Analysis

  • max time kernel
    78s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 06:18

General

  • Target

    6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe

  • Size

    355KB

  • MD5

    b58af9de377e3b9574b12362042cd11e

  • SHA1

    25d0cda18fdc0c59cf91fd16d4a82f06074d6ddf

  • SHA256

    6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d

  • SHA512

    b05b80434abbb62309e763b2cf04bb44d01dfc0a97c92252828249826b2393ed1a5fe018452fa1bac427e5d2ed9b76dc29c702a1a1407345a789b923f5596ff7

  • SSDEEP

    6144:Am0wvqT7N31Yb/28PKBAP6dqy190qHXq+np1DAewpzi:Am0WqT7N3ibvKBAP6dqy190qZp1APzi

Malware Config

Extracted

Family

redline

Botnet

dozk

C2

91.215.85.15:25916

Attributes
  • auth_value

    9f1dc4ff242fb8b53742acae0ef96143

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe
    "C:\Users\Admin\AppData\Local\Temp\6637282f76ca36191844ec7a7877f3ec264fb9f047b048158cea47692e5dc17d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 1580
      2⤵
      • Program crash
      PID:2292
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4988 -ip 4988
    1⤵
      PID:3008

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4988-134-0x00000000074A0000-0x0000000007A44000-memory.dmp
      Filesize

      5.6MB

    • memory/4988-135-0x00000000048C0000-0x0000000004922000-memory.dmp
      Filesize

      392KB

    • memory/4988-137-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/4988-136-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/4988-138-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-139-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-143-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-141-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-145-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-147-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-149-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-151-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-153-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-155-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-157-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-159-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-161-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-163-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-165-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-167-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-169-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-171-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-173-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-175-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-177-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-179-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-181-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-183-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-185-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-187-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-189-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-191-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-193-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-195-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-197-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-199-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-201-0x0000000004F80000-0x0000000004FD2000-memory.dmp
      Filesize

      328KB

    • memory/4988-928-0x0000000007A50000-0x0000000008068000-memory.dmp
      Filesize

      6.1MB

    • memory/4988-929-0x00000000073D0000-0x00000000073E2000-memory.dmp
      Filesize

      72KB

    • memory/4988-930-0x0000000008070000-0x000000000817A000-memory.dmp
      Filesize

      1.0MB

    • memory/4988-931-0x00000000073F0000-0x000000000742C000-memory.dmp
      Filesize

      240KB

    • memory/4988-932-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/4988-933-0x00000000083F0000-0x0000000008456000-memory.dmp
      Filesize

      408KB

    • memory/4988-934-0x0000000008AC0000-0x0000000008B52000-memory.dmp
      Filesize

      584KB

    • memory/4988-935-0x0000000008B70000-0x0000000008BE6000-memory.dmp
      Filesize

      472KB

    • memory/4988-936-0x0000000008C50000-0x0000000008E12000-memory.dmp
      Filesize

      1.8MB

    • memory/4988-937-0x0000000008E30000-0x000000000935C000-memory.dmp
      Filesize

      5.2MB

    • memory/4988-938-0x0000000009470000-0x000000000948E000-memory.dmp
      Filesize

      120KB

    • memory/4988-940-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/4988-941-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB