Analysis

  • max time kernel
    78s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 08:01

General

  • Target

    022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87.exe

  • Size

    540KB

  • MD5

    fc5206850416fb4f95d3e56274e49580

  • SHA1

    748dc1134bd55b146abdf090e4bb0b436473aa45

  • SHA256

    022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87

  • SHA512

    98bdac9d51db2268b2f81eba5634146e8780ae2303dbf2a8c2a246dac247e3c5ae4bbf56b535fff960389ac2fe09e7bec3623b7bea18178f49732d507e45c102

  • SSDEEP

    12288:zMriy90aB9boZJYGSsP9LAhNngM1IcRTd7BDW+W9h:xy/waoLAhbIcRTd7wB

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87.exe
    "C:\Users\Admin\AppData\Local\Temp\022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0107.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0107.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8637.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8637.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5205.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5205.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 1348
          4⤵
          • Program crash
          PID:3896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863040.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863040.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2852
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4856 -ip 4856
    1⤵
      PID:2896

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863040.exe

      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863040.exe

      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0107.exe

      Filesize

      397KB

      MD5

      dd6512a774150cc9b4d781992763210a

      SHA1

      fed9159aa988b4063ff7018b01764d05b7543e8f

      SHA256

      56fa5d1a3dbfde7c399e11df4707e3fb7d58c530dbb5ed84128b56df9c497d5d

      SHA512

      f2d098748b50a5eea8e7a2587e42c9c6f0880653f96532bfff0e82c1c47ba6de069e84fc7d950d90a8ffb631591e36d2b9716e4592aa14812995703c3830ce30

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0107.exe

      Filesize

      397KB

      MD5

      dd6512a774150cc9b4d781992763210a

      SHA1

      fed9159aa988b4063ff7018b01764d05b7543e8f

      SHA256

      56fa5d1a3dbfde7c399e11df4707e3fb7d58c530dbb5ed84128b56df9c497d5d

      SHA512

      f2d098748b50a5eea8e7a2587e42c9c6f0880653f96532bfff0e82c1c47ba6de069e84fc7d950d90a8ffb631591e36d2b9716e4592aa14812995703c3830ce30

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8637.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8637.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5205.exe

      Filesize

      355KB

      MD5

      6fa7dc1a786266ba130becc1ec1bbd32

      SHA1

      7ba3025c8c5b8e89ec0e55df14f5d50c0859c551

      SHA256

      ab75623fae1e2577bd37f73dc5da1f76b1660fde19313e88502c92ba7a575846

      SHA512

      74b3affea69ff4e3b76b838726c9e56fd02c56ff1f46ef4809b097491d1be16fb34570c0e31732ef24bf3b84d0b70ee5fa5c56b0bf0807e004783c4e7194e7f1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5205.exe

      Filesize

      355KB

      MD5

      6fa7dc1a786266ba130becc1ec1bbd32

      SHA1

      7ba3025c8c5b8e89ec0e55df14f5d50c0859c551

      SHA256

      ab75623fae1e2577bd37f73dc5da1f76b1660fde19313e88502c92ba7a575846

      SHA512

      74b3affea69ff4e3b76b838726c9e56fd02c56ff1f46ef4809b097491d1be16fb34570c0e31732ef24bf3b84d0b70ee5fa5c56b0bf0807e004783c4e7194e7f1

    • memory/2852-1085-0x0000000000550000-0x0000000000582000-memory.dmp

      Filesize

      200KB

    • memory/2852-1086-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/3576-147-0x0000000000AD0000-0x0000000000ADA000-memory.dmp

      Filesize

      40KB

    • memory/4856-189-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-201-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-155-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-156-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-157-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-158-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-161-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-159-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-163-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-165-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-167-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-169-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-171-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-173-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-175-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-177-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-179-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-181-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-183-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-185-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-187-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-153-0x00000000072D0000-0x0000000007874000-memory.dmp

      Filesize

      5.6MB

    • memory/4856-191-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-193-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-195-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-197-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-199-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-154-0x0000000002B90000-0x0000000002BDB000-memory.dmp

      Filesize

      300KB

    • memory/4856-203-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-205-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-207-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-209-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-211-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-213-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-217-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-219-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-215-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-221-0x0000000007880000-0x00000000078BE000-memory.dmp

      Filesize

      248KB

    • memory/4856-1064-0x00000000078D0000-0x0000000007EE8000-memory.dmp

      Filesize

      6.1MB

    • memory/4856-1065-0x0000000007F70000-0x000000000807A000-memory.dmp

      Filesize

      1.0MB

    • memory/4856-1066-0x00000000080B0000-0x00000000080C2000-memory.dmp

      Filesize

      72KB

    • memory/4856-1067-0x00000000080D0000-0x000000000810C000-memory.dmp

      Filesize

      240KB

    • memory/4856-1068-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-1070-0x00000000083C0000-0x0000000008452000-memory.dmp

      Filesize

      584KB

    • memory/4856-1071-0x0000000008460000-0x00000000084C6000-memory.dmp

      Filesize

      408KB

    • memory/4856-1072-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-1073-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-1074-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB

    • memory/4856-1075-0x0000000008B90000-0x0000000008D52000-memory.dmp

      Filesize

      1.8MB

    • memory/4856-1076-0x0000000008D60000-0x000000000928C000-memory.dmp

      Filesize

      5.2MB

    • memory/4856-1077-0x00000000095F0000-0x0000000009666000-memory.dmp

      Filesize

      472KB

    • memory/4856-1078-0x0000000009680000-0x00000000096D0000-memory.dmp

      Filesize

      320KB

    • memory/4856-1079-0x0000000004D40000-0x0000000004D50000-memory.dmp

      Filesize

      64KB