Analysis

  • max time kernel
    85s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2023, 23:32

General

  • Target

    2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe

  • Size

    726KB

  • MD5

    390d75a4715d43ab83c63198e0c1d4e2

  • SHA1

    a3e06b2c12c398b5425a135ed359bfa63e312606

  • SHA256

    2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b

  • SHA512

    a93a1f7b870ad65ccf76ef817ddf94dabfc4fd5453d589c79514cc95c349fa4e557efca9ebda315a3f6f564445bff00b88f3e3956ebde5f95d0a94a9302c13e4

  • SSDEEP

    12288:BMr2y90eFCJJ04UxqggkMW2aa0XMNLMRuONa+n2R9/D/AMTHnxuE77ud7l:nyh4U29dYsOPn2RZkOHxu87uP

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

misha

C2

193.56.146.11:4173

Attributes
  • auth_value

    e17e441c954db214b94a603a7b0b1aea

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe
    "C:\Users\Admin\AppData\Local\Temp\2f5cf944274f4514533b9ce6c850c0b0fe16d34c0acccfe4a00710eae166710b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycVA8542fR.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycVA8542fR.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275kj.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275kj.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 1108
          4⤵
          • Program crash
          PID:208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81Ha21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81Ha21.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 1708
          4⤵
          • Program crash
          PID:4872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xptVf50.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xptVf50.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2448 -ip 2448
    1⤵
      PID:32
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2904 -ip 2904
      1⤵
        PID:4936

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xptVf50.exe

        Filesize

        175KB

        MD5

        fb6b1dfc1d31819df66b4eba004f4f1e

        SHA1

        8fb4085acc6bdac0c653130d20ccf87dc0a4bc16

        SHA256

        4a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549

        SHA512

        270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xptVf50.exe

        Filesize

        175KB

        MD5

        fb6b1dfc1d31819df66b4eba004f4f1e

        SHA1

        8fb4085acc6bdac0c653130d20ccf87dc0a4bc16

        SHA256

        4a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549

        SHA512

        270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycVA8542fR.exe

        Filesize

        581KB

        MD5

        f0e9d7d70c2b0c0de1c7b40876b51381

        SHA1

        5e9d2613a8d8aa59edb86d844431747f1d05082b

        SHA256

        8f4319eb3738863d11c1d43b59180d2292d395a859ccab09a00776ea28d5e831

        SHA512

        fe8d06594f6a9924aff1ec1a1e0cafae880e5419aed9de4112a3302d08f9f3f8fb865d89abb2f9a2e4ac63578366c1e59108a8484e456073aaa07c6e199baa44

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycVA8542fR.exe

        Filesize

        581KB

        MD5

        f0e9d7d70c2b0c0de1c7b40876b51381

        SHA1

        5e9d2613a8d8aa59edb86d844431747f1d05082b

        SHA256

        8f4319eb3738863d11c1d43b59180d2292d395a859ccab09a00776ea28d5e831

        SHA512

        fe8d06594f6a9924aff1ec1a1e0cafae880e5419aed9de4112a3302d08f9f3f8fb865d89abb2f9a2e4ac63578366c1e59108a8484e456073aaa07c6e199baa44

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275kj.exe

        Filesize

        363KB

        MD5

        5f9106c1a4ae0150887ac3eadc521f31

        SHA1

        b7c59f033e09829e70ebf380ef9c33aff98d2bf4

        SHA256

        ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

        SHA512

        80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275kj.exe

        Filesize

        363KB

        MD5

        5f9106c1a4ae0150887ac3eadc521f31

        SHA1

        b7c59f033e09829e70ebf380ef9c33aff98d2bf4

        SHA256

        ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

        SHA512

        80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81Ha21.exe

        Filesize

        392KB

        MD5

        c043039d011fe79d35f7b0bca0e4b9ac

        SHA1

        d9f8d058327a1e2232685832b9785c831b5465dd

        SHA256

        9dee345f969dda3f5c2ba41b9852030043a3c0e03ccea25983c18170a9a1b51c

        SHA512

        032401a08b4f2baf654c0c84d69b9c24821d6497c51f32816920606c458f603188cb3cd0400ce8814d937523765b0e6483a519abb44433bb4af1d6b391839365

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81Ha21.exe

        Filesize

        392KB

        MD5

        c043039d011fe79d35f7b0bca0e4b9ac

        SHA1

        d9f8d058327a1e2232685832b9785c831b5465dd

        SHA256

        9dee345f969dda3f5c2ba41b9852030043a3c0e03ccea25983c18170a9a1b51c

        SHA512

        032401a08b4f2baf654c0c84d69b9c24821d6497c51f32816920606c458f603188cb3cd0400ce8814d937523765b0e6483a519abb44433bb4af1d6b391839365

      • memory/2448-148-0x0000000002CD0000-0x0000000002CFD000-memory.dmp

        Filesize

        180KB

      • memory/2448-149-0x0000000007480000-0x0000000007490000-memory.dmp

        Filesize

        64KB

      • memory/2448-150-0x0000000007480000-0x0000000007490000-memory.dmp

        Filesize

        64KB

      • memory/2448-151-0x0000000007480000-0x0000000007490000-memory.dmp

        Filesize

        64KB

      • memory/2448-152-0x0000000007490000-0x0000000007A34000-memory.dmp

        Filesize

        5.6MB

      • memory/2448-153-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-154-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-156-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-158-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-160-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-162-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-164-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-166-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-168-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-170-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-172-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-174-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-176-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-178-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-180-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

        Filesize

        72KB

      • memory/2448-181-0x0000000000400000-0x0000000002BC9000-memory.dmp

        Filesize

        39.8MB

      • memory/2448-182-0x0000000007480000-0x0000000007490000-memory.dmp

        Filesize

        64KB

      • memory/2448-183-0x0000000007480000-0x0000000007490000-memory.dmp

        Filesize

        64KB

      • memory/2448-184-0x0000000007480000-0x0000000007490000-memory.dmp

        Filesize

        64KB

      • memory/2448-186-0x0000000000400000-0x0000000002BC9000-memory.dmp

        Filesize

        39.8MB

      • memory/2904-191-0x00000000005C0000-0x000000000060B000-memory.dmp

        Filesize

        300KB

      • memory/2904-192-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/2904-193-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/2904-194-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-195-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-197-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-199-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-201-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-203-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-205-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-207-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-209-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-211-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-213-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-215-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-217-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-219-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-221-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-223-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-225-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-227-0x0000000005070000-0x00000000050AE000-memory.dmp

        Filesize

        248KB

      • memory/2904-248-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/2904-1101-0x0000000005230000-0x0000000005848000-memory.dmp

        Filesize

        6.1MB

      • memory/2904-1102-0x00000000058D0000-0x00000000059DA000-memory.dmp

        Filesize

        1.0MB

      • memory/2904-1103-0x0000000005A10000-0x0000000005A22000-memory.dmp

        Filesize

        72KB

      • memory/2904-1104-0x0000000005A30000-0x0000000005A6C000-memory.dmp

        Filesize

        240KB

      • memory/2904-1105-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/2904-1107-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/2904-1108-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/2904-1109-0x0000000005D20000-0x0000000005DB2000-memory.dmp

        Filesize

        584KB

      • memory/2904-1110-0x0000000005DC0000-0x0000000005E26000-memory.dmp

        Filesize

        408KB

      • memory/2904-1111-0x00000000065E0000-0x00000000067A2000-memory.dmp

        Filesize

        1.8MB

      • memory/2904-1112-0x00000000067C0000-0x0000000006CEC000-memory.dmp

        Filesize

        5.2MB

      • memory/2904-1113-0x0000000006E30000-0x0000000006EA6000-memory.dmp

        Filesize

        472KB

      • memory/2904-1114-0x0000000006EB0000-0x0000000006F00000-memory.dmp

        Filesize

        320KB

      • memory/2904-1116-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB

      • memory/4960-1121-0x0000000000A60000-0x0000000000A92000-memory.dmp

        Filesize

        200KB

      • memory/4960-1122-0x0000000005300000-0x0000000005310000-memory.dmp

        Filesize

        64KB