Analysis

  • max time kernel
    110s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2023, 05:23

General

  • Target

    2988e8ef36d1fc52f78690d0531fe4ba5303172998c26fb546e9fec142c69d1e.exe

  • Size

    544KB

  • MD5

    6ee1af3af0d54a07198caa841d49f434

  • SHA1

    54ed85c13f1f28d2a170cdd55a2563c7f8da44a1

  • SHA256

    2988e8ef36d1fc52f78690d0531fe4ba5303172998c26fb546e9fec142c69d1e

  • SHA512

    9499bd721083c41738becbdb3ded5e268db2b00741ada74352788d29b809e4439817223ce3eedc91dd2df55b48ebe0267e6ffd10af4cc3ebe79e274e91877534

  • SSDEEP

    12288:FMr2y905H7a3dq6+apVObl5W5FWECjr7xqQuIUde:Xyy7a3dq6LpcblUFWECjfxLDce

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

polo

C2

193.233.20.31:4125

Attributes
  • auth_value

    f1a1b1041a864e0f1f788d42ececa8b3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2988e8ef36d1fc52f78690d0531fe4ba5303172998c26fb546e9fec142c69d1e.exe
    "C:\Users\Admin\AppData\Local\Temp\2988e8ef36d1fc52f78690d0531fe4ba5303172998c26fb546e9fec142c69d1e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8846.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8846.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6623.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6623.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3108.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3108.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 2012
          4⤵
          • Program crash
          PID:4140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127570.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1812 -ip 1812
    1⤵
      PID:1844

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127570.exe

      Filesize

      175KB

      MD5

      44a26d7004f8b65e1a8bac0ccac86d6a

      SHA1

      30b583c2c04c1167703ae255b4d44b96b411c8ff

      SHA256

      37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

      SHA512

      17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127570.exe

      Filesize

      175KB

      MD5

      44a26d7004f8b65e1a8bac0ccac86d6a

      SHA1

      30b583c2c04c1167703ae255b4d44b96b411c8ff

      SHA256

      37384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9

      SHA512

      17788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8846.exe

      Filesize

      403KB

      MD5

      b79ea70b78acf3c694af898ed630c854

      SHA1

      c1930acf2ad0615b478313c4cfbc1784dd93701b

      SHA256

      d110438a93001d9c0db7f9f7db992ea61873621bf48cc64ad764fa9b39bb4028

      SHA512

      7ec3870cedb05fe06fbdbdf1b7841b79147221fe517954e6b1a6ee87226ec4833cb8e5458c2492d34273791caaa28576dcfc10629a7110bb77dc0914c67d3eba

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8846.exe

      Filesize

      403KB

      MD5

      b79ea70b78acf3c694af898ed630c854

      SHA1

      c1930acf2ad0615b478313c4cfbc1784dd93701b

      SHA256

      d110438a93001d9c0db7f9f7db992ea61873621bf48cc64ad764fa9b39bb4028

      SHA512

      7ec3870cedb05fe06fbdbdf1b7841b79147221fe517954e6b1a6ee87226ec4833cb8e5458c2492d34273791caaa28576dcfc10629a7110bb77dc0914c67d3eba

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6623.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6623.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3108.exe

      Filesize

      351KB

      MD5

      88679ffa1e9bbdfd2287322936c34422

      SHA1

      8f803d64b98b3007b674ed2d967b0925f8c36679

      SHA256

      ec70262d8dd7bcff9938c8a6e5200479354bf1afa26923feef6ce4e0688ee36a

      SHA512

      1a060b56e91c1d2a46bb55ea52b34f561ed40c52d9dfc36c4549a9dbe7eb015d58f7b2fc4aec24de6a25309ff34749b1662e898d07c5f8a5e560c0d1849b71da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3108.exe

      Filesize

      351KB

      MD5

      88679ffa1e9bbdfd2287322936c34422

      SHA1

      8f803d64b98b3007b674ed2d967b0925f8c36679

      SHA256

      ec70262d8dd7bcff9938c8a6e5200479354bf1afa26923feef6ce4e0688ee36a

      SHA512

      1a060b56e91c1d2a46bb55ea52b34f561ed40c52d9dfc36c4549a9dbe7eb015d58f7b2fc4aec24de6a25309ff34749b1662e898d07c5f8a5e560c0d1849b71da

    • memory/920-1084-0x00000000006C0000-0x00000000006F2000-memory.dmp

      Filesize

      200KB

    • memory/920-1085-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/1812-187-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-201-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-155-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/1812-156-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/1812-157-0x0000000004DD0000-0x0000000005374000-memory.dmp

      Filesize

      5.6MB

    • memory/1812-158-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-159-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-161-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-163-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-165-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-167-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-169-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-171-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-173-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-175-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-177-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-179-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-181-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-183-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-185-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-153-0x00000000008B0000-0x00000000008FB000-memory.dmp

      Filesize

      300KB

    • memory/1812-189-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-191-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-193-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-195-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-197-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-199-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-154-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/1812-203-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-205-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-207-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-209-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-211-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-213-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-215-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-217-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-219-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-221-0x00000000029A0000-0x00000000029DE000-memory.dmp

      Filesize

      248KB

    • memory/1812-1064-0x0000000005380000-0x0000000005998000-memory.dmp

      Filesize

      6.1MB

    • memory/1812-1065-0x00000000059C0000-0x0000000005ACA000-memory.dmp

      Filesize

      1.0MB

    • memory/1812-1066-0x0000000005B00000-0x0000000005B12000-memory.dmp

      Filesize

      72KB

    • memory/1812-1067-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/1812-1068-0x0000000005B20000-0x0000000005B5C000-memory.dmp

      Filesize

      240KB

    • memory/1812-1069-0x0000000005E10000-0x0000000005E76000-memory.dmp

      Filesize

      408KB

    • memory/1812-1070-0x00000000064D0000-0x0000000006562000-memory.dmp

      Filesize

      584KB

    • memory/1812-1072-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/1812-1073-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/1812-1074-0x0000000006950000-0x00000000069C6000-memory.dmp

      Filesize

      472KB

    • memory/1812-1075-0x00000000069F0000-0x0000000006A40000-memory.dmp

      Filesize

      320KB

    • memory/1812-1076-0x0000000006A50000-0x0000000006C12000-memory.dmp

      Filesize

      1.8MB

    • memory/1812-1077-0x0000000006C20000-0x000000000714C000-memory.dmp

      Filesize

      5.2MB

    • memory/1812-1078-0x00000000026B0000-0x00000000026C0000-memory.dmp

      Filesize

      64KB

    • memory/3684-147-0x0000000000DF0000-0x0000000000DFA000-memory.dmp

      Filesize

      40KB