Analysis

  • max time kernel
    114s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2023, 07:33

General

  • Target

    d598e01cce94949613b1366229f9c2d5bc57ae0e2467f42be52d2e56d4ed21d9.exe

  • Size

    386KB

  • MD5

    8ada931a2261b4c0d7ac9a47ccc0d392

  • SHA1

    959d9d67f532830c864686a0f528e8150fb6edef

  • SHA256

    d598e01cce94949613b1366229f9c2d5bc57ae0e2467f42be52d2e56d4ed21d9

  • SHA512

    220d42d6f6ff2eebdfd99ab39a2837228affd1299d36eeec0502761971da698d5062019e498ad46a67d42baebb48a4281b119b27bb2785ff60d49464713feea9

  • SSDEEP

    6144:Kcy+bnr+op0yN90QEtAMqbmSVnSlq49gs4e5lCJyY8WvLBEyvQZOQJIkVnt:oMrcy90cbmRqqn4euJyY8MFEUQjZH

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d598e01cce94949613b1366229f9c2d5bc57ae0e2467f42be52d2e56d4ed21d9.exe
    "C:\Users\Admin\AppData\Local\Temp\d598e01cce94949613b1366229f9c2d5bc57ae0e2467f42be52d2e56d4ed21d9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2283To.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2283To.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t15eI29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t15eI29.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1328
        3⤵
        • Program crash
        PID:4912
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2456 -ip 2456
    1⤵
      PID:1596

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2283To.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2283To.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t15eI29.exe

            Filesize

            301KB

            MD5

            19a7d8ff4aaaff6d27d40f63bfda81d9

            SHA1

            d837291fe27c85a7447d4ac7aa3b48ed992ee0bc

            SHA256

            524c1d04272ff34e45a9335f4d365735bbaa8727f3d6c988a825f50809f92053

            SHA512

            ba40e91396eb80ce1ec70361db93a42ee63f0c05c23ae0edeb180272a44bd46ea900da19074e0e118fec5e70ce58ae0e34b95964f4633c75591fe4e62ccfbcf4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t15eI29.exe

            Filesize

            301KB

            MD5

            19a7d8ff4aaaff6d27d40f63bfda81d9

            SHA1

            d837291fe27c85a7447d4ac7aa3b48ed992ee0bc

            SHA256

            524c1d04272ff34e45a9335f4d365735bbaa8727f3d6c988a825f50809f92053

            SHA512

            ba40e91396eb80ce1ec70361db93a42ee63f0c05c23ae0edeb180272a44bd46ea900da19074e0e118fec5e70ce58ae0e34b95964f4633c75591fe4e62ccfbcf4

          • memory/2456-146-0x0000000004C00000-0x00000000051A4000-memory.dmp

            Filesize

            5.6MB

          • memory/2456-147-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-148-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-150-0x0000000000540000-0x000000000058B000-memory.dmp

            Filesize

            300KB

          • memory/2456-151-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-154-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-152-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-155-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-158-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-157-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-160-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-162-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-164-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-166-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-168-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-170-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-172-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-174-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-176-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-178-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-180-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-182-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-184-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-186-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-188-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-190-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-192-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-194-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-196-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-198-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-200-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-202-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-204-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-206-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-208-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-210-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-212-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-214-0x0000000004A40000-0x0000000004A7E000-memory.dmp

            Filesize

            248KB

          • memory/2456-1057-0x00000000051B0000-0x00000000057C8000-memory.dmp

            Filesize

            6.1MB

          • memory/2456-1058-0x00000000057D0000-0x00000000058DA000-memory.dmp

            Filesize

            1.0MB

          • memory/2456-1059-0x0000000004B60000-0x0000000004B72000-memory.dmp

            Filesize

            72KB

          • memory/2456-1060-0x0000000004B80000-0x0000000004BBC000-memory.dmp

            Filesize

            240KB

          • memory/2456-1061-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-1063-0x0000000005B60000-0x0000000005BC6000-memory.dmp

            Filesize

            408KB

          • memory/2456-1064-0x0000000006220000-0x00000000062B2000-memory.dmp

            Filesize

            584KB

          • memory/2456-1065-0x0000000006320000-0x00000000064E2000-memory.dmp

            Filesize

            1.8MB

          • memory/2456-1066-0x00000000064F0000-0x0000000006A1C000-memory.dmp

            Filesize

            5.2MB

          • memory/2456-1068-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-1067-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-1069-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/2456-1070-0x0000000006B40000-0x0000000006BB6000-memory.dmp

            Filesize

            472KB

          • memory/2456-1071-0x0000000006BE0000-0x0000000006C30000-memory.dmp

            Filesize

            320KB

          • memory/2456-1072-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/4700-140-0x00000000001E0000-0x00000000001EA000-memory.dmp

            Filesize

            40KB