Analysis

  • max time kernel
    87s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2023, 21:44

General

  • Target

    69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe

  • Size

    558KB

  • MD5

    d49b1262701ef47a1d3d13a09a2a86f8

  • SHA1

    f1fd6558f00c034701e7b63a2f68ba73c75d47cb

  • SHA256

    69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a

  • SHA512

    a8a4ced93fe2aac8e02d50febea1ae06e9ce965de738d8bd4c0980044530bceafc68226c96aed5ce13a6f11d1cc12abfeab82740a529dd508495711db72abb04

  • SSDEEP

    12288:iMr4y90LRjmRAO/uSTz6fRZVskz63dmN09X5QDWWKzrc+9zcAHpB:KyMRB1UzQRvsu6359X5QiWKL9gAJB

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

misha

C2

193.56.146.11:4173

Attributes
  • auth_value

    e17e441c954db214b94a603a7b0b1aea

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe
    "C:\Users\Admin\AppData\Local\Temp\69b66440de0c45d9daf70f3cf21cd0df66e2d9b22b1665874a5c95f6b15f4c3a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkkz2589jh.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkkz2589jh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0779HJ.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0779HJ.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t39kU80.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t39kU80.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 1488
          4⤵
          • Program crash
          PID:1200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uTunu70.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uTunu70.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3636 -ip 3636
    1⤵
      PID:4404

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uTunu70.exe

            Filesize

            175KB

            MD5

            fb6b1dfc1d31819df66b4eba004f4f1e

            SHA1

            8fb4085acc6bdac0c653130d20ccf87dc0a4bc16

            SHA256

            4a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549

            SHA512

            270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uTunu70.exe

            Filesize

            175KB

            MD5

            fb6b1dfc1d31819df66b4eba004f4f1e

            SHA1

            8fb4085acc6bdac0c653130d20ccf87dc0a4bc16

            SHA256

            4a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549

            SHA512

            270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkkz2589jh.exe

            Filesize

            414KB

            MD5

            ca62ce1dd1866229152bb96cee5c9220

            SHA1

            6948e006a0557559c6286d941e795a074168726b

            SHA256

            7529633d37d4d238238ea779308722bc021011da4a496e89851c17cbdaf11bb8

            SHA512

            f656d28e4e610a814bb5f6aaf3485ae55b2f96ba6a147b341e8f7c2fd5335dc1e97c2360715e75490c8e2ec7bd0b07f0a62b589c9ea3e554cb17176b4e22e2d4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkkz2589jh.exe

            Filesize

            414KB

            MD5

            ca62ce1dd1866229152bb96cee5c9220

            SHA1

            6948e006a0557559c6286d941e795a074168726b

            SHA256

            7529633d37d4d238238ea779308722bc021011da4a496e89851c17cbdaf11bb8

            SHA512

            f656d28e4e610a814bb5f6aaf3485ae55b2f96ba6a147b341e8f7c2fd5335dc1e97c2360715e75490c8e2ec7bd0b07f0a62b589c9ea3e554cb17176b4e22e2d4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0779HJ.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0779HJ.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t39kU80.exe

            Filesize

            391KB

            MD5

            f4a3e231a550fb23f6ae4ca3b665867e

            SHA1

            95385ee65c82259f32afa57e615cbd5b6765814c

            SHA256

            b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0

            SHA512

            6cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t39kU80.exe

            Filesize

            391KB

            MD5

            f4a3e231a550fb23f6ae4ca3b665867e

            SHA1

            95385ee65c82259f32afa57e615cbd5b6765814c

            SHA256

            b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0

            SHA512

            6cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183

          • memory/3636-153-0x00000000004F0000-0x000000000053B000-memory.dmp

            Filesize

            300KB

          • memory/3636-154-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-155-0x0000000004B00000-0x00000000050A4000-memory.dmp

            Filesize

            5.6MB

          • memory/3636-156-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-157-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-159-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-161-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-163-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-165-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-167-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-169-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-171-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-173-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-175-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-177-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-179-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-181-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-183-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-185-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-187-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-189-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-191-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-193-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-195-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-197-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-199-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-201-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-204-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-206-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-203-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-207-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-209-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-211-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-215-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-217-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-219-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-213-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-221-0x0000000002760000-0x000000000279E000-memory.dmp

            Filesize

            248KB

          • memory/3636-1064-0x00000000050F0000-0x0000000005708000-memory.dmp

            Filesize

            6.1MB

          • memory/3636-1065-0x0000000005790000-0x000000000589A000-memory.dmp

            Filesize

            1.0MB

          • memory/3636-1066-0x00000000058D0000-0x00000000058E2000-memory.dmp

            Filesize

            72KB

          • memory/3636-1067-0x00000000058F0000-0x000000000592C000-memory.dmp

            Filesize

            240KB

          • memory/3636-1068-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-1069-0x0000000005BE0000-0x0000000005C72000-memory.dmp

            Filesize

            584KB

          • memory/3636-1070-0x0000000005C80000-0x0000000005CE6000-memory.dmp

            Filesize

            408KB

          • memory/3636-1072-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-1073-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-1074-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3636-1075-0x0000000006490000-0x0000000006506000-memory.dmp

            Filesize

            472KB

          • memory/3636-1076-0x0000000006510000-0x0000000006560000-memory.dmp

            Filesize

            320KB

          • memory/3636-1077-0x0000000006590000-0x0000000006752000-memory.dmp

            Filesize

            1.8MB

          • memory/3636-1078-0x00000000069A0000-0x0000000006ECC000-memory.dmp

            Filesize

            5.2MB

          • memory/3636-1079-0x0000000002710000-0x0000000002720000-memory.dmp

            Filesize

            64KB

          • memory/3696-1085-0x00000000002A0000-0x00000000002D2000-memory.dmp

            Filesize

            200KB

          • memory/3696-1086-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

            Filesize

            64KB

          • memory/3696-1087-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

            Filesize

            64KB

          • memory/4252-147-0x0000000000D40000-0x0000000000D4A000-memory.dmp

            Filesize

            40KB