Analysis

  • max time kernel
    143s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2023, 07:09

General

  • Target

    5b252d9cdc8421ac60634cfc3e17d9dd4698cd5b5b820485ddb46e0154cf0ee7.exe

  • Size

    852KB

  • MD5

    8d298de46e5b262a9a02a96c96e6babe

  • SHA1

    630020c4ca521c1bf0fb1366fd9d55e39574bfbe

  • SHA256

    5b252d9cdc8421ac60634cfc3e17d9dd4698cd5b5b820485ddb46e0154cf0ee7

  • SHA512

    61f71e99cb2eba5b21ad954604b6f98c10219a020f34387f562c7241436f414aa3e5588f97828064f5db4719f6e7239bd2aa031158e32ebb62e9a3348d8e0955

  • SSDEEP

    12288:GMrUy90xRVIPS0Ay3qgdau+T7t8SXoGNtmvUBiAkLqAM+fg3vD6w3W1Uq4BT:mycVIK0AHJBt4Qqkgei43vD/i4BT

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b252d9cdc8421ac60634cfc3e17d9dd4698cd5b5b820485ddb46e0154cf0ee7.exe
    "C:\Users\Admin\AppData\Local\Temp\5b252d9cdc8421ac60634cfc3e17d9dd4698cd5b5b820485ddb46e0154cf0ee7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6978.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6978.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1507.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1507.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8574Yt.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8574Yt.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4420
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c89VO04.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c89VO04.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3308
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 1080
            5⤵
            • Program crash
            PID:3396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drQst91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drQst91.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 1352
          4⤵
          • Program crash
          PID:4808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e87IX67.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e87IX67.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3308 -ip 3308
    1⤵
      PID:5064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3824 -ip 3824
      1⤵
        PID:4884

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e87IX67.exe

        Filesize

        175KB

        MD5

        6fbff2d7c9ba7f0a71f02a5c70df9dfc

        SHA1

        003da0075734cd2d7f201c5b0e4779b8e1f33621

        SHA256

        cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

        SHA512

        25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e87IX67.exe

        Filesize

        175KB

        MD5

        6fbff2d7c9ba7f0a71f02a5c70df9dfc

        SHA1

        003da0075734cd2d7f201c5b0e4779b8e1f33621

        SHA256

        cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

        SHA512

        25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6978.exe

        Filesize

        707KB

        MD5

        d9017288934420c564829bf4db13ac7a

        SHA1

        57cc7e24325163f7250c6c91e0fba5a5d26d10de

        SHA256

        0db9f94630c556829b070b459ce57bed7ddbf737405612f9dea4d84da005e6f8

        SHA512

        88da3820f50203dcd666f72a03accab7ed4b30d253b824160f3ce60d240638dc54a9bf381779b60f2ca4e1189a01374a8173e4fd229310060d15efea315263d3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6978.exe

        Filesize

        707KB

        MD5

        d9017288934420c564829bf4db13ac7a

        SHA1

        57cc7e24325163f7250c6c91e0fba5a5d26d10de

        SHA256

        0db9f94630c556829b070b459ce57bed7ddbf737405612f9dea4d84da005e6f8

        SHA512

        88da3820f50203dcd666f72a03accab7ed4b30d253b824160f3ce60d240638dc54a9bf381779b60f2ca4e1189a01374a8173e4fd229310060d15efea315263d3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drQst91.exe

        Filesize

        391KB

        MD5

        89beabfd2e32bd0ed971df4dc521988f

        SHA1

        271abfa3c35b5372c310c6623493e0a3ace83f25

        SHA256

        68be77b9bd423de0ab33b32519bea5e26b4786a4dcef1bdf5e891ab21602f503

        SHA512

        ae775c4675d5204eb837f1cae0709c22b63879decdee092af05d14abfa5d012e8d7be4f748c574f67d6e80b4fe26d899c551e7b120fd85b0e0c29d35dad20e0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\drQst91.exe

        Filesize

        391KB

        MD5

        89beabfd2e32bd0ed971df4dc521988f

        SHA1

        271abfa3c35b5372c310c6623493e0a3ace83f25

        SHA256

        68be77b9bd423de0ab33b32519bea5e26b4786a4dcef1bdf5e891ab21602f503

        SHA512

        ae775c4675d5204eb837f1cae0709c22b63879decdee092af05d14abfa5d012e8d7be4f748c574f67d6e80b4fe26d899c551e7b120fd85b0e0c29d35dad20e0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1507.exe

        Filesize

        353KB

        MD5

        e68ca489471d76ede2a12eb3676f6d49

        SHA1

        d6b24d3146f773d4e089811b27f439e401446f6e

        SHA256

        cb9b3426752421c69e5c428c9db49dd6b3262ec6c4393b28ac582761ff04d11e

        SHA512

        5bb4ccf207471a80ee9960e969b3c4807783eb40a82b4821ac1660b748e1c42ba1a3e5fccc519e220e8f858b1fc9d92e2f0968ed837ac885236d45f384b31944

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1507.exe

        Filesize

        353KB

        MD5

        e68ca489471d76ede2a12eb3676f6d49

        SHA1

        d6b24d3146f773d4e089811b27f439e401446f6e

        SHA256

        cb9b3426752421c69e5c428c9db49dd6b3262ec6c4393b28ac582761ff04d11e

        SHA512

        5bb4ccf207471a80ee9960e969b3c4807783eb40a82b4821ac1660b748e1c42ba1a3e5fccc519e220e8f858b1fc9d92e2f0968ed837ac885236d45f384b31944

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8574Yt.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8574Yt.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c89VO04.exe

        Filesize

        333KB

        MD5

        b1d3b848b6ae6acf3e0408f170435cff

        SHA1

        41295fb5dcff60113938585e7b118a6c6f715a36

        SHA256

        56b6e9333c98fb42290ad80ac3d96551c5d55e6e5ffc74567baa614fb7a19b67

        SHA512

        5f9f5edff34584c2b764bf98c227a2425fcc3f6211d3eb2a4f53d77a9bb798612ccd7d27b374daaa4cde6a3173137a878442d803beb25732e8b5f6199283224e

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c89VO04.exe

        Filesize

        333KB

        MD5

        b1d3b848b6ae6acf3e0408f170435cff

        SHA1

        41295fb5dcff60113938585e7b118a6c6f715a36

        SHA256

        56b6e9333c98fb42290ad80ac3d96551c5d55e6e5ffc74567baa614fb7a19b67

        SHA512

        5f9f5edff34584c2b764bf98c227a2425fcc3f6211d3eb2a4f53d77a9bb798612ccd7d27b374daaa4cde6a3173137a878442d803beb25732e8b5f6199283224e

      • memory/3308-160-0x0000000002CD0000-0x0000000002CFD000-memory.dmp

        Filesize

        180KB

      • memory/3308-161-0x0000000007270000-0x0000000007814000-memory.dmp

        Filesize

        5.6MB

      • memory/3308-162-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/3308-163-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/3308-164-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/3308-165-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-166-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-168-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-170-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-172-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-174-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-176-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-178-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-180-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-182-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-184-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-186-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-188-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-190-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-192-0x0000000004B10000-0x0000000004B22000-memory.dmp

        Filesize

        72KB

      • memory/3308-193-0x0000000000400000-0x0000000002B03000-memory.dmp

        Filesize

        39.0MB

      • memory/3308-194-0x0000000002CD0000-0x0000000002CFD000-memory.dmp

        Filesize

        180KB

      • memory/3308-195-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/3308-196-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/3308-198-0x0000000000400000-0x0000000002B03000-memory.dmp

        Filesize

        39.0MB

      • memory/3824-203-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-236-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-206-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-205-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-208-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-210-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-209-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-212-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-214-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-216-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-218-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-220-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-222-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-224-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-226-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-228-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-230-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-232-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-234-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-204-0x0000000002DC0000-0x0000000002E0B000-memory.dmp

        Filesize

        300KB

      • memory/3824-238-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-240-0x0000000004DA0000-0x0000000004DDE000-memory.dmp

        Filesize

        248KB

      • memory/3824-1113-0x00000000077F0000-0x0000000007E08000-memory.dmp

        Filesize

        6.1MB

      • memory/3824-1114-0x0000000007E10000-0x0000000007F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/3824-1115-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

        Filesize

        72KB

      • memory/3824-1116-0x0000000007F20000-0x0000000007F5C000-memory.dmp

        Filesize

        240KB

      • memory/3824-1117-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-1119-0x0000000008210000-0x00000000082A2000-memory.dmp

        Filesize

        584KB

      • memory/3824-1120-0x00000000082B0000-0x0000000008316000-memory.dmp

        Filesize

        408KB

      • memory/3824-1121-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-1122-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-1123-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/3824-1124-0x0000000008AF0000-0x0000000008CB2000-memory.dmp

        Filesize

        1.8MB

      • memory/3824-1125-0x0000000008CC0000-0x00000000091EC000-memory.dmp

        Filesize

        5.2MB

      • memory/3824-1126-0x0000000009510000-0x0000000009586000-memory.dmp

        Filesize

        472KB

      • memory/3824-1127-0x00000000095A0000-0x00000000095F0000-memory.dmp

        Filesize

        320KB

      • memory/3824-1128-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/4052-1134-0x0000000000130000-0x0000000000162000-memory.dmp

        Filesize

        200KB

      • memory/4052-1135-0x0000000004A30000-0x0000000004A40000-memory.dmp

        Filesize

        64KB

      • memory/4420-154-0x0000000000D10000-0x0000000000D1A000-memory.dmp

        Filesize

        40KB