Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 15:17

General

  • Target

    311dd0813811cc4fdda68ec17f64e7b2935427a1c8cd98832622659bb6855f67.exe

  • Size

    560KB

  • MD5

    8768adcbd96198129dc4f49e8cde9514

  • SHA1

    0fb4c61eec53055dba98c84cee1720ccf84c3c83

  • SHA256

    311dd0813811cc4fdda68ec17f64e7b2935427a1c8cd98832622659bb6855f67

  • SHA512

    68d7806639fe01539670c13dbb7b667045c710c0ace139d590837c0e9ba929b89b1b1aa88cedd21cb7cb715d01e767896da63d61fecf747368b37a85284830f2

  • SSDEEP

    12288:KMrty906c9eCrV5ZXd9gj2618pyt7T6D4y9bx6CUKLlL0juB:ryxLgV3tB618At7T6DL9bx6QlL0juB

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\311dd0813811cc4fdda68ec17f64e7b2935427a1c8cd98832622659bb6855f67.exe
    "C:\Users\Admin\AppData\Local\Temp\311dd0813811cc4fdda68ec17f64e7b2935427a1c8cd98832622659bb6855f67.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFX9612qz.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFX9612qz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rZ39ee08.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rZ39ee08.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03Gc32Hg44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03Gc32Hg44.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1336
          4⤵
          • Program crash
          PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhqf97yQ45Ep.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhqf97yQ45Ep.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2452
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4124 -ip 4124
    1⤵
      PID:4448

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhqf97yQ45Ep.exe

            Filesize

            176KB

            MD5

            e3c2b0b24606c528e4b299d99ebb48de

            SHA1

            882527eb9cafa8e183c448f7f361885b7e8aa476

            SHA256

            2866ad53173ee0ac649b6bd01d5670e4c6a33431b8b734ee59620b3114efa5be

            SHA512

            204561e18bab8ee2b9fceed170cd15a93e589f2850c40b23a65f0aca5292cd70154d879c4dea5e191e0a392c408757ce08b6ef342fdb2ae77373e9b4b79a1a82

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhqf97yQ45Ep.exe

            Filesize

            176KB

            MD5

            e3c2b0b24606c528e4b299d99ebb48de

            SHA1

            882527eb9cafa8e183c448f7f361885b7e8aa476

            SHA256

            2866ad53173ee0ac649b6bd01d5670e4c6a33431b8b734ee59620b3114efa5be

            SHA512

            204561e18bab8ee2b9fceed170cd15a93e589f2850c40b23a65f0aca5292cd70154d879c4dea5e191e0a392c408757ce08b6ef342fdb2ae77373e9b4b79a1a82

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFX9612qz.exe

            Filesize

            416KB

            MD5

            b5cff4df27006ae5ef494d3528fd7bd5

            SHA1

            9327a1adbc79217fd15c7b2529448b95355023aa

            SHA256

            7389ff2ccbe018527f0d762d7a756fe15728444cef8b89ff8d31768cbf413673

            SHA512

            999be4d3d05c17e84b0622e761190758fa99f85c06b383d01acce122f0ee1be31c9e9d434d600b69efd7ef0a20442d426bbb6c265dd50ad9532ed9ee547ec946

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhFX9612qz.exe

            Filesize

            416KB

            MD5

            b5cff4df27006ae5ef494d3528fd7bd5

            SHA1

            9327a1adbc79217fd15c7b2529448b95355023aa

            SHA256

            7389ff2ccbe018527f0d762d7a756fe15728444cef8b89ff8d31768cbf413673

            SHA512

            999be4d3d05c17e84b0622e761190758fa99f85c06b383d01acce122f0ee1be31c9e9d434d600b69efd7ef0a20442d426bbb6c265dd50ad9532ed9ee547ec946

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rZ39ee08.exe

            Filesize

            11KB

            MD5

            b93d9605e5d7ae3649220f8d4041d132

            SHA1

            c92887c08e453726268f7ded389418521c890f1b

            SHA256

            0ef98d0f4ef8ba99c8b1c10e490a17a493e2e613f9a48aa2ca76f291fe45784b

            SHA512

            e363a0c043f6d7f3d932b47b28da33cca77f55aa92904a26e2468d22821e8ba7d843a736e4158249ea6fb9fde908997c8dad6a474d1f0313df060e8fab2c6aa7

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf87rZ39ee08.exe

            Filesize

            11KB

            MD5

            b93d9605e5d7ae3649220f8d4041d132

            SHA1

            c92887c08e453726268f7ded389418521c890f1b

            SHA256

            0ef98d0f4ef8ba99c8b1c10e490a17a493e2e613f9a48aa2ca76f291fe45784b

            SHA512

            e363a0c043f6d7f3d932b47b28da33cca77f55aa92904a26e2468d22821e8ba7d843a736e4158249ea6fb9fde908997c8dad6a474d1f0313df060e8fab2c6aa7

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03Gc32Hg44.exe

            Filesize

            416KB

            MD5

            3298bce398b0b8db15538825fc22ec70

            SHA1

            97382a7c1ec70bd6549554c69ae3a8b18daddc9c

            SHA256

            c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

            SHA512

            4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03Gc32Hg44.exe

            Filesize

            416KB

            MD5

            3298bce398b0b8db15538825fc22ec70

            SHA1

            97382a7c1ec70bd6549554c69ae3a8b18daddc9c

            SHA256

            c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

            SHA512

            4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

          • memory/1280-1097-0x0000000000C60000-0x0000000000C92000-memory.dmp

            Filesize

            200KB

          • memory/1280-1098-0x00000000057F0000-0x0000000005800000-memory.dmp

            Filesize

            64KB

          • memory/4124-199-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-209-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-163-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-164-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-165-0x0000000007250000-0x00000000077F4000-memory.dmp

            Filesize

            5.6MB

          • memory/4124-166-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-167-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-169-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-171-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-173-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-175-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-177-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-179-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-181-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-183-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-185-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-187-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-189-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-191-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-193-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-195-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-197-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-161-0x0000000002C00000-0x0000000002C4B000-memory.dmp

            Filesize

            300KB

          • memory/4124-201-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-203-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-205-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-207-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-162-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-211-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-213-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-215-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-217-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-219-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-221-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-223-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-225-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-227-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-229-0x00000000071D0000-0x000000000720E000-memory.dmp

            Filesize

            248KB

          • memory/4124-1072-0x0000000007800000-0x0000000007E18000-memory.dmp

            Filesize

            6.1MB

          • memory/4124-1073-0x0000000007E80000-0x0000000007F8A000-memory.dmp

            Filesize

            1.0MB

          • memory/4124-1074-0x0000000007FC0000-0x0000000007FD2000-memory.dmp

            Filesize

            72KB

          • memory/4124-1075-0x0000000007FE0000-0x000000000801C000-memory.dmp

            Filesize

            240KB

          • memory/4124-1076-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-1078-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-1079-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-1080-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-1081-0x00000000082D0000-0x0000000008362000-memory.dmp

            Filesize

            584KB

          • memory/4124-1082-0x0000000008370000-0x00000000083D6000-memory.dmp

            Filesize

            408KB

          • memory/4124-1083-0x0000000008B70000-0x0000000008BE6000-memory.dmp

            Filesize

            472KB

          • memory/4124-1084-0x0000000008C00000-0x0000000008C50000-memory.dmp

            Filesize

            320KB

          • memory/4124-1085-0x0000000007240000-0x0000000007250000-memory.dmp

            Filesize

            64KB

          • memory/4124-1086-0x0000000009F30000-0x000000000A0F2000-memory.dmp

            Filesize

            1.8MB

          • memory/4124-1087-0x000000000A100000-0x000000000A62C000-memory.dmp

            Filesize

            5.2MB

          • memory/4588-147-0x0000000000760000-0x000000000076A000-memory.dmp

            Filesize

            40KB