Analysis

  • max time kernel
    78s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 12:13

General

  • Target

    cf6afc77dc84f56f6b2d75efb83037aaff1b44c5eb78ef4a933651f403393863.exe

  • Size

    539KB

  • MD5

    15794ae7db858f8de17de5e679c0cd97

  • SHA1

    92a32ad2d5e83f8a49af67bbf6b58c3afc9fa511

  • SHA256

    cf6afc77dc84f56f6b2d75efb83037aaff1b44c5eb78ef4a933651f403393863

  • SHA512

    3ba519d0cf95b5773902b1731bfedbdf6be69e3026de03905716c7c56515a43e87b6ded98a5acd3e622cb67991f308fc4b85a0cd7a49749dfe8a8fde69617893

  • SSDEEP

    12288:hMrqy903It+k4nSXYOd/7s9UcKQCIdQS6o3I3xbz:vyzRJIOd6KAdiQI1

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf6afc77dc84f56f6b2d75efb83037aaff1b44c5eb78ef4a933651f403393863.exe
    "C:\Users\Admin\AppData\Local\Temp\cf6afc77dc84f56f6b2d75efb83037aaff1b44c5eb78ef4a933651f403393863.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0459.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0459.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8780.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8780.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7296.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4420
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 1356
          4⤵
          • Program crash
          PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931956.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931956.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4260
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4420 -ip 4420
    1⤵
      PID:1608

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931956.exe
      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931956.exe
      Filesize

      175KB

      MD5

      7c11dfe7837f2079d50113de0e973682

      SHA1

      fae072addd4d56ab67d08ab82da4aac5d7223960

      SHA256

      442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b

      SHA512

      06085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0459.exe
      Filesize

      397KB

      MD5

      d60a1223159f00d7fe9e060190757c97

      SHA1

      f00e60a048c8c8390a8ed865379110cdcfbbd7d0

      SHA256

      18a439381fea967dac15dc404be4d201a536e6af1a1a6c73b175b27b1c3c8b49

      SHA512

      e602ca1b94c614918a2d152f1ff0101c7d8a56d737a36296ba5d88febcf48f71db00d269b23e6731f72af5bb2bffdbb059106a1a2cca515c476178148eee6926

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0459.exe
      Filesize

      397KB

      MD5

      d60a1223159f00d7fe9e060190757c97

      SHA1

      f00e60a048c8c8390a8ed865379110cdcfbbd7d0

      SHA256

      18a439381fea967dac15dc404be4d201a536e6af1a1a6c73b175b27b1c3c8b49

      SHA512

      e602ca1b94c614918a2d152f1ff0101c7d8a56d737a36296ba5d88febcf48f71db00d269b23e6731f72af5bb2bffdbb059106a1a2cca515c476178148eee6926

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8780.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8780.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7296.exe
      Filesize

      356KB

      MD5

      33c3a12027fdcf2dfa1716bdab4b7395

      SHA1

      3624603d3257e02a5bb76ba0ce68b095a878d5f0

      SHA256

      c1fb37ca22d52713d34caa8c71b28348b4b9f1c19f983c01ced83cb3242d1105

      SHA512

      4d865a1943805102e1ad2c9d92f26f147cf72acdf6dd93025bd1be352e85287111fe7985cf47b8c1fa04e3fff0f00c1a5832609322efa7ee88eea22ccfdb225e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7296.exe
      Filesize

      356KB

      MD5

      33c3a12027fdcf2dfa1716bdab4b7395

      SHA1

      3624603d3257e02a5bb76ba0ce68b095a878d5f0

      SHA256

      c1fb37ca22d52713d34caa8c71b28348b4b9f1c19f983c01ced83cb3242d1105

      SHA512

      4d865a1943805102e1ad2c9d92f26f147cf72acdf6dd93025bd1be352e85287111fe7985cf47b8c1fa04e3fff0f00c1a5832609322efa7ee88eea22ccfdb225e

    • memory/1652-147-0x0000000000B40000-0x0000000000B4A000-memory.dmp
      Filesize

      40KB

    • memory/4260-1085-0x0000000000400000-0x0000000000432000-memory.dmp
      Filesize

      200KB

    • memory/4260-1086-0x0000000004FB0000-0x0000000004FC0000-memory.dmp
      Filesize

      64KB

    • memory/4420-189-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-201-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-156-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-158-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-157-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-154-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-161-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-160-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-163-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-165-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-167-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-169-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-171-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-173-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-175-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-177-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-179-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-181-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-183-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-185-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-187-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-153-0x0000000007420000-0x00000000079C4000-memory.dmp
      Filesize

      5.6MB

    • memory/4420-191-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-193-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-195-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-197-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-199-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-155-0x0000000002C60000-0x0000000002CAB000-memory.dmp
      Filesize

      300KB

    • memory/4420-203-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-205-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-207-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-209-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-211-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-213-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-215-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-217-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-219-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-221-0x00000000072D0000-0x000000000730E000-memory.dmp
      Filesize

      248KB

    • memory/4420-1064-0x00000000079D0000-0x0000000007FE8000-memory.dmp
      Filesize

      6.1MB

    • memory/4420-1065-0x0000000007FF0000-0x00000000080FA000-memory.dmp
      Filesize

      1.0MB

    • memory/4420-1066-0x00000000073C0000-0x00000000073D2000-memory.dmp
      Filesize

      72KB

    • memory/4420-1067-0x0000000008100000-0x000000000813C000-memory.dmp
      Filesize

      240KB

    • memory/4420-1068-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-1070-0x00000000083C0000-0x0000000008452000-memory.dmp
      Filesize

      584KB

    • memory/4420-1071-0x0000000008460000-0x00000000084C6000-memory.dmp
      Filesize

      408KB

    • memory/4420-1072-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-1073-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-1074-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-1075-0x000000000A080000-0x000000000A0F6000-memory.dmp
      Filesize

      472KB

    • memory/4420-1076-0x000000000A110000-0x000000000A160000-memory.dmp
      Filesize

      320KB

    • memory/4420-1077-0x0000000007410000-0x0000000007420000-memory.dmp
      Filesize

      64KB

    • memory/4420-1078-0x000000000A190000-0x000000000A352000-memory.dmp
      Filesize

      1.8MB

    • memory/4420-1079-0x000000000A360000-0x000000000A88C000-memory.dmp
      Filesize

      5.2MB