Analysis

  • max time kernel
    78s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2023 15:30

General

  • Target

    ae42b5eb4b9711f8a2f542170d5d54e7438aa7b4a8064bb19256db6921eb3ed3.exe

  • Size

    836KB

  • MD5

    0c55ddf09c8699f7baea80b9cef2c8f3

  • SHA1

    a001840631c863e34e7abcbaaa49b5b829ff7ed1

  • SHA256

    ae42b5eb4b9711f8a2f542170d5d54e7438aa7b4a8064bb19256db6921eb3ed3

  • SHA512

    b99f8c069130029b8565dd90daaea7c0cc42d3acc1b92f2a895892039ddb8db1647d26add0ce4c980d036f2fa492d365bb44dc395364cd3f47357cac12966d38

  • SSDEEP

    12288:RMrzy90lZa4YE+tJV9JE0FAD59KxnYBh7FySy7fGPXTnus1xgvQeIZ4ATgjpVmh/:iy449JE0FAWAJkUPDnh2lA2YBTtES

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

ruka

C2

193.233.20.28:4125

Attributes
  • auth_value

    5d1d0e51ebe1e3f16cca573ff651c43c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae42b5eb4b9711f8a2f542170d5d54e7438aa7b4a8064bb19256db6921eb3ed3.exe
    "C:\Users\Admin\AppData\Local\Temp\ae42b5eb4b9711f8a2f542170d5d54e7438aa7b4a8064bb19256db6921eb3ed3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9293.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9293.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba2638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba2638.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4613qM.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4613qM.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h08pT49.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h08pT49.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1820
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1080
            5⤵
            • Program crash
            PID:3788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iytFD93.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iytFD93.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 1316
          4⤵
          • Program crash
          PID:2784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l89kv24.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l89kv24.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1820 -ip 1820
    1⤵
      PID:5116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3908 -ip 3908
      1⤵
        PID:4644

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l89kv24.exe

        Filesize

        175KB

        MD5

        6c4c2a56d5dd785adbe4fe60fa3cc1f2

        SHA1

        f8bd4379310258f8e54c47b56f5eec7394adb9a2

        SHA256

        b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

        SHA512

        f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l89kv24.exe

        Filesize

        175KB

        MD5

        6c4c2a56d5dd785adbe4fe60fa3cc1f2

        SHA1

        f8bd4379310258f8e54c47b56f5eec7394adb9a2

        SHA256

        b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

        SHA512

        f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9293.exe

        Filesize

        694KB

        MD5

        3d37bdbab7de1d157bcb0922d5122354

        SHA1

        b560ead006e57da7798f4eedede1de8e7d5e5fca

        SHA256

        ec21aaaec30bce61df49ef6abb8f0d7fe847a4b997b44d827321a1b2cc6ae57f

        SHA512

        60b222d804c54a807d8978ae0b27700140a9e1e804bd05d3d9a797f16579fc45cbbd5f66e9ae2ce19d54b27623688aab1d23c540da372615ede992d7c0dce68b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9293.exe

        Filesize

        694KB

        MD5

        3d37bdbab7de1d157bcb0922d5122354

        SHA1

        b560ead006e57da7798f4eedede1de8e7d5e5fca

        SHA256

        ec21aaaec30bce61df49ef6abb8f0d7fe847a4b997b44d827321a1b2cc6ae57f

        SHA512

        60b222d804c54a807d8978ae0b27700140a9e1e804bd05d3d9a797f16579fc45cbbd5f66e9ae2ce19d54b27623688aab1d23c540da372615ede992d7c0dce68b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iytFD93.exe

        Filesize

        391KB

        MD5

        9b163845c68b97d7a379867e2dbeb1af

        SHA1

        210f1010f96a238ca30b72732f0fcc374ac58b56

        SHA256

        a3a9e513a177f9c391b7dccc37cfcd2d397131badcabf4397f2fbce36347c9e7

        SHA512

        d1c77173bde0e9e902baf0d058a175742802a46390736d279e60cc4f805be3015edd6e40b3cb9c9be397395c0333dec61d45e7c5762ea0f0154306d6d32eba7d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iytFD93.exe

        Filesize

        391KB

        MD5

        9b163845c68b97d7a379867e2dbeb1af

        SHA1

        210f1010f96a238ca30b72732f0fcc374ac58b56

        SHA256

        a3a9e513a177f9c391b7dccc37cfcd2d397131badcabf4397f2fbce36347c9e7

        SHA512

        d1c77173bde0e9e902baf0d058a175742802a46390736d279e60cc4f805be3015edd6e40b3cb9c9be397395c0333dec61d45e7c5762ea0f0154306d6d32eba7d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba2638.exe

        Filesize

        344KB

        MD5

        4c128b3145143223f039ace12c480ceb

        SHA1

        6bcf8aa7c290e43aa10e7e11ff4e5ef200e968f7

        SHA256

        5fd18249fa3f32703198768f3ef837599bb62055e87e2abb2d60c0b432d8448e

        SHA512

        b165db627c228ecd84fd440736815c39d06d1d1f5c292dfed8e1ceb51f7dbb4eed922d3fdc7491c7b431a0488d17d743fffcd065a9e29aeb5ac5e5684b6698df

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba2638.exe

        Filesize

        344KB

        MD5

        4c128b3145143223f039ace12c480ceb

        SHA1

        6bcf8aa7c290e43aa10e7e11ff4e5ef200e968f7

        SHA256

        5fd18249fa3f32703198768f3ef837599bb62055e87e2abb2d60c0b432d8448e

        SHA512

        b165db627c228ecd84fd440736815c39d06d1d1f5c292dfed8e1ceb51f7dbb4eed922d3fdc7491c7b431a0488d17d743fffcd065a9e29aeb5ac5e5684b6698df

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4613qM.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4613qM.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h08pT49.exe

        Filesize

        333KB

        MD5

        7dd0d2da06ca3e61f1995eca0307065b

        SHA1

        79946c992a183c9d22dd75d8919701e7ac9c5bab

        SHA256

        c9bcdca8c6180084589ef527c02edefdf98f4fcb7cf15ce1d04ab8d86028a5e3

        SHA512

        f3f8012bebd3b81de5e697ba16449f83cefaabfd78703472e92c982a55331dd95a63cb5a15a9b0c41216cad2292e7fcf26ecfa8b72432aeee4bfd93bc39cf2c6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h08pT49.exe

        Filesize

        333KB

        MD5

        7dd0d2da06ca3e61f1995eca0307065b

        SHA1

        79946c992a183c9d22dd75d8919701e7ac9c5bab

        SHA256

        c9bcdca8c6180084589ef527c02edefdf98f4fcb7cf15ce1d04ab8d86028a5e3

        SHA512

        f3f8012bebd3b81de5e697ba16449f83cefaabfd78703472e92c982a55331dd95a63cb5a15a9b0c41216cad2292e7fcf26ecfa8b72432aeee4bfd93bc39cf2c6

      • memory/1820-166-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

        Filesize

        180KB

      • memory/1820-180-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-162-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-164-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-167-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-168-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/1820-160-0x0000000007140000-0x00000000076E4000-memory.dmp

        Filesize

        5.6MB

      • memory/1820-171-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/1820-170-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/1820-172-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-174-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-176-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-178-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-161-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-182-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-184-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-186-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-188-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-190-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-192-0x0000000007070000-0x0000000007082000-memory.dmp

        Filesize

        72KB

      • memory/1820-193-0x0000000000400000-0x0000000002B03000-memory.dmp

        Filesize

        39.0MB

      • memory/1820-195-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/1820-196-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/1820-197-0x0000000007130000-0x0000000007140000-memory.dmp

        Filesize

        64KB

      • memory/1820-198-0x0000000000400000-0x0000000002B03000-memory.dmp

        Filesize

        39.0MB

      • memory/2788-1135-0x0000000005B60000-0x0000000005B70000-memory.dmp

        Filesize

        64KB

      • memory/2788-1134-0x0000000000FE0000-0x0000000001012000-memory.dmp

        Filesize

        200KB

      • memory/3908-203-0x0000000002DD0000-0x0000000002E1B000-memory.dmp

        Filesize

        300KB

      • memory/3908-206-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-205-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-208-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-210-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-212-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-214-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-216-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-218-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-220-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-222-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-228-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-226-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-224-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-230-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-232-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-234-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-236-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-238-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-240-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-1113-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/3908-1114-0x0000000007F00000-0x000000000800A000-memory.dmp

        Filesize

        1.0MB

      • memory/3908-1115-0x0000000008040000-0x0000000008052000-memory.dmp

        Filesize

        72KB

      • memory/3908-1116-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-1117-0x0000000008060000-0x000000000809C000-memory.dmp

        Filesize

        240KB

      • memory/3908-1119-0x0000000008350000-0x00000000083B6000-memory.dmp

        Filesize

        408KB

      • memory/3908-1120-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-1121-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-1122-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-1123-0x0000000008A20000-0x0000000008AB2000-memory.dmp

        Filesize

        584KB

      • memory/3908-1124-0x0000000008B10000-0x0000000008CD2000-memory.dmp

        Filesize

        1.8MB

      • memory/3908-1125-0x0000000008CF0000-0x000000000921C000-memory.dmp

        Filesize

        5.2MB

      • memory/3908-1126-0x00000000096D0000-0x0000000009746000-memory.dmp

        Filesize

        472KB

      • memory/3908-207-0x00000000070C0000-0x00000000070FE000-memory.dmp

        Filesize

        248KB

      • memory/3908-204-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3908-1127-0x0000000009760000-0x00000000097B0000-memory.dmp

        Filesize

        320KB

      • memory/3908-1128-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/4296-154-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

        Filesize

        40KB