Analysis

  • max time kernel
    77s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2023, 04:32

General

  • Target

    e4ce808a8a46e1dd2cf51034f869ca53f721ad80fe3b906aec74eb55a36f7828.exe

  • Size

    545KB

  • MD5

    c176c03869b134542fc610d8bb7abe2e

  • SHA1

    e88f88c57e79ed592cde97cbf42d02e9b0be200b

  • SHA256

    e4ce808a8a46e1dd2cf51034f869ca53f721ad80fe3b906aec74eb55a36f7828

  • SHA512

    91e84de2a0feb1eb2ece4b31eadb985e597c79314bde8ede9737662bd7259bce321d31ab4ab93d33811a690edffdd908db5372c124431761e13257fea0348a98

  • SSDEEP

    12288:nMrQy90HUuu4vhicM3IsDInA+VObc+6DFW34Gy8NKZjMa+kyZ:byeUBqiT31J+cbcHFW34G5kZjMaFyZ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

polo

C2

193.233.20.31:4125

Attributes
  • auth_value

    f1a1b1041a864e0f1f788d42ececa8b3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4ce808a8a46e1dd2cf51034f869ca53f721ad80fe3b906aec74eb55a36f7828.exe
    "C:\Users\Admin\AppData\Local\Temp\e4ce808a8a46e1dd2cf51034f869ca53f721ad80fe3b906aec74eb55a36f7828.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0858.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0858.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7620.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7620.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6432.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 2012
          4⤵
          • Program crash
          PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649289.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649289.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4528 -ip 4528
    1⤵
      PID:852

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649289.exe

            Filesize

            175KB

            MD5

            44a26d7004f8b65e1a8bac0ccac86d6a

            SHA1

            30b583c2c04c1167703ae255b4d44b96b411c8ff

            SHA256

            37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

            SHA512

            17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si649289.exe

            Filesize

            175KB

            MD5

            44a26d7004f8b65e1a8bac0ccac86d6a

            SHA1

            30b583c2c04c1167703ae255b4d44b96b411c8ff

            SHA256

            37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

            SHA512

            17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0858.exe

            Filesize

            403KB

            MD5

            112e65a1d7ee2e14584cc06461515dad

            SHA1

            595214c75f7c9a1acde10fec713bd8a3e22e3d1e

            SHA256

            e5f583bd0f57717c5cacae5c4fbcde382ebd0a37933b4132faf71e9d3c3869c8

            SHA512

            26e10385d5fed5ed952ff7e6a84b6a63e801d756f029d16252ad361e59ee6956934f19da3ad15077678e68d95751facf05a669357d69b85477473a0046000f30

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0858.exe

            Filesize

            403KB

            MD5

            112e65a1d7ee2e14584cc06461515dad

            SHA1

            595214c75f7c9a1acde10fec713bd8a3e22e3d1e

            SHA256

            e5f583bd0f57717c5cacae5c4fbcde382ebd0a37933b4132faf71e9d3c3869c8

            SHA512

            26e10385d5fed5ed952ff7e6a84b6a63e801d756f029d16252ad361e59ee6956934f19da3ad15077678e68d95751facf05a669357d69b85477473a0046000f30

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7620.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7620.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6432.exe

            Filesize

            351KB

            MD5

            3aef9f48d02fd22875ab844f3082cf14

            SHA1

            6ff7973f070d12f4aae5a8b95a5ba0fcb09b2480

            SHA256

            3be62508c78f3c3b305537f61711252c69a80a478ed6e55693b8ce375466d941

            SHA512

            a94ed44c7c71884c34251715fa02796cadb80ee18cd5a64709b808f96157de125689a49715f8dab16a936a512be23d56032a00449291262eda99f5837df72fad

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6432.exe

            Filesize

            351KB

            MD5

            3aef9f48d02fd22875ab844f3082cf14

            SHA1

            6ff7973f070d12f4aae5a8b95a5ba0fcb09b2480

            SHA256

            3be62508c78f3c3b305537f61711252c69a80a478ed6e55693b8ce375466d941

            SHA512

            a94ed44c7c71884c34251715fa02796cadb80ee18cd5a64709b808f96157de125689a49715f8dab16a936a512be23d56032a00449291262eda99f5837df72fad

          • memory/2244-1085-0x0000000000520000-0x0000000000552000-memory.dmp

            Filesize

            200KB

          • memory/2244-1086-0x0000000005130000-0x0000000005140000-memory.dmp

            Filesize

            64KB

          • memory/3912-147-0x0000000000860000-0x000000000086A000-memory.dmp

            Filesize

            40KB

          • memory/4528-189-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-211-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-155-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-157-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-159-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-163-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-161-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-165-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-171-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-169-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-173-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-175-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-177-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-167-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-180-0x0000000002380000-0x00000000023CB000-memory.dmp

            Filesize

            300KB

          • memory/4528-179-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-183-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-184-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-185-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-187-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-182-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-153-0x0000000004DE0000-0x0000000005384000-memory.dmp

            Filesize

            5.6MB

          • memory/4528-197-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-199-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-201-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-195-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-205-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-154-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-213-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-215-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-221-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-219-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-217-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-209-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-207-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-203-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-193-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-191-0x00000000029A0000-0x00000000029DE000-memory.dmp

            Filesize

            248KB

          • memory/4528-1064-0x0000000005390000-0x00000000059A8000-memory.dmp

            Filesize

            6.1MB

          • memory/4528-1065-0x00000000059C0000-0x0000000005ACA000-memory.dmp

            Filesize

            1.0MB

          • memory/4528-1066-0x0000000005B00000-0x0000000005B12000-memory.dmp

            Filesize

            72KB

          • memory/4528-1067-0x0000000005B20000-0x0000000005B5C000-memory.dmp

            Filesize

            240KB

          • memory/4528-1068-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-1070-0x0000000005E10000-0x0000000005EA2000-memory.dmp

            Filesize

            584KB

          • memory/4528-1071-0x0000000005EB0000-0x0000000005F16000-memory.dmp

            Filesize

            408KB

          • memory/4528-1072-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-1073-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-1074-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB

          • memory/4528-1075-0x00000000066E0000-0x00000000068A2000-memory.dmp

            Filesize

            1.8MB

          • memory/4528-1076-0x00000000068B0000-0x0000000006DDC000-memory.dmp

            Filesize

            5.2MB

          • memory/4528-1077-0x0000000007060000-0x00000000070D6000-memory.dmp

            Filesize

            472KB

          • memory/4528-1078-0x00000000070F0000-0x0000000007140000-memory.dmp

            Filesize

            320KB

          • memory/4528-1080-0x0000000002840000-0x0000000002850000-memory.dmp

            Filesize

            64KB