Analysis

  • max time kernel
    79s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2023 03:44

General

  • Target

    8841d1b566b108abbb86aca882867ecd.exe

  • Size

    866KB

  • MD5

    8841d1b566b108abbb86aca882867ecd

  • SHA1

    285ea38f2392feb7d0e7a966f31f7d86b79f8664

  • SHA256

    89bad8eeff38f1e5ea58348314ee05352b1eb22d3a4ee8c15be9d0098779487e

  • SHA512

    2e17383060eb5b7d43a12a620e892db4f1ca9d2aa351deee5cc63e11f7a1f927ae4670d2ab3fbc88d79b2162d695fdd1e2630c15f48fb979d736c0d32875567a

  • SSDEEP

    12288:9Mray90T6WJPNyIt8mZYU5FOOjJcN9fqU0XxyJG/WT3+V1gKGuVHJQSmfkA:zyQJPoq8mZVnDoux0uo3DpuESC

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8841d1b566b108abbb86aca882867ecd.exe
    "C:\Users\Admin\AppData\Local\Temp\8841d1b566b108abbb86aca882867ecd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6198.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6198.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2187.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2802KS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2802KS.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3680
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48Gu99.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48Gu99.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsScQ05.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsScQ05.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1356
          4⤵
          • Program crash
          PID:408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04DK99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04DK99.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2688 -ip 2688
    1⤵
      PID:4600

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04DK99.exe
      Filesize

      175KB

      MD5

      6fbff2d7c9ba7f0a71f02a5c70df9dfc

      SHA1

      003da0075734cd2d7f201c5b0e4779b8e1f33621

      SHA256

      cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

      SHA512

      25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e04DK99.exe
      Filesize

      175KB

      MD5

      6fbff2d7c9ba7f0a71f02a5c70df9dfc

      SHA1

      003da0075734cd2d7f201c5b0e4779b8e1f33621

      SHA256

      cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

      SHA512

      25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6198.exe
      Filesize

      721KB

      MD5

      a3d0ce334a4e58c3cd8f4993af9355b5

      SHA1

      b84d37faf5829c9682d9de9bf078084ed0bb1751

      SHA256

      350c0180c94b722699cb384c36240571e23008fe6cb3a33a5c4edcaa62e8b248

      SHA512

      b00ad3fc96cc3f8db176f4359ed7f293b05bef8b048972abfaff6c2cea7730bc2e640a47ee7fef90af008ce14c6b14c6fde59c42fac6adcb29ed33a7a0ac1a33

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6198.exe
      Filesize

      721KB

      MD5

      a3d0ce334a4e58c3cd8f4993af9355b5

      SHA1

      b84d37faf5829c9682d9de9bf078084ed0bb1751

      SHA256

      350c0180c94b722699cb384c36240571e23008fe6cb3a33a5c4edcaa62e8b248

      SHA512

      b00ad3fc96cc3f8db176f4359ed7f293b05bef8b048972abfaff6c2cea7730bc2e640a47ee7fef90af008ce14c6b14c6fde59c42fac6adcb29ed33a7a0ac1a33

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsScQ05.exe
      Filesize

      391KB

      MD5

      fd3b5bd14ebd28872f381ef823e19fbb

      SHA1

      c3628995c1a911b8283a4bf44a17d31f226dbef0

      SHA256

      887a20409c074b0b8c6832792d38e127f134a101edf84040eb28886fc34a73f0

      SHA512

      0a86b259e050021b33663415b0739c4d1f8d6af50dab15d4edb41029f447a28e3faf9515b0d078f7cf66bdab74c285cec885ad489c408f5250ed2b62f526c2f4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsScQ05.exe
      Filesize

      391KB

      MD5

      fd3b5bd14ebd28872f381ef823e19fbb

      SHA1

      c3628995c1a911b8283a4bf44a17d31f226dbef0

      SHA256

      887a20409c074b0b8c6832792d38e127f134a101edf84040eb28886fc34a73f0

      SHA512

      0a86b259e050021b33663415b0739c4d1f8d6af50dab15d4edb41029f447a28e3faf9515b0d078f7cf66bdab74c285cec885ad489c408f5250ed2b62f526c2f4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2187.exe
      Filesize

      368KB

      MD5

      00fc080f1a6664552d57a31a316ad621

      SHA1

      f1afe5dbf483a21cde281c1047bb41caede503f5

      SHA256

      e8b0aa4b45825eaca2e0dd34792c3360156f400b34f1a4676b64e98885da36e3

      SHA512

      9bd70fbab1e19979761f624d627f6a93c4f2100a3cd9e72189857d934e18ec78cc0a1bedbd6eeea29417038161442259e52f05025b1eb8c900ab3df00e1ed59d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2187.exe
      Filesize

      368KB

      MD5

      00fc080f1a6664552d57a31a316ad621

      SHA1

      f1afe5dbf483a21cde281c1047bb41caede503f5

      SHA256

      e8b0aa4b45825eaca2e0dd34792c3360156f400b34f1a4676b64e98885da36e3

      SHA512

      9bd70fbab1e19979761f624d627f6a93c4f2100a3cd9e72189857d934e18ec78cc0a1bedbd6eeea29417038161442259e52f05025b1eb8c900ab3df00e1ed59d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2802KS.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2802KS.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48Gu99.exe
      Filesize

      371KB

      MD5

      6066b202b465a69fd67486c2c8becefc

      SHA1

      1e32625d3a69ee87755c03f5cfc48cb2cbe4da8b

      SHA256

      8a5f82ea40cc65ce852572364574ddc9cbfd6ff33b8adb9f0b2cfe3f42d33e10

      SHA512

      5db338d6e58abe54a13bfa9c4aa7af8516bf5099421d8912827de43a680c9b55e26acdaa0f18f0c3829fe708fcbfa2e408cefd6fdede151ef0cc7f94439eb5b0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48Gu99.exe
      Filesize

      371KB

      MD5

      6066b202b465a69fd67486c2c8becefc

      SHA1

      1e32625d3a69ee87755c03f5cfc48cb2cbe4da8b

      SHA256

      8a5f82ea40cc65ce852572364574ddc9cbfd6ff33b8adb9f0b2cfe3f42d33e10

      SHA512

      5db338d6e58abe54a13bfa9c4aa7af8516bf5099421d8912827de43a680c9b55e26acdaa0f18f0c3829fe708fcbfa2e408cefd6fdede151ef0cc7f94439eb5b0

    • memory/2688-1112-0x0000000007900000-0x0000000007F18000-memory.dmp
      Filesize

      6.1MB

    • memory/2688-1114-0x0000000004FE0000-0x0000000004FF2000-memory.dmp
      Filesize

      72KB

    • memory/2688-1127-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-1126-0x0000000009040000-0x000000000956C000-memory.dmp
      Filesize

      5.2MB

    • memory/2688-1125-0x0000000008E70000-0x0000000009032000-memory.dmp
      Filesize

      1.8MB

    • memory/2688-1124-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-1123-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-1122-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-1121-0x0000000008A40000-0x0000000008A90000-memory.dmp
      Filesize

      320KB

    • memory/2688-1120-0x00000000089B0000-0x0000000008A26000-memory.dmp
      Filesize

      472KB

    • memory/2688-1119-0x00000000082B0000-0x0000000008316000-memory.dmp
      Filesize

      408KB

    • memory/2688-1118-0x0000000008210000-0x00000000082A2000-memory.dmp
      Filesize

      584KB

    • memory/2688-1116-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-1115-0x0000000007F20000-0x0000000007F5C000-memory.dmp
      Filesize

      240KB

    • memory/2688-1113-0x0000000004EC0000-0x0000000004FCA000-memory.dmp
      Filesize

      1.0MB

    • memory/2688-239-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-237-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-235-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-233-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-231-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-229-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-227-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-225-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-202-0x0000000004780000-0x00000000047CB000-memory.dmp
      Filesize

      300KB

    • memory/2688-204-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-206-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-209-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-211-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-207-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-205-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-203-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
      Filesize

      64KB

    • memory/2688-213-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-215-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-217-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-219-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-221-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/2688-223-0x0000000004C50000-0x0000000004C8E000-memory.dmp
      Filesize

      248KB

    • memory/3680-154-0x00000000003E0000-0x00000000003EA000-memory.dmp
      Filesize

      40KB

    • memory/4696-186-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-196-0x0000000000400000-0x0000000002B0C000-memory.dmp
      Filesize

      39.0MB

    • memory/4696-182-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-180-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-193-0x0000000000400000-0x0000000002B0C000-memory.dmp
      Filesize

      39.0MB

    • memory/4696-192-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/4696-191-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/4696-161-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/4696-190-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-164-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-188-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-162-0x0000000007200000-0x00000000077A4000-memory.dmp
      Filesize

      5.6MB

    • memory/4696-184-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-197-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/4696-194-0x00000000071F0000-0x0000000007200000-memory.dmp
      Filesize

      64KB

    • memory/4696-178-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-176-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-174-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-172-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-170-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-168-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-166-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4696-160-0x0000000002D50000-0x0000000002D7D000-memory.dmp
      Filesize

      180KB

    • memory/4696-163-0x0000000004B70000-0x0000000004B82000-memory.dmp
      Filesize

      72KB

    • memory/4728-1133-0x00000000000D0000-0x0000000000102000-memory.dmp
      Filesize

      200KB

    • memory/4728-1134-0x0000000004A00000-0x0000000004A10000-memory.dmp
      Filesize

      64KB