Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 17:04

General

  • Target

    a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe

  • Size

    561KB

  • MD5

    5a2491869ec421008c3deb5dad60a8f5

  • SHA1

    4786af4bb99708f3bf7d7739a49edf936424ea82

  • SHA256

    a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7

  • SHA512

    2ec4b242f0094a6cfe95bb5e40c295721fef57b79b763ed5a9b13681205ddcfe756c7b5f8f05c9deee235e2600271b3ef62ce4a1449c57d4fb009b26aaed14a5

  • SSDEEP

    12288:aMrny90+dr9MU4Quem3MuwhTQRvR3i/MSq3TMdwFJs:By9rmVMTqR3qeTMdw0

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e89965f2b21a718458f856db96a6a5d1e3dfa422c29ff51656117742573ea7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhKn5289kt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhKn5289kt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf78ZG34KT28.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf78ZG34KT28.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83LG18Gr67.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83LG18Gr67.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1432
          4⤵
          • Program crash
          PID:3428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhGA83Bd64ri.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhGA83Bd64ri.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4772 -ip 4772
    1⤵
      PID:1144

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhGA83Bd64ri.exe

            Filesize

            176KB

            MD5

            e790a3b5f4871d4a1eefccf531b260c7

            SHA1

            72d7c22e14add3c5de12871b5a021b2d60f4c888

            SHA256

            ff8785251e6909a09d069ddf0582e2d0213a776ad0a1e66f2761eecb251c9da7

            SHA512

            3fe1935aa48af31c101b6e88973cd648065a0f1d4b5315a3cce0f589a638c76db56dd8208b4b18c983fa690752e9184208f2356b9aea3b608443c0f921bd3daa

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhGA83Bd64ri.exe

            Filesize

            176KB

            MD5

            e790a3b5f4871d4a1eefccf531b260c7

            SHA1

            72d7c22e14add3c5de12871b5a021b2d60f4c888

            SHA256

            ff8785251e6909a09d069ddf0582e2d0213a776ad0a1e66f2761eecb251c9da7

            SHA512

            3fe1935aa48af31c101b6e88973cd648065a0f1d4b5315a3cce0f589a638c76db56dd8208b4b18c983fa690752e9184208f2356b9aea3b608443c0f921bd3daa

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhKn5289kt.exe

            Filesize

            416KB

            MD5

            9bc64b81e42e6b9487ce143d2037e433

            SHA1

            8dc0feffeffe3ea9669817d0b9d5a9bb22177a95

            SHA256

            bce399064d7fdb472d6f9c8bf9ed8a014c9ecc96272b6034974668b9b161b40e

            SHA512

            10396be036a4e844fd47cb1b40092bb7e79be43a10e41b08e60292bd4f779a8e2044a96d93bbf9a1a0a6dafa5d4bd6da0061bed9ed82ca6ac8863c0a6fc26879

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhKn5289kt.exe

            Filesize

            416KB

            MD5

            9bc64b81e42e6b9487ce143d2037e433

            SHA1

            8dc0feffeffe3ea9669817d0b9d5a9bb22177a95

            SHA256

            bce399064d7fdb472d6f9c8bf9ed8a014c9ecc96272b6034974668b9b161b40e

            SHA512

            10396be036a4e844fd47cb1b40092bb7e79be43a10e41b08e60292bd4f779a8e2044a96d93bbf9a1a0a6dafa5d4bd6da0061bed9ed82ca6ac8863c0a6fc26879

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf78ZG34KT28.exe

            Filesize

            12KB

            MD5

            163c1fd0cdefbd60262bf301469a2dab

            SHA1

            d437fbf3306084052c9b898d4105ad900661a1a9

            SHA256

            c49e7dbe9577d03c46b8036026441aa142dd8367cb70eabc31400ccd269fb78e

            SHA512

            1027df225cf670615a12e780986eda34323bcbaf485c3deff72d795502be3f1bb4f170ae2f9f81b37c8b8d7f2cee8ea222a76c858ffc04d4e5992d6422a9fee8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf78ZG34KT28.exe

            Filesize

            12KB

            MD5

            163c1fd0cdefbd60262bf301469a2dab

            SHA1

            d437fbf3306084052c9b898d4105ad900661a1a9

            SHA256

            c49e7dbe9577d03c46b8036026441aa142dd8367cb70eabc31400ccd269fb78e

            SHA512

            1027df225cf670615a12e780986eda34323bcbaf485c3deff72d795502be3f1bb4f170ae2f9f81b37c8b8d7f2cee8ea222a76c858ffc04d4e5992d6422a9fee8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83LG18Gr67.exe

            Filesize

            419KB

            MD5

            6b48a9a5ca542b20633aff65ae0e882a

            SHA1

            c5e08fe68b82b937492e9686347567a37d606a48

            SHA256

            763b078fafe64dce994f8843a962741a00784eb2adcd8de0a1865f459e454355

            SHA512

            05e452f2b6540bc566b8d3b956c1e1ca8b645be991583374a559bd84fcd13c1ec79526a5b7dfb01369b0120793d1ac6aa4b5b956a5311ac504ed79cd0ea9e2e5

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf83LG18Gr67.exe

            Filesize

            419KB

            MD5

            6b48a9a5ca542b20633aff65ae0e882a

            SHA1

            c5e08fe68b82b937492e9686347567a37d606a48

            SHA256

            763b078fafe64dce994f8843a962741a00784eb2adcd8de0a1865f459e454355

            SHA512

            05e452f2b6540bc566b8d3b956c1e1ca8b645be991583374a559bd84fcd13c1ec79526a5b7dfb01369b0120793d1ac6aa4b5b956a5311ac504ed79cd0ea9e2e5

          • memory/1496-147-0x0000000000870000-0x000000000087A000-memory.dmp

            Filesize

            40KB

          • memory/2480-1085-0x0000000000190000-0x00000000001C2000-memory.dmp

            Filesize

            200KB

          • memory/2480-1086-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

            Filesize

            64KB

          • memory/4772-191-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-203-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-156-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-158-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-160-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-162-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-164-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-167-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-165-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-169-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-168-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-171-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-173-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-175-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-177-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-179-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-181-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-183-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-185-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-187-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-189-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-154-0x0000000007300000-0x00000000078A4000-memory.dmp

            Filesize

            5.6MB

          • memory/4772-193-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-195-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-197-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-199-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-201-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-155-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-205-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-207-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-209-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-211-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-213-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-215-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-217-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-219-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-221-0x00000000078B0000-0x00000000078EE000-memory.dmp

            Filesize

            248KB

          • memory/4772-1064-0x0000000007920000-0x0000000007F38000-memory.dmp

            Filesize

            6.1MB

          • memory/4772-1065-0x0000000007FC0000-0x00000000080CA000-memory.dmp

            Filesize

            1.0MB

          • memory/4772-1066-0x0000000008100000-0x0000000008112000-memory.dmp

            Filesize

            72KB

          • memory/4772-1067-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-1068-0x0000000008120000-0x000000000815C000-memory.dmp

            Filesize

            240KB

          • memory/4772-1070-0x0000000008410000-0x00000000084A2000-memory.dmp

            Filesize

            584KB

          • memory/4772-1071-0x00000000084B0000-0x0000000008516000-memory.dmp

            Filesize

            408KB

          • memory/4772-1072-0x0000000008BB0000-0x0000000008C26000-memory.dmp

            Filesize

            472KB

          • memory/4772-1073-0x0000000008C40000-0x0000000008C90000-memory.dmp

            Filesize

            320KB

          • memory/4772-1074-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-1075-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-1076-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB

          • memory/4772-153-0x0000000002BE0000-0x0000000002C2B000-memory.dmp

            Filesize

            300KB

          • memory/4772-1077-0x0000000008CB0000-0x0000000008E72000-memory.dmp

            Filesize

            1.8MB

          • memory/4772-1078-0x0000000008E80000-0x00000000093AC000-memory.dmp

            Filesize

            5.2MB

          • memory/4772-1079-0x00000000072F0000-0x0000000007300000-memory.dmp

            Filesize

            64KB