Analysis

  • max time kernel
    145s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2023 20:54

General

  • Target

    a94c2f5d1752ea927ca7d1e5da875d61e9f0e08dfdcc357662ba01f3be555dc9.exe

  • Size

    836KB

  • MD5

    c4b2829d9a225c8bc92cf634c95c09be

  • SHA1

    6d3cc9ea6b96aa8b5c85b61ac65694e9f09ce1fa

  • SHA256

    a94c2f5d1752ea927ca7d1e5da875d61e9f0e08dfdcc357662ba01f3be555dc9

  • SHA512

    6a0c2838b54546060f4474d6a0ba997de6644244aa3652041e22bc59b74863a045d03834553dbd432b9b96717ab5639d5e9c0a51c0be2b3019b2e81c49d2a22b

  • SSDEEP

    24576:eyLFxZ+DzUDaTkvilkd0eXP23Cixb1DLV5:tB5mThkn+3zb1fV

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

vint

C2

193.233.20.30:4125

Attributes
  • auth_value

    fb8811912f8370b3d23bffda092d88d0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a94c2f5d1752ea927ca7d1e5da875d61e9f0e08dfdcc357662ba01f3be555dc9.exe
    "C:\Users\Admin\AppData\Local\Temp\a94c2f5d1752ea927ca7d1e5da875d61e9f0e08dfdcc357662ba01f3be555dc9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5741.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5741.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3479.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3479.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1347HS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1347HS.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4444
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81Zp00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81Zp00.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4420
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 1016
            5⤵
            • Program crash
            PID:2304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wxrFBC74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wxrFBC74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 1844
          4⤵
          • Program crash
          PID:452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XOZTVC~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XOZTVC~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4296
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4420 -ip 4420
    1⤵
      PID:2960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3996 -ip 3996
      1⤵
        PID:3976

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XOZTVC~1.EXE
        Filesize

        175KB

        MD5

        3389637c0d072121bf1b127629736d37

        SHA1

        300e915efdf2479bfd0d3699c0a6bc51260f9655

        SHA256

        2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153

        SHA512

        a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\XOZTVC~1.EXE
        Filesize

        175KB

        MD5

        3389637c0d072121bf1b127629736d37

        SHA1

        300e915efdf2479bfd0d3699c0a6bc51260f9655

        SHA256

        2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153

        SHA512

        a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5741.exe
        Filesize

        694KB

        MD5

        92f28dfa8f937d5495e4e8dbcf2fcc22

        SHA1

        9e5011a4df244518301d9dce54014bffbfd8b460

        SHA256

        6586d6e3e9a24b82c53509ad57f3fcbb84efacb16011919501545b3145c20d97

        SHA512

        5b956d224f69c1baf48cc8721166e59f49a6605958e352f21089d2d35464dd5ab7c273e07629d682516b8885a699a63975690517cca8972e12f4b0cf3bc96b03

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5741.exe
        Filesize

        694KB

        MD5

        92f28dfa8f937d5495e4e8dbcf2fcc22

        SHA1

        9e5011a4df244518301d9dce54014bffbfd8b460

        SHA256

        6586d6e3e9a24b82c53509ad57f3fcbb84efacb16011919501545b3145c20d97

        SHA512

        5b956d224f69c1baf48cc8721166e59f49a6605958e352f21089d2d35464dd5ab7c273e07629d682516b8885a699a63975690517cca8972e12f4b0cf3bc96b03

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wxrFBC74.exe
        Filesize

        391KB

        MD5

        67b82bf644f144304036ab3f65af5d6f

        SHA1

        ee797073d55859d4ba3938e90e87eb377d848472

        SHA256

        e5b449255f2fb084e05e8b12fd9001a27abc84e5397b145cf4ce312887650495

        SHA512

        ee1673cdccbf60f970d4d2ab0e96ebbbcb711aa7e18591f7f8e4b5f8d7fd02a56793265c8e695b85afced56a38ccfbd09ac74240873234d0d0fc9a1a2bcd89a4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wxrFBC74.exe
        Filesize

        391KB

        MD5

        67b82bf644f144304036ab3f65af5d6f

        SHA1

        ee797073d55859d4ba3938e90e87eb377d848472

        SHA256

        e5b449255f2fb084e05e8b12fd9001a27abc84e5397b145cf4ce312887650495

        SHA512

        ee1673cdccbf60f970d4d2ab0e96ebbbcb711aa7e18591f7f8e4b5f8d7fd02a56793265c8e695b85afced56a38ccfbd09ac74240873234d0d0fc9a1a2bcd89a4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3479.exe
        Filesize

        344KB

        MD5

        b8a957aa00f697cde7b3abceac650528

        SHA1

        a36b89276e3bc479d3b471974baaba0fb4f8418d

        SHA256

        df9b2af8904896ccc1afc42503fcaf37e62d3a44fef1384742f6f03caceef488

        SHA512

        429094023cde55b6f1c1e8bcd85f5bd46d137ebaab8744b402c4a78a1e9416dfe33aed7ec916d7d0ec8adb38a7f0e4b4197416509551b962769ef9820cbd14e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3479.exe
        Filesize

        344KB

        MD5

        b8a957aa00f697cde7b3abceac650528

        SHA1

        a36b89276e3bc479d3b471974baaba0fb4f8418d

        SHA256

        df9b2af8904896ccc1afc42503fcaf37e62d3a44fef1384742f6f03caceef488

        SHA512

        429094023cde55b6f1c1e8bcd85f5bd46d137ebaab8744b402c4a78a1e9416dfe33aed7ec916d7d0ec8adb38a7f0e4b4197416509551b962769ef9820cbd14e6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1347HS.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1347HS.exe
        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81Zp00.exe
        Filesize

        334KB

        MD5

        94df951439411108fe9671530a25393b

        SHA1

        623384361b590322029c0b4bdbd449cee0238d16

        SHA256

        c574d0115d7316f6b20baf08b5a6c308d33bd309d283678a3f085608c01521ee

        SHA512

        58e52072def34dc88446cdd9646461d633a0ce82ff08e8baaa38fdcc873d78aaa2f8d97d7d7c51470d024ea037cf160122f51ede023dbec75359e0bee923bef3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81Zp00.exe
        Filesize

        334KB

        MD5

        94df951439411108fe9671530a25393b

        SHA1

        623384361b590322029c0b4bdbd449cee0238d16

        SHA256

        c574d0115d7316f6b20baf08b5a6c308d33bd309d283678a3f085608c01521ee

        SHA512

        58e52072def34dc88446cdd9646461d633a0ce82ff08e8baaa38fdcc873d78aaa2f8d97d7d7c51470d024ea037cf160122f51ede023dbec75359e0bee923bef3

      • memory/3996-1112-0x00000000078A0000-0x0000000007EB8000-memory.dmp
        Filesize

        6.1MB

      • memory/3996-1114-0x0000000008040000-0x0000000008052000-memory.dmp
        Filesize

        72KB

      • memory/3996-1127-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-1126-0x0000000009610000-0x0000000009660000-memory.dmp
        Filesize

        320KB

      • memory/3996-1125-0x0000000009580000-0x00000000095F6000-memory.dmp
        Filesize

        472KB

      • memory/3996-1124-0x0000000008CE0000-0x000000000920C000-memory.dmp
        Filesize

        5.2MB

      • memory/3996-1123-0x0000000008B10000-0x0000000008CD2000-memory.dmp
        Filesize

        1.8MB

      • memory/3996-1122-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-1121-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-1120-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-1119-0x00000000083F0000-0x0000000008456000-memory.dmp
        Filesize

        408KB

      • memory/3996-1118-0x0000000008350000-0x00000000083E2000-memory.dmp
        Filesize

        584KB

      • memory/3996-1116-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-1115-0x0000000008060000-0x000000000809C000-memory.dmp
        Filesize

        240KB

      • memory/3996-1113-0x0000000007F00000-0x000000000800A000-memory.dmp
        Filesize

        1.0MB

      • memory/3996-239-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-237-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-235-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-233-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-231-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-229-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-224-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-227-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-203-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-202-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-205-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-207-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-209-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-211-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-213-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-215-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-217-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-219-0x0000000002CC0000-0x0000000002D0B000-memory.dmp
        Filesize

        300KB

      • memory/3996-223-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-221-0x0000000007110000-0x000000000714E000-memory.dmp
        Filesize

        248KB

      • memory/3996-220-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/3996-225-0x00000000071E0000-0x00000000071F0000-memory.dmp
        Filesize

        64KB

      • memory/4296-1133-0x0000000000BB0000-0x0000000000BE2000-memory.dmp
        Filesize

        200KB

      • memory/4296-1134-0x00000000057B0000-0x00000000057C0000-memory.dmp
        Filesize

        64KB

      • memory/4420-184-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-192-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-180-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-193-0x0000000000400000-0x0000000002B03000-memory.dmp
        Filesize

        39.0MB

      • memory/4420-178-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-190-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-161-0x00000000070F0000-0x0000000007100000-memory.dmp
        Filesize

        64KB

      • memory/4420-176-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-164-0x00000000070F0000-0x0000000007100000-memory.dmp
        Filesize

        64KB

      • memory/4420-186-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-163-0x0000000007100000-0x00000000076A4000-memory.dmp
        Filesize

        5.6MB

      • memory/4420-182-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-194-0x00000000070F0000-0x0000000007100000-memory.dmp
        Filesize

        64KB

      • memory/4420-195-0x00000000070F0000-0x0000000007100000-memory.dmp
        Filesize

        64KB

      • memory/4420-188-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-174-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-172-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-170-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-168-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-166-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-165-0x0000000007080000-0x0000000007092000-memory.dmp
        Filesize

        72KB

      • memory/4420-160-0x0000000004750000-0x000000000477D000-memory.dmp
        Filesize

        180KB

      • memory/4420-162-0x00000000070F0000-0x0000000007100000-memory.dmp
        Filesize

        64KB

      • memory/4420-197-0x0000000000400000-0x0000000002B03000-memory.dmp
        Filesize

        39.0MB

      • memory/4444-154-0x0000000000F30000-0x0000000000F3A000-memory.dmp
        Filesize

        40KB