Analysis

  • max time kernel
    93s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 09:56

General

  • Target

    2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe

  • Size

    539KB

  • MD5

    beddc5fcfb1aea34a6aa6cca0d04b782

  • SHA1

    24f9a55df63e91ff36585dddeee89da6dbebf4ef

  • SHA256

    2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89

  • SHA512

    72ae7de8ee0528ba4b7027b924e9f100ebba38c2e03b0788da2664be5fd3b0b157181d741abc62755724d817ea1884affebd8699554e4e2adb75bd3cafccb455

  • SSDEEP

    12288:0Mr6y901IgxOEJ62kz7q3YRxxI4+oz3DzEJbN7VlZX/542:WybgcEJXkz+3YTIizzE9lF22

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

bolt

C2

193.233.20.31:4125

Attributes
  • auth_value

    29540c7bf0277243e2faf6601e15a754

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe
    "C:\Users\Admin\AppData\Local\Temp\2190a3761a6f503a4a6b8388cb47910bb5460f6ea833094e9a6fb58efb7f7b89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 1376
          4⤵
          • Program crash
          PID:4032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4924
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3556 -ip 3556
    1⤵
      PID:2880

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exe
      Filesize

      175KB

      MD5

      78efaf7292c2027da40635ca1aae855a

      SHA1

      686227a48e23b382a06c74f17d9b6f36e76042fd

      SHA256

      2f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab

      SHA512

      19e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34sH33.exe
      Filesize

      175KB

      MD5

      78efaf7292c2027da40635ca1aae855a

      SHA1

      686227a48e23b382a06c74f17d9b6f36e76042fd

      SHA256

      2f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab

      SHA512

      19e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exe
      Filesize

      397KB

      MD5

      8803ba9c1969384d43bd523ece0ae75d

      SHA1

      fe74a6a8bd12399643d2e37fb004b1c3f4f1ea4d

      SHA256

      ebea65d4e399f3e9d3f0105deb9716eb678551262ca1e23e00d4ae972724689b

      SHA512

      d5c3f6f3872c9d12b07412a815c41b12cbd7a08df2100f578ea30c38cdbd49ab54213a7cd9c99fad778e793a2e8076ef289857ae6ec7e4b46b0375af6acd2ff2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6376.exe
      Filesize

      397KB

      MD5

      8803ba9c1969384d43bd523ece0ae75d

      SHA1

      fe74a6a8bd12399643d2e37fb004b1c3f4f1ea4d

      SHA256

      ebea65d4e399f3e9d3f0105deb9716eb678551262ca1e23e00d4ae972724689b

      SHA512

      d5c3f6f3872c9d12b07412a815c41b12cbd7a08df2100f578ea30c38cdbd49ab54213a7cd9c99fad778e793a2e8076ef289857ae6ec7e4b46b0375af6acd2ff2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h21wh11.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exe
      Filesize

      355KB

      MD5

      d0f6d6db571f5cc78201b9d0ddda9a02

      SHA1

      d1bda83afb17c583d6b3f7804e257867a4377022

      SHA256

      11a631202a344d44aa0a9bec0e57f04a3f98f7bb12fd173815d7ee2f7afddcc1

      SHA512

      cb52d51d92b99d22ffc63c7c10cb0acf30672aba2ed48a1d783f33e81b984848f038a0b1bb2d2d5f77e6380bfabd1f4c315c85309c273e5a240c1ea8a1838365

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iULRj17.exe
      Filesize

      355KB

      MD5

      d0f6d6db571f5cc78201b9d0ddda9a02

      SHA1

      d1bda83afb17c583d6b3f7804e257867a4377022

      SHA256

      11a631202a344d44aa0a9bec0e57f04a3f98f7bb12fd173815d7ee2f7afddcc1

      SHA512

      cb52d51d92b99d22ffc63c7c10cb0acf30672aba2ed48a1d783f33e81b984848f038a0b1bb2d2d5f77e6380bfabd1f4c315c85309c273e5a240c1ea8a1838365

    • memory/2228-147-0x0000000000D50000-0x0000000000D5A000-memory.dmp
      Filesize

      40KB

    • memory/3556-153-0x00000000074A0000-0x0000000007A44000-memory.dmp
      Filesize

      5.6MB

    • memory/3556-154-0x0000000002C60000-0x0000000002CAB000-memory.dmp
      Filesize

      300KB

    • memory/3556-155-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-156-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-157-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-158-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-160-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-162-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-164-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-166-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-168-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-170-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-172-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-174-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-176-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-178-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-180-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-182-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-184-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-186-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-188-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-190-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-192-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-194-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-196-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-198-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-200-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-202-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-204-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-206-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-208-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-210-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-212-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-214-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-216-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-218-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-220-0x0000000004AC0000-0x0000000004AFE000-memory.dmp
      Filesize

      248KB

    • memory/3556-1063-0x0000000007A50000-0x0000000008068000-memory.dmp
      Filesize

      6.1MB

    • memory/3556-1064-0x00000000072C0000-0x00000000073CA000-memory.dmp
      Filesize

      1.0MB

    • memory/3556-1065-0x0000000004F30000-0x0000000004F42000-memory.dmp
      Filesize

      72KB

    • memory/3556-1066-0x00000000073D0000-0x000000000740C000-memory.dmp
      Filesize

      240KB

    • memory/3556-1067-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-1069-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-1070-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-1071-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-1072-0x0000000007490000-0x00000000074A0000-memory.dmp
      Filesize

      64KB

    • memory/3556-1075-0x0000000008640000-0x00000000086D2000-memory.dmp
      Filesize

      584KB

    • memory/3556-1076-0x00000000086E0000-0x0000000008746000-memory.dmp
      Filesize

      408KB

    • memory/3556-1077-0x0000000008B80000-0x0000000008D42000-memory.dmp
      Filesize

      1.8MB

    • memory/3556-1078-0x0000000008D60000-0x000000000928C000-memory.dmp
      Filesize

      5.2MB

    • memory/3556-1079-0x0000000009760000-0x00000000097D6000-memory.dmp
      Filesize

      472KB

    • memory/3556-1080-0x00000000097E0000-0x0000000009830000-memory.dmp
      Filesize

      320KB

    • memory/4924-1087-0x0000000000B40000-0x0000000000B72000-memory.dmp
      Filesize

      200KB

    • memory/4924-1088-0x0000000005760000-0x0000000005770000-memory.dmp
      Filesize

      64KB