Analysis

  • max time kernel
    78s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 22:37

General

  • Target

    cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b.exe

  • Size

    544KB

  • MD5

    74c58daee59afab7a32c09cccae41a61

  • SHA1

    fda222612fbdeb313f27d365f61395b5a703688b

  • SHA256

    cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b

  • SHA512

    e351d21a68b76e98cb1c1e27e1c7da748c6c985006c5ea25ec1cb9ea9b9a48a2c1b527b098912d966c7e3dffee70f363aad53e2d119a08e5f741d63326351a67

  • SSDEEP

    12288:0Mrwy90KmDJ/B7Ii21sQCy8FvRRbyqgULMLGwQth+XPlfM50xNG6SP:0yADlBc11PcvRRbWmMSneXPLGLP

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b.exe
    "C:\Users\Admin\AppData\Local\Temp\cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5832.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5832.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1506.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2934.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2934.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 1352
          4⤵
          • Program crash
          PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561944.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561944.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2500 -ip 2500
    1⤵
      PID:5012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561944.exe

      Filesize

      175KB

      MD5

      41707338e1e2d868aa699ac0dd2e77b0

      SHA1

      36e0dfba09f9fb409faf0f9a99217d0d0c524b82

      SHA256

      8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

      SHA512

      80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561944.exe

      Filesize

      175KB

      MD5

      41707338e1e2d868aa699ac0dd2e77b0

      SHA1

      36e0dfba09f9fb409faf0f9a99217d0d0c524b82

      SHA256

      8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

      SHA512

      80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5832.exe

      Filesize

      402KB

      MD5

      04b6b35b58d3166f33ab73bfc91bf226

      SHA1

      9483b4fb5475c8b43fa8957acf53f1ad25d2e295

      SHA256

      6b53c6837681275be0c3b20dd6c43d75bf92520233357ff78536fd57236bc7ae

      SHA512

      314952856f67ef65b3963c8d32fbe7b8da3ba9a982d202cbbf9057bd4f70e4fa5893685517becf98258ab75f4fa4dea886b0b881454176e77888f460aae6939b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5832.exe

      Filesize

      402KB

      MD5

      04b6b35b58d3166f33ab73bfc91bf226

      SHA1

      9483b4fb5475c8b43fa8957acf53f1ad25d2e295

      SHA256

      6b53c6837681275be0c3b20dd6c43d75bf92520233357ff78536fd57236bc7ae

      SHA512

      314952856f67ef65b3963c8d32fbe7b8da3ba9a982d202cbbf9057bd4f70e4fa5893685517becf98258ab75f4fa4dea886b0b881454176e77888f460aae6939b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1506.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1506.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2934.exe

      Filesize

      349KB

      MD5

      1980b89c9169b355cc8b117f22448f0f

      SHA1

      99c56e024035ed0f858e62d8fd727a67b8fa00f1

      SHA256

      c7ede14362bb6bedd1af38fcc22869e3202ea28dcfa56fbf077b2eaba5b2bb5f

      SHA512

      33cd36d5fa9c9fbc3d14399d1819116e21e0b204f948d266f2fc88418722b4f489ce03917014f990067827bcb3aaf79105e54f5a627b41aa94b2c6d893006a1f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2934.exe

      Filesize

      349KB

      MD5

      1980b89c9169b355cc8b117f22448f0f

      SHA1

      99c56e024035ed0f858e62d8fd727a67b8fa00f1

      SHA256

      c7ede14362bb6bedd1af38fcc22869e3202ea28dcfa56fbf077b2eaba5b2bb5f

      SHA512

      33cd36d5fa9c9fbc3d14399d1819116e21e0b204f948d266f2fc88418722b4f489ce03917014f990067827bcb3aaf79105e54f5a627b41aa94b2c6d893006a1f

    • memory/540-1084-0x0000000000450000-0x0000000000482000-memory.dmp

      Filesize

      200KB

    • memory/540-1085-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/2500-188-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-202-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-155-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-156-0x0000000004F50000-0x00000000054F4000-memory.dmp

      Filesize

      5.6MB

    • memory/2500-157-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-158-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-160-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-162-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-164-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-166-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-168-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-170-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-172-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-174-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-176-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-178-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-180-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-182-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-184-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-186-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-153-0x0000000000980000-0x00000000009CB000-memory.dmp

      Filesize

      300KB

    • memory/2500-190-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-192-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-194-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-196-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-198-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-200-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-154-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-204-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-206-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-208-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-210-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-212-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-214-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-216-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-220-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-218-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2500-1063-0x0000000005500000-0x0000000005B18000-memory.dmp

      Filesize

      6.1MB

    • memory/2500-1064-0x0000000005B20000-0x0000000005C2A000-memory.dmp

      Filesize

      1.0MB

    • memory/2500-1065-0x0000000005C40000-0x0000000005C52000-memory.dmp

      Filesize

      72KB

    • memory/2500-1066-0x0000000005C60000-0x0000000005C9C000-memory.dmp

      Filesize

      240KB

    • memory/2500-1067-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-1068-0x0000000005F50000-0x0000000005FE2000-memory.dmp

      Filesize

      584KB

    • memory/2500-1070-0x0000000005FF0000-0x0000000006056000-memory.dmp

      Filesize

      408KB

    • memory/2500-1072-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-1071-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-1073-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-1074-0x0000000006810000-0x0000000006886000-memory.dmp

      Filesize

      472KB

    • memory/2500-1075-0x0000000006890000-0x00000000068E0000-memory.dmp

      Filesize

      320KB

    • memory/2500-1076-0x0000000004F40000-0x0000000004F50000-memory.dmp

      Filesize

      64KB

    • memory/2500-1077-0x0000000007D30000-0x0000000007EF2000-memory.dmp

      Filesize

      1.8MB

    • memory/2500-1078-0x0000000008100000-0x000000000862C000-memory.dmp

      Filesize

      5.2MB

    • memory/3228-147-0x0000000000190000-0x000000000019A000-memory.dmp

      Filesize

      40KB