Analysis

  • max time kernel
    78s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2023, 16:04

General

  • Target

    11930343036fdc5a939cb9204ddda2afb77bea60a1ddf80c0e124d98dba8f508.exe

  • Size

    540KB

  • MD5

    dbd4a49a01bc56e9f064acfa41e7554c

  • SHA1

    d386a6308131c651e2f5bb781958896af642d7ca

  • SHA256

    11930343036fdc5a939cb9204ddda2afb77bea60a1ddf80c0e124d98dba8f508

  • SHA512

    600c10e27f2d7d77a4ab71c00016e9101e95c5a9833d808d231f4e31caae729e0e1ac821d8a30dc95237fa51956ea0fa68977aec9bf111c04c36fdd2a16c9073

  • SSDEEP

    12288:dMrIy90DhzYHfWheJV4RMsPMkbrjySwvz01WRxig94:dyyxkfz+RMhMXyS8yWHW

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11930343036fdc5a939cb9204ddda2afb77bea60a1ddf80c0e124d98dba8f508.exe
    "C:\Users\Admin\AppData\Local\Temp\11930343036fdc5a939cb9204ddda2afb77bea60a1ddf80c0e124d98dba8f508.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8227.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6856.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6856.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2917.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2917.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 1632
          4⤵
          • Program crash
          PID:3572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183497.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183497.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1552 -ip 1552
    1⤵
      PID:3892

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183497.exe

      Filesize

      175KB

      MD5

      f50023c2c4bad1bbf51efde95c575b28

      SHA1

      9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

      SHA256

      a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

      SHA512

      d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183497.exe

      Filesize

      175KB

      MD5

      f50023c2c4bad1bbf51efde95c575b28

      SHA1

      9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

      SHA256

      a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

      SHA512

      d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8227.exe

      Filesize

      398KB

      MD5

      6ad61dc23a125bc9c1bb81f23fbfce22

      SHA1

      3ee3fecb333c7f891a5287d015d52b7a76eb7247

      SHA256

      1c2951598c5a18ea38edf50e0f66d88580c1a46499a86d3e59e48a39d3ecc301

      SHA512

      500d17134abd750119c124be9819930e21ff2af654c3ce60f0140b5f9ede25f1ce00212e38c6a9f2c34af508601e1a794b160f3850e801cef75872350037277c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8227.exe

      Filesize

      398KB

      MD5

      6ad61dc23a125bc9c1bb81f23fbfce22

      SHA1

      3ee3fecb333c7f891a5287d015d52b7a76eb7247

      SHA256

      1c2951598c5a18ea38edf50e0f66d88580c1a46499a86d3e59e48a39d3ecc301

      SHA512

      500d17134abd750119c124be9819930e21ff2af654c3ce60f0140b5f9ede25f1ce00212e38c6a9f2c34af508601e1a794b160f3850e801cef75872350037277c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6856.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6856.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2917.exe

      Filesize

      357KB

      MD5

      e384f557f4ba559eb6444036ea0cf7a9

      SHA1

      7f4efdd26ad37e6c11f2bb75f45e138eb83497b9

      SHA256

      3b38d57d778b2bca1c1191e75241991c2ca2fd59f510154e67c7f4d53b207f4d

      SHA512

      8cebbee599db5f8191bc34ae790bfb31e9ca25b6e40ea6a053e909362b06e5a206af8121d6e6998130641b60c095a447d3d5dedd68bb0f59637e427b3dcfc3f0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2917.exe

      Filesize

      357KB

      MD5

      e384f557f4ba559eb6444036ea0cf7a9

      SHA1

      7f4efdd26ad37e6c11f2bb75f45e138eb83497b9

      SHA256

      3b38d57d778b2bca1c1191e75241991c2ca2fd59f510154e67c7f4d53b207f4d

      SHA512

      8cebbee599db5f8191bc34ae790bfb31e9ca25b6e40ea6a053e909362b06e5a206af8121d6e6998130641b60c095a447d3d5dedd68bb0f59637e427b3dcfc3f0

    • memory/1552-153-0x0000000007380000-0x0000000007924000-memory.dmp

      Filesize

      5.6MB

    • memory/1552-154-0x0000000002C60000-0x0000000002CAB000-memory.dmp

      Filesize

      300KB

    • memory/1552-155-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1552-156-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1552-157-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-158-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-160-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-162-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-164-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-166-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-168-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-170-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-172-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-174-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-176-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-178-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-180-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-182-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-184-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-186-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-188-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-190-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-192-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-194-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-196-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-198-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-200-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-202-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-204-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-206-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-208-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-210-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-212-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-214-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-216-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-218-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-220-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/1552-1063-0x0000000007930000-0x0000000007F48000-memory.dmp

      Filesize

      6.1MB

    • memory/1552-1064-0x0000000007F70000-0x000000000807A000-memory.dmp

      Filesize

      1.0MB

    • memory/1552-1065-0x00000000080B0000-0x00000000080C2000-memory.dmp

      Filesize

      72KB

    • memory/1552-1066-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1552-1067-0x00000000080D0000-0x000000000810C000-memory.dmp

      Filesize

      240KB

    • memory/1552-1069-0x00000000083C0000-0x0000000008426000-memory.dmp

      Filesize

      408KB

    • memory/1552-1070-0x0000000008A90000-0x0000000008B22000-memory.dmp

      Filesize

      584KB

    • memory/1552-1071-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1552-1072-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1552-1073-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1552-1074-0x0000000008B80000-0x0000000008D42000-memory.dmp

      Filesize

      1.8MB

    • memory/1552-1075-0x0000000008D60000-0x000000000928C000-memory.dmp

      Filesize

      5.2MB

    • memory/1552-1076-0x00000000093C0000-0x0000000009436000-memory.dmp

      Filesize

      472KB

    • memory/1552-1077-0x0000000009450000-0x00000000094A0000-memory.dmp

      Filesize

      320KB

    • memory/1552-1078-0x0000000004860000-0x0000000004870000-memory.dmp

      Filesize

      64KB

    • memory/1668-147-0x0000000000A90000-0x0000000000A9A000-memory.dmp

      Filesize

      40KB

    • memory/2224-1084-0x00000000002A0000-0x00000000002D2000-memory.dmp

      Filesize

      200KB

    • memory/2224-1085-0x0000000004E40000-0x0000000004E50000-memory.dmp

      Filesize

      64KB