Analysis

  • max time kernel
    147s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 13:51

General

  • Target

    df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe

  • Size

    426KB

  • MD5

    17154963c2dc45772c40d9ab91bb8428

  • SHA1

    4bc30597894e53fe2e5fc5df77c8fee23a3a3eb7

  • SHA256

    df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611

  • SHA512

    0de4a67832d4474b499acace13b210df449534971b778b1dc7d14db024ba502831d82faa5de500615fd4fb244390464ca5b3b2f5069da405140b7425e5f93219

  • SSDEEP

    6144:RimcTvSLofM+22tEZHAbCYiEMSKu1Ug5/pcc8ErQZyIG:MvSUfM+LcHCGfu1bnVI

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe
    "C:\Users\Admin\AppData\Local\Temp\df984f4f3967ebaded6f110c3df054f3c2fe9ea4009b889570cb7c5120eec611.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3308
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 1220
      2⤵
      • Program crash
      PID:4928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3308 -ip 3308
    1⤵
      PID:4448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3308-134-0x0000000004730000-0x0000000004792000-memory.dmp

      Filesize

      392KB

    • memory/3308-135-0x0000000007310000-0x00000000078B4000-memory.dmp

      Filesize

      5.6MB

    • memory/3308-136-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3308-137-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3308-138-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3308-139-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-140-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-142-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-144-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-146-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-148-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-150-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-152-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-154-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-156-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-160-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-158-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-162-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-164-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-166-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-168-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-170-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-172-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-174-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-176-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-178-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-180-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-182-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-184-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-186-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-188-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-190-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-192-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-194-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-196-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-202-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-200-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-198-0x0000000004C40000-0x0000000004C92000-memory.dmp

      Filesize

      328KB

    • memory/3308-929-0x00000000078C0000-0x0000000007ED8000-memory.dmp

      Filesize

      6.1MB

    • memory/3308-930-0x0000000007220000-0x0000000007232000-memory.dmp

      Filesize

      72KB

    • memory/3308-931-0x0000000007EE0000-0x0000000007FEA000-memory.dmp

      Filesize

      1.0MB

    • memory/3308-932-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3308-933-0x0000000007240000-0x000000000727C000-memory.dmp

      Filesize

      240KB

    • memory/3308-934-0x0000000008240000-0x00000000082A6000-memory.dmp

      Filesize

      408KB

    • memory/3308-935-0x0000000008910000-0x00000000089A2000-memory.dmp

      Filesize

      584KB

    • memory/3308-936-0x0000000008C20000-0x0000000008C96000-memory.dmp

      Filesize

      472KB

    • memory/3308-937-0x0000000008CE0000-0x0000000008EA2000-memory.dmp

      Filesize

      1.8MB

    • memory/3308-938-0x0000000008EC0000-0x00000000093EC000-memory.dmp

      Filesize

      5.2MB

    • memory/3308-939-0x0000000009500000-0x000000000951E000-memory.dmp

      Filesize

      120KB

    • memory/3308-941-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3308-942-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/3308-943-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB