Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2023, 07:34

General

  • Target

    316b39eef30c79f382bec8cf8ae02a601a4a88219e75207f997262c14a43f812.exe

  • Size

    777KB

  • MD5

    16d71e4e2347b26554395b4a0d480a36

  • SHA1

    f51944008193812c6f066088f47065e64a59fb1d

  • SHA256

    316b39eef30c79f382bec8cf8ae02a601a4a88219e75207f997262c14a43f812

  • SHA512

    994c264d4038aee53d4b26d6eae82532dff94ee2e6a894a75774683538b396f9d3d08263acd756be26a0099fc52e7f6760743328a0bc4dad9706ef528313ddf9

  • SSDEEP

    24576:sym9aKDIfKpkfpox//1/jRjIfNwf7jkv:bm95sfQkhoNkm

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

ruka

C2

193.233.20.28:4125

Attributes
  • auth_value

    5d1d0e51ebe1e3f16cca573ff651c43c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\316b39eef30c79f382bec8cf8ae02a601a4a88219e75207f997262c14a43f812.exe
    "C:\Users\Admin\AppData\Local\Temp\316b39eef30c79f382bec8cf8ae02a601a4a88219e75207f997262c14a43f812.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5556.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5556.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1578.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6143uN.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6143uN.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h65px56.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h65px56.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4308
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 1064
            5⤵
            • Program crash
            PID:4404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iKqOZ49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iKqOZ49.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 1540
          4⤵
          • Program crash
          PID:4888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l82Ze42.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l82Ze42.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4308 -ip 4308
    1⤵
      PID:2652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4468 -ip 4468
      1⤵
        PID:2176

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l82Ze42.exe

              Filesize

              175KB

              MD5

              6c4c2a56d5dd785adbe4fe60fa3cc1f2

              SHA1

              f8bd4379310258f8e54c47b56f5eec7394adb9a2

              SHA256

              b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

              SHA512

              f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l82Ze42.exe

              Filesize

              175KB

              MD5

              6c4c2a56d5dd785adbe4fe60fa3cc1f2

              SHA1

              f8bd4379310258f8e54c47b56f5eec7394adb9a2

              SHA256

              b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

              SHA512

              f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5556.exe

              Filesize

              634KB

              MD5

              6df991de47d0faf172a5a11936a58fcf

              SHA1

              9e52961ba58fcf8b4505375a505784acbf4a9bf6

              SHA256

              78291b33476a48f9668b4a18cdc5949c61260b46b6291814a9218ac1e6a5ec0b

              SHA512

              e113bc7c5f9bbf9ad3279b947f7b2b47d99782a57f8db3f4c92a697294becf83a432521c69785cd6cfc91b9937f99e9de92f2769028509ba101b3d9082a4eca0

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5556.exe

              Filesize

              634KB

              MD5

              6df991de47d0faf172a5a11936a58fcf

              SHA1

              9e52961ba58fcf8b4505375a505784acbf4a9bf6

              SHA256

              78291b33476a48f9668b4a18cdc5949c61260b46b6291814a9218ac1e6a5ec0b

              SHA512

              e113bc7c5f9bbf9ad3279b947f7b2b47d99782a57f8db3f4c92a697294becf83a432521c69785cd6cfc91b9937f99e9de92f2769028509ba101b3d9082a4eca0

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iKqOZ49.exe

              Filesize

              287KB

              MD5

              5e5cb4de688be9c1942fd753ee51cec7

              SHA1

              9f7a64abf1afefc0fced7ba0980e1c47957ade7d

              SHA256

              9cb099dd219ea636a63ac9acdd8ccfe93f37634e8b4c56e3b5828e2411f2ce39

              SHA512

              1820eba876a3c6cd9bd8217e3038f5b753614bcecb465af91d3d8d011d53a74dce994b1a4faa27afa13189285868e0ab089cde386531a35de3dd2cd035ee41e0

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iKqOZ49.exe

              Filesize

              287KB

              MD5

              5e5cb4de688be9c1942fd753ee51cec7

              SHA1

              9f7a64abf1afefc0fced7ba0980e1c47957ade7d

              SHA256

              9cb099dd219ea636a63ac9acdd8ccfe93f37634e8b4c56e3b5828e2411f2ce39

              SHA512

              1820eba876a3c6cd9bd8217e3038f5b753614bcecb465af91d3d8d011d53a74dce994b1a4faa27afa13189285868e0ab089cde386531a35de3dd2cd035ee41e0

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1578.exe

              Filesize

              314KB

              MD5

              03fec943b9290ccaadb111e3cf08ec6c

              SHA1

              454f74088f30a3f03fa0b7fe98bfdea60b5be1a7

              SHA256

              96c378de4699cd77a90ae5961c396befe3de8dc1c8500f28764a94426e3d23a5

              SHA512

              f73b198dbe70e5062c782b6bf543eb24ad65bf50b9335f77e1c6b608413237fe151cd56ef10b6b0afb3cc4506c9bc83da373426ae71725db83fb498ee92894ee

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1578.exe

              Filesize

              314KB

              MD5

              03fec943b9290ccaadb111e3cf08ec6c

              SHA1

              454f74088f30a3f03fa0b7fe98bfdea60b5be1a7

              SHA256

              96c378de4699cd77a90ae5961c396befe3de8dc1c8500f28764a94426e3d23a5

              SHA512

              f73b198dbe70e5062c782b6bf543eb24ad65bf50b9335f77e1c6b608413237fe151cd56ef10b6b0afb3cc4506c9bc83da373426ae71725db83fb498ee92894ee

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6143uN.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6143uN.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h65px56.exe

              Filesize

              229KB

              MD5

              f61a8bb148dc5f6a48d3766a81860966

              SHA1

              785783e2181698c3301c09e4921c2e01f2c0d51c

              SHA256

              be3c10d874383f388df3c980eaf654a1cd5d5a55f49fe0c41f688d9889f12fd2

              SHA512

              0cc062ae59a90dd3a2d2ceaeafe60e9519bff265698f1ee3fdec81c92ee1b98ee064d1d45b5a2c729ef3a9d6d753bd9dba4bfaa0c88878e5ca0a40d6c0ddf597

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h65px56.exe

              Filesize

              229KB

              MD5

              f61a8bb148dc5f6a48d3766a81860966

              SHA1

              785783e2181698c3301c09e4921c2e01f2c0d51c

              SHA256

              be3c10d874383f388df3c980eaf654a1cd5d5a55f49fe0c41f688d9889f12fd2

              SHA512

              0cc062ae59a90dd3a2d2ceaeafe60e9519bff265698f1ee3fdec81c92ee1b98ee064d1d45b5a2c729ef3a9d6d753bd9dba4bfaa0c88878e5ca0a40d6c0ddf597

            • memory/3200-154-0x0000000000E50000-0x0000000000E5A000-memory.dmp

              Filesize

              40KB

            • memory/4100-1133-0x0000000005020000-0x0000000005030000-memory.dmp

              Filesize

              64KB

            • memory/4100-1132-0x00000000003C0000-0x00000000003F2000-memory.dmp

              Filesize

              200KB

            • memory/4308-196-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/4308-164-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/4308-161-0x00000000006A0000-0x00000000006CD000-memory.dmp

              Filesize

              180KB

            • memory/4308-165-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-166-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-168-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-170-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-172-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-174-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-176-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-178-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-180-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-182-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-184-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-186-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-188-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-190-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-192-0x0000000002520000-0x0000000002532000-memory.dmp

              Filesize

              72KB

            • memory/4308-193-0x0000000000400000-0x00000000004BA000-memory.dmp

              Filesize

              744KB

            • memory/4308-194-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/4308-195-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/4308-163-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/4308-198-0x0000000000400000-0x00000000004BA000-memory.dmp

              Filesize

              744KB

            • memory/4308-160-0x0000000004C90000-0x0000000005234000-memory.dmp

              Filesize

              5.6MB

            • memory/4308-162-0x0000000004C80000-0x0000000004C90000-memory.dmp

              Filesize

              64KB

            • memory/4468-214-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-296-0x00000000005C0000-0x000000000060B000-memory.dmp

              Filesize

              300KB

            • memory/4468-210-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-212-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-206-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-216-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-218-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-220-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-222-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-224-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-226-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-228-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-230-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-232-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-234-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-236-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-298-0x0000000002390000-0x00000000023A0000-memory.dmp

              Filesize

              64KB

            • memory/4468-208-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-300-0x0000000002390000-0x00000000023A0000-memory.dmp

              Filesize

              64KB

            • memory/4468-1112-0x00000000050E0000-0x00000000056F8000-memory.dmp

              Filesize

              6.1MB

            • memory/4468-1113-0x0000000005770000-0x000000000587A000-memory.dmp

              Filesize

              1.0MB

            • memory/4468-1114-0x00000000058B0000-0x00000000058C2000-memory.dmp

              Filesize

              72KB

            • memory/4468-1115-0x00000000058D0000-0x000000000590C000-memory.dmp

              Filesize

              240KB

            • memory/4468-1116-0x0000000002390000-0x00000000023A0000-memory.dmp

              Filesize

              64KB

            • memory/4468-1118-0x0000000005BC0000-0x0000000005C52000-memory.dmp

              Filesize

              584KB

            • memory/4468-1119-0x0000000005C60000-0x0000000005CC6000-memory.dmp

              Filesize

              408KB

            • memory/4468-1121-0x0000000002390000-0x00000000023A0000-memory.dmp

              Filesize

              64KB

            • memory/4468-1120-0x0000000002390000-0x00000000023A0000-memory.dmp

              Filesize

              64KB

            • memory/4468-1122-0x0000000006380000-0x0000000006542000-memory.dmp

              Filesize

              1.8MB

            • memory/4468-1123-0x0000000006560000-0x0000000006A8C000-memory.dmp

              Filesize

              5.2MB

            • memory/4468-1124-0x0000000002390000-0x00000000023A0000-memory.dmp

              Filesize

              64KB

            • memory/4468-204-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-203-0x0000000002560000-0x000000000259E000-memory.dmp

              Filesize

              248KB

            • memory/4468-1125-0x0000000006E30000-0x0000000006EA6000-memory.dmp

              Filesize

              472KB

            • memory/4468-1126-0x0000000006EB0000-0x0000000006F00000-memory.dmp

              Filesize

              320KB