Analysis

  • max time kernel
    90s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2023 15:30

General

  • Target

    72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe

  • Size

    561KB

  • MD5

    a914ba69b31d026f95b8bbc7979e9192

  • SHA1

    b15ffd47edd1ab0a50f7864f59ce39d0f7b5cf1a

  • SHA256

    72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9

  • SHA512

    e81c2cf37bbf9b6dee0c872f4aa0a85fdcd03071175554e983c59fd92176ffbf9ac67d3f5dcb9d440068895fd46256c09538ec939363736d189eaa66e22818ca

  • SSDEEP

    12288:sMr6y90yrie/ODYUlKxaPLLwRrxI0Vb+Udf:Wy1rRrUcaPwFu0iUdf

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe
    "C:\Users\Admin\AppData\Local\Temp\72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkj7484EY.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkj7484EY.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf60mN16XA90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf60mN16XA90.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf51dY77vC73.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf51dY77vC73.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1348
          4⤵
          • Program crash
          PID:4724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhgu57gW44vV.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhgu57gW44vV.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4772 -ip 4772
    1⤵
      PID:4556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhgu57gW44vV.exe

      Filesize

      176KB

      MD5

      d4fc510335949c387e03829b383de43c

      SHA1

      72ee0f28feb55609c1a7ec319721f3c39c9da46e

      SHA256

      7edb759f56cb64cb102b34bd9dced93faacb39fffc1e036cffad7169b6183d9c

      SHA512

      b4021a1b5469588a138d78731071c86535275fc5610d240bb4599016a741c54ecd95ed4f3e1292d1ea0ec41c9427ec1a5c97f3089cfeba25652a168f1ff81319

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhgu57gW44vV.exe

      Filesize

      176KB

      MD5

      d4fc510335949c387e03829b383de43c

      SHA1

      72ee0f28feb55609c1a7ec319721f3c39c9da46e

      SHA256

      7edb759f56cb64cb102b34bd9dced93faacb39fffc1e036cffad7169b6183d9c

      SHA512

      b4021a1b5469588a138d78731071c86535275fc5610d240bb4599016a741c54ecd95ed4f3e1292d1ea0ec41c9427ec1a5c97f3089cfeba25652a168f1ff81319

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkj7484EY.exe

      Filesize

      417KB

      MD5

      bf557664a7de13ccc9345e819ae13c3e

      SHA1

      7ee0f7dabe3e4d3096f35ca949444aff25d4dd09

      SHA256

      5facbbbd6bd10a8a42a1de180714b2048bb63a3e32336eaa979614023752dc5b

      SHA512

      0355ac2c966376b0a63dee43872d55b0d5f6c9fea26239dbf70435efa246b3258b1e8b173b5030dfebbf6cc45c60b66c222d16bfe6e45e56c99fc326094e133b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkj7484EY.exe

      Filesize

      417KB

      MD5

      bf557664a7de13ccc9345e819ae13c3e

      SHA1

      7ee0f7dabe3e4d3096f35ca949444aff25d4dd09

      SHA256

      5facbbbd6bd10a8a42a1de180714b2048bb63a3e32336eaa979614023752dc5b

      SHA512

      0355ac2c966376b0a63dee43872d55b0d5f6c9fea26239dbf70435efa246b3258b1e8b173b5030dfebbf6cc45c60b66c222d16bfe6e45e56c99fc326094e133b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf60mN16XA90.exe

      Filesize

      11KB

      MD5

      bd54d4b6d2cb5901604bcc2a5863ccf8

      SHA1

      84e2ae749b37e4643c248782ce63c7def197c152

      SHA256

      b8a2f4c7d66da807cd608860844105396d09203aad100f6970483d737490b372

      SHA512

      09483ce50f32c3c27d0477ed758b78c7c8f098756e2edec6a544345c7434336ce100a4f155dbce473ffdb1f42fe3a310b259d79c2032a895283f12fb85d8e47a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf60mN16XA90.exe

      Filesize

      11KB

      MD5

      bd54d4b6d2cb5901604bcc2a5863ccf8

      SHA1

      84e2ae749b37e4643c248782ce63c7def197c152

      SHA256

      b8a2f4c7d66da807cd608860844105396d09203aad100f6970483d737490b372

      SHA512

      09483ce50f32c3c27d0477ed758b78c7c8f098756e2edec6a544345c7434336ce100a4f155dbce473ffdb1f42fe3a310b259d79c2032a895283f12fb85d8e47a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf51dY77vC73.exe

      Filesize

      420KB

      MD5

      26c4ff23e7d77f037b4cf034354d85b2

      SHA1

      c6596b283bc440832c9baf35453ebc4d9fb70115

      SHA256

      61a27dc04dc6709f1cd05c3b9bd7bae777e915f524decb5948c8cb8f26ff2b19

      SHA512

      c2befc78aa793989b2838803971cd9675a35c1c657a127a69f4bbbd852b77f79df2d733b934d1411b07fe7f01f75359749382be7e8b0c6c9d2b582a5423fc1f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf51dY77vC73.exe

      Filesize

      420KB

      MD5

      26c4ff23e7d77f037b4cf034354d85b2

      SHA1

      c6596b283bc440832c9baf35453ebc4d9fb70115

      SHA256

      61a27dc04dc6709f1cd05c3b9bd7bae777e915f524decb5948c8cb8f26ff2b19

      SHA512

      c2befc78aa793989b2838803971cd9675a35c1c657a127a69f4bbbd852b77f79df2d733b934d1411b07fe7f01f75359749382be7e8b0c6c9d2b582a5423fc1f9

    • memory/4772-153-0x00000000072F0000-0x0000000007894000-memory.dmp

      Filesize

      5.6MB

    • memory/4772-154-0x0000000002BE0000-0x0000000002C2B000-memory.dmp

      Filesize

      300KB

    • memory/4772-156-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-155-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-157-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-158-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-159-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-161-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-163-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-165-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-167-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-169-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-171-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-173-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-175-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-177-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-179-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-181-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-183-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-185-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-187-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-189-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-191-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-193-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-195-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-197-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-199-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-201-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-203-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-205-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-207-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-209-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-211-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-213-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-215-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-217-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-219-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-221-0x00000000071E0000-0x000000000721E000-memory.dmp

      Filesize

      248KB

    • memory/4772-1064-0x00000000078A0000-0x0000000007EB8000-memory.dmp

      Filesize

      6.1MB

    • memory/4772-1065-0x0000000007EC0000-0x0000000007FCA000-memory.dmp

      Filesize

      1.0MB

    • memory/4772-1066-0x0000000007FD0000-0x0000000007FE2000-memory.dmp

      Filesize

      72KB

    • memory/4772-1067-0x0000000007FF0000-0x000000000802C000-memory.dmp

      Filesize

      240KB

    • memory/4772-1068-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-1070-0x00000000082D0000-0x0000000008362000-memory.dmp

      Filesize

      584KB

    • memory/4772-1071-0x0000000008370000-0x00000000083D6000-memory.dmp

      Filesize

      408KB

    • memory/4772-1072-0x0000000008A60000-0x0000000008AD6000-memory.dmp

      Filesize

      472KB

    • memory/4772-1073-0x0000000008B00000-0x0000000008B50000-memory.dmp

      Filesize

      320KB

    • memory/4772-1074-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-1075-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-1076-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4772-1077-0x0000000009E20000-0x0000000009FE2000-memory.dmp

      Filesize

      1.8MB

    • memory/4772-1078-0x000000000A000000-0x000000000A52C000-memory.dmp

      Filesize

      5.2MB

    • memory/4772-1079-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/4964-1085-0x0000000000DC0000-0x0000000000DF2000-memory.dmp

      Filesize

      200KB

    • memory/4964-1086-0x00000000056B0000-0x00000000056C0000-memory.dmp

      Filesize

      64KB

    • memory/5060-147-0x0000000000180000-0x000000000018A000-memory.dmp

      Filesize

      40KB