Analysis

  • max time kernel
    77s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 10:12

General

  • Target

    c4e24c81be66682868cbfecfe0f69c395f5798ebf259564f7c0f3519623abf1e.exe

  • Size

    539KB

  • MD5

    2538e7f116b0db4b7c9559c3fae07f03

  • SHA1

    e659b55aa5266bbbbdb288bd3500933a9c9f8281

  • SHA256

    c4e24c81be66682868cbfecfe0f69c395f5798ebf259564f7c0f3519623abf1e

  • SHA512

    8f9c70de11b534f1adbd63e751db2b0512404bef7c74b922ad0977b233153c4a9797be86ac717e8664d9767dab1ad196b6f120a1d95e66a8a340526562ef1f88

  • SSDEEP

    12288:BMr0y90YBtBvAT8DZJ8Ogz0/6Yxx5I4+Fs1tXWQW7n/Pf:NyPHle1Ogz66YzQK1tmQgH

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4e24c81be66682868cbfecfe0f69c395f5798ebf259564f7c0f3519623abf1e.exe
    "C:\Users\Admin\AppData\Local\Temp\c4e24c81be66682868cbfecfe0f69c395f5798ebf259564f7c0f3519623abf1e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2088.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2088.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4206.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4206.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7941.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7941.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1340
          4⤵
          • Program crash
          PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744479.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744479.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2536 -ip 2536
    1⤵
      PID:2960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744479.exe

      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744479.exe

      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2088.exe

      Filesize

      397KB

      MD5

      544adbb180aa0452fa1f74b14a7c885b

      SHA1

      d0ee8b5de2dfb6f62b8355115174dc810d08a628

      SHA256

      e216eb2f4e503c26c4c2eb40f7284702eaa9bd7764e7436f4b5471f489f3f3b5

      SHA512

      fc0eec0e9bc40091004bb591281bcaf3f28cdd91eca87676fc33fa3d3fe77cde4813e9a174d1ad3cb6f14a3bd117103609d56ab0bd7969a13604ff7b7388a0b1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2088.exe

      Filesize

      397KB

      MD5

      544adbb180aa0452fa1f74b14a7c885b

      SHA1

      d0ee8b5de2dfb6f62b8355115174dc810d08a628

      SHA256

      e216eb2f4e503c26c4c2eb40f7284702eaa9bd7764e7436f4b5471f489f3f3b5

      SHA512

      fc0eec0e9bc40091004bb591281bcaf3f28cdd91eca87676fc33fa3d3fe77cde4813e9a174d1ad3cb6f14a3bd117103609d56ab0bd7969a13604ff7b7388a0b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4206.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4206.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7941.exe

      Filesize

      355KB

      MD5

      facc0dda7a84449ec40fe292a2656a92

      SHA1

      236af9d2fe1f719fa25dab14c906dd7101df28e1

      SHA256

      36b19f79e71db64c3448609a35429d1697719b85f0baf89a6075d34ef47364b3

      SHA512

      06b7e9c73138953add5b14e7d9bd4cf6b5259a813e72c0f733595d51d75cefc98189450d638ec643f706321ec80c7e641c852f560be9aea50f538d182430f144

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7941.exe

      Filesize

      355KB

      MD5

      facc0dda7a84449ec40fe292a2656a92

      SHA1

      236af9d2fe1f719fa25dab14c906dd7101df28e1

      SHA256

      36b19f79e71db64c3448609a35429d1697719b85f0baf89a6075d34ef47364b3

      SHA512

      06b7e9c73138953add5b14e7d9bd4cf6b5259a813e72c0f733595d51d75cefc98189450d638ec643f706321ec80c7e641c852f560be9aea50f538d182430f144

    • memory/1088-147-0x00000000004C0000-0x00000000004CA000-memory.dmp

      Filesize

      40KB

    • memory/2536-153-0x0000000002C60000-0x0000000002CAB000-memory.dmp

      Filesize

      300KB

    • memory/2536-154-0x0000000007350000-0x00000000078F4000-memory.dmp

      Filesize

      5.6MB

    • memory/2536-155-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-156-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-158-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-160-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-162-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-164-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-166-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-168-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-170-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-172-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-174-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-176-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-178-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-180-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-182-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-184-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-186-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-188-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-190-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-189-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-192-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-193-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-195-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-197-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-199-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-201-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-203-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-205-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-207-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-209-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-211-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-213-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-215-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-217-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-219-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-221-0x0000000004E90000-0x0000000004ECE000-memory.dmp

      Filesize

      248KB

    • memory/2536-1064-0x0000000007900000-0x0000000007F18000-memory.dmp

      Filesize

      6.1MB

    • memory/2536-1065-0x0000000007F70000-0x000000000807A000-memory.dmp

      Filesize

      1.0MB

    • memory/2536-1066-0x00000000080B0000-0x00000000080C2000-memory.dmp

      Filesize

      72KB

    • memory/2536-1067-0x00000000080D0000-0x000000000810C000-memory.dmp

      Filesize

      240KB

    • memory/2536-1068-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-1070-0x00000000083C0000-0x0000000008426000-memory.dmp

      Filesize

      408KB

    • memory/2536-1071-0x0000000008A70000-0x0000000008B02000-memory.dmp

      Filesize

      584KB

    • memory/2536-1072-0x0000000008B60000-0x0000000008BD6000-memory.dmp

      Filesize

      472KB

    • memory/2536-1073-0x0000000008BF0000-0x0000000008C40000-memory.dmp

      Filesize

      320KB

    • memory/2536-1074-0x0000000008C60000-0x0000000008E22000-memory.dmp

      Filesize

      1.8MB

    • memory/2536-1075-0x0000000008E30000-0x000000000935C000-memory.dmp

      Filesize

      5.2MB

    • memory/2536-1076-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-1077-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-1078-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2536-1080-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/4512-1085-0x0000000000180000-0x00000000001B2000-memory.dmp

      Filesize

      200KB

    • memory/4512-1086-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB