB44Ct81.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf28yB44Ct81.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf68Pp49Qv19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf68Pp49Qv19.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 1352
          4⤵
          • Program crash
          PID:2852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhck91WA24Vp.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhck91WA24Vp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4056
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3040 -ip 3040
    1⤵
      PID:1600

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhck91WA24Vp.exe

      Filesize

      176KB

      MD5

      27af98851549def14b05c3305294c54b

      SHA1

      e6c0624482879bee45874be4ee6d210673912faf

      SHA256

      2a08dbbc08d28297985a9ea03d474b1d25854f330bd59ab85618f576566df0e2

      SHA512

      dc27a09689ccb2e2b615315e4ebc0df804c40c5f4a741a131cad4d411d0cc61af9f1d39129b731f7c48a235be165c3dcf5f8a3c81140f1be948f75fa66957d6f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhck91WA24Vp.exe

      Filesize

      176KB

      MD5

      27af98851549def14b05c3305294c54b

      SHA1

      e6c0624482879bee45874be4ee6d210673912faf

      SHA256

      2a08dbbc08d28297985a9ea03d474b1d25854f330bd59ab85618f576566df0e2

      SHA512

      dc27a09689ccb2e2b615315e4ebc0df804c40c5f4a741a131cad4d411d0cc61af9f1d39129b731f7c48a235be165c3dcf5f8a3c81140f1be948f75fa66957d6f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhjy0216JI.exe

      Filesize

      418KB

      MD5

      4331c1713a70898336e34bef8f64be84

      SHA1

      4b0a8e0b91d422a7b15dc775acb7067166620609

      SHA256

      63a982fdd75ed5248bc1e9f8300db3bcbe2867ca5920acbd9e728bb428b73d18

      SHA512

      8d27eac6b8882d7c1e6faa3fa70cf27c57d7bfa4b0ecbcdfe16876ff4fa2b7ea0be879e5dc903c1c29ae3de0a7f8e864995b45841e9ad1bc918b5a9b43c38d2b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhjy0216JI.exe

      Filesize

      418KB

      MD5

      4331c1713a70898336e34bef8f64be84

      SHA1

      4b0a8e0b91d422a7b15dc775acb7067166620609

      SHA256

      63a982fdd75ed5248bc1e9f8300db3bcbe2867ca5920acbd9e728bb428b73d18

      SHA512

      8d27eac6b8882d7c1e6faa3fa70cf27c57d7bfa4b0ecbcdfe16876ff4fa2b7ea0be879e5dc903c1c29ae3de0a7f8e864995b45841e9ad1bc918b5a9b43c38d2b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf28yB44Ct81.exe

      Filesize

      11KB

      MD5

      60f6b342af751b06cb233fa91538006f

      SHA1

      b4055971a9c669798a18426cab7a800ecea907ee

      SHA256

      ed4522161bc53e073a4db6b6333c7ad02aa01b65a141dee2b30a25c94fbfdb4f

      SHA512

      d31ca9ce6cd1721ce939ba1a3864a072936f6d5d8f90baf298ff83db44d8cbb032a582c166b21221c81af67b2ec56b78f6bbe57f88bb0e502e26df91528c5087

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf28yB44Ct81.exe

      Filesize

      11KB

      MD5

      60f6b342af751b06cb233fa91538006f

      SHA1

      b4055971a9c669798a18426cab7a800ecea907ee

      SHA256

      ed4522161bc53e073a4db6b6333c7ad02aa01b65a141dee2b30a25c94fbfdb4f

      SHA512

      d31ca9ce6cd1721ce939ba1a3864a072936f6d5d8f90baf298ff83db44d8cbb032a582c166b21221c81af67b2ec56b78f6bbe57f88bb0e502e26df91528c5087

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf68Pp49Qv19.exe

      Filesize

      420KB

      MD5

      26c4ff23e7d77f037b4cf034354d85b2

      SHA1

      c6596b283bc440832c9baf35453ebc4d9fb70115

      SHA256

      61a27dc04dc6709f1cd05c3b9bd7bae777e915f524decb5948c8cb8f26ff2b19

      SHA512

      c2befc78aa793989b2838803971cd9675a35c1c657a127a69f4bbbd852b77f79df2d733b934d1411b07fe7f01f75359749382be7e8b0c6c9d2b582a5423fc1f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf68Pp49Qv19.exe

      Filesize

      420KB

      MD5

      26c4ff23e7d77f037b4cf034354d85b2

      SHA1

      c6596b283bc440832c9baf35453ebc4d9fb70115

      SHA256

      61a27dc04dc6709f1cd05c3b9bd7bae777e915f524decb5948c8cb8f26ff2b19

      SHA512

      c2befc78aa793989b2838803971cd9675a35c1c657a127a69f4bbbd852b77f79df2d733b934d1411b07fe7f01f75359749382be7e8b0c6c9d2b582a5423fc1f9

    • memory/3040-153-0x0000000007340000-0x00000000078E4000-memory.dmp

      Filesize

      5.6MB

    • memory/3040-154-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

      Filesize

      300KB

    • memory/3040-155-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3040-156-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3040-157-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-158-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-160-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-162-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-164-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-166-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-168-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-170-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-172-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-174-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-176-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-178-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-180-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-182-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-184-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-186-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-188-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-190-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-192-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-194-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-196-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-198-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-200-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-202-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-204-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-206-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-208-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-210-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-212-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-214-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-216-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-218-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-220-0x0000000004B10000-0x0000000004B4E000-memory.dmp

      Filesize

      248KB

    • memory/3040-1063-0x00000000079F0000-0x0000000008008000-memory.dmp

      Filesize

      6.1MB

    • memory/3040-1064-0x0000000008010000-0x000000000811A000-memory.dmp

      Filesize

      1.0MB

    • memory/3040-1065-0x0000000007310000-0x0000000007322000-memory.dmp

      Filesize

      72KB

    • memory/3040-1066-0x0000000008120000-0x000000000815C000-memory.dmp

      Filesize

      240KB

    • memory/3040-1067-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3040-1069-0x0000000008410000-0x00000000084A2000-memory.dmp

      Filesize

      584KB

    • memory/3040-1070-0x00000000084B0000-0x0000000008516000-memory.dmp

      Filesize

      408KB

    • memory/3040-1071-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3040-1072-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3040-1073-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3040-1074-0x0000000008BB0000-0x0000000008C26000-memory.dmp

      Filesize

      472KB

    • memory/3040-1075-0x0000000008C40000-0x0000000008C90000-memory.dmp

      Filesize

      320KB

    • memory/3040-1076-0x0000000009070000-0x0000000009232000-memory.dmp

      Filesize

      1.8MB

    • memory/3040-1077-0x0000000009240000-0x000000000976C000-memory.dmp

      Filesize

      5.2MB

    • memory/3040-1078-0x0000000007330000-0x0000000007340000-memory.dmp

      Filesize

      64KB

    • memory/3200-147-0x0000000000550000-0x000000000055A000-memory.dmp

      Filesize

      40KB

    • memory/4056-1084-0x00000000009A0000-0x00000000009D2000-memory.dmp

      Filesize

      200KB

    • memory/4056-1085-0x00000000052C0000-0x00000000052D0000-memory.dmp

      Filesize

      64KB