Analysis

  • max time kernel
    99s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 11:45

General

  • Target

    62798c6e999240d6cfc1e975598fc842235ff7ae0c3101691b4331e398b8398c.exe

  • Size

    539KB

  • MD5

    f6e5a50fa06f4ed7541c6a22926048b8

  • SHA1

    7090883275f821f1bf6947adbd7336afa398670e

  • SHA256

    62798c6e999240d6cfc1e975598fc842235ff7ae0c3101691b4331e398b8398c

  • SHA512

    3de6b9e466b24f711e656d1591809ca4746c3c77035764623abfbb4af067af0e62abeb3cfe37ead764f06f533231a3ac215d9423ccdc11692ceb4b1b3e3ea3f9

  • SSDEEP

    12288:kMruy90bd7b6dbjiHYzlI9U2QFCmdETs7jmK:Sy7i8+Q1dW4mK

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62798c6e999240d6cfc1e975598fc842235ff7ae0c3101691b4331e398b8398c.exe
    "C:\Users\Admin\AppData\Local\Temp\62798c6e999240d6cfc1e975598fc842235ff7ae0c3101691b4331e398b8398c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5826.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5826.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9803.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9803.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6949.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 1348
          4⤵
          • Program crash
          PID:4424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597234.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2648 -ip 2648
    1⤵
      PID:3752

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597234.exe
      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597234.exe
      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5826.exe
      Filesize

      397KB

      MD5

      67291953bfaa3f8ec82971ac1720e4ac

      SHA1

      809804f46ef735149538ad65a422d5c5bf446c55

      SHA256

      6a68bdf1c1e8e439bf23e0c14eec8eca31642f67f25732fb709a219a734cfc28

      SHA512

      91fd9f510aad631423a1f78f66e8883c6f3d9561675ff4defaa3da349e6b8a8f103843824a0dd36cf3cb09e547373a61285a0e9bfe4059e0dba55cc3cf2c4f93

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5826.exe
      Filesize

      397KB

      MD5

      67291953bfaa3f8ec82971ac1720e4ac

      SHA1

      809804f46ef735149538ad65a422d5c5bf446c55

      SHA256

      6a68bdf1c1e8e439bf23e0c14eec8eca31642f67f25732fb709a219a734cfc28

      SHA512

      91fd9f510aad631423a1f78f66e8883c6f3d9561675ff4defaa3da349e6b8a8f103843824a0dd36cf3cb09e547373a61285a0e9bfe4059e0dba55cc3cf2c4f93

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9803.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9803.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6949.exe
      Filesize

      356KB

      MD5

      c74e000a930f23a806b785d202060459

      SHA1

      eda17d5a9d5ca23e51aae4af18df35c683201144

      SHA256

      400f07b9fb1f88607f2b11c40e4a155a00828912091ea4c4f710b43c1cebca1f

      SHA512

      e828cbb6c87a6579e6ea14f11dfc7c29b3ae90d0ea53a2f7b976d2d6a62bdd60d9bc29902960df27051b2e5b3b208bedfe43dad5b56a84c005188638fdc8368e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6949.exe
      Filesize

      356KB

      MD5

      c74e000a930f23a806b785d202060459

      SHA1

      eda17d5a9d5ca23e51aae4af18df35c683201144

      SHA256

      400f07b9fb1f88607f2b11c40e4a155a00828912091ea4c4f710b43c1cebca1f

      SHA512

      e828cbb6c87a6579e6ea14f11dfc7c29b3ae90d0ea53a2f7b976d2d6a62bdd60d9bc29902960df27051b2e5b3b208bedfe43dad5b56a84c005188638fdc8368e

    • memory/1172-147-0x0000000000150000-0x000000000015A000-memory.dmp
      Filesize

      40KB

    • memory/2648-153-0x00000000071F0000-0x0000000007794000-memory.dmp
      Filesize

      5.6MB

    • memory/2648-154-0x0000000002C60000-0x0000000002CAB000-memory.dmp
      Filesize

      300KB

    • memory/2648-155-0x00000000071E0000-0x00000000071F0000-memory.dmp
      Filesize

      64KB

    • memory/2648-156-0x00000000071E0000-0x00000000071F0000-memory.dmp
      Filesize

      64KB

    • memory/2648-157-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-158-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-160-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-162-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-164-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-166-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-168-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-170-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-172-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-174-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-176-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-178-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-180-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-182-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-184-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-186-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-188-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-190-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-192-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-194-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-196-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-198-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-200-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-202-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-204-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-206-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-208-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-210-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-212-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-214-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-216-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-218-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-220-0x0000000007160000-0x000000000719E000-memory.dmp
      Filesize

      248KB

    • memory/2648-1063-0x00000000078E0000-0x0000000007EF8000-memory.dmp
      Filesize

      6.1MB

    • memory/2648-1064-0x0000000007F70000-0x000000000807A000-memory.dmp
      Filesize

      1.0MB

    • memory/2648-1065-0x00000000080B0000-0x00000000080C2000-memory.dmp
      Filesize

      72KB

    • memory/2648-1066-0x00000000080D0000-0x000000000810C000-memory.dmp
      Filesize

      240KB

    • memory/2648-1067-0x00000000071E0000-0x00000000071F0000-memory.dmp
      Filesize

      64KB

    • memory/2648-1069-0x00000000083C0000-0x0000000008426000-memory.dmp
      Filesize

      408KB

    • memory/2648-1070-0x0000000008A90000-0x0000000008B22000-memory.dmp
      Filesize

      584KB

    • memory/2648-1071-0x00000000071E0000-0x00000000071F0000-memory.dmp
      Filesize

      64KB

    • memory/2648-1072-0x00000000071E0000-0x00000000071F0000-memory.dmp
      Filesize

      64KB

    • memory/2648-1073-0x0000000008C80000-0x0000000008E42000-memory.dmp
      Filesize

      1.8MB

    • memory/2648-1074-0x0000000008E60000-0x000000000938C000-memory.dmp
      Filesize

      5.2MB

    • memory/2648-1075-0x00000000071E0000-0x00000000071F0000-memory.dmp
      Filesize

      64KB

    • memory/2648-1076-0x0000000004A80000-0x0000000004AF6000-memory.dmp
      Filesize

      472KB

    • memory/2648-1077-0x000000000A790000-0x000000000A7E0000-memory.dmp
      Filesize

      320KB

    • memory/4916-1083-0x0000000000360000-0x0000000000392000-memory.dmp
      Filesize

      200KB

    • memory/4916-1084-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
      Filesize

      64KB

    • memory/4916-1085-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
      Filesize

      64KB