Analysis

  • max time kernel
    102s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 07:12

General

  • Target

    a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe

  • Size

    688KB

  • MD5

    d24b186b53f9d4c93b407ad90cd74ecd

  • SHA1

    b10da9442bdb40ed7e3fa5bede9fe7e64abbdf38

  • SHA256

    a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b

  • SHA512

    77e6d3fe1c39fb1f5cdc9327017130e36df1ed8135daff0f1fae0409644f873dd7d5762e3171d599c54140790ab771cecc931fd901988e78cf0a43be5bc4987c

  • SSDEEP

    12288:AMrIy90YhCBvK6830sgBMO6EQNNatobxLoqQJybpVF6e6gmFjIRgjVjV9ZoWc:4yxhwvKIqOMQSxcqJFHmFh1o1

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

lenka

C2

193.233.20.32:4125

Attributes
  • auth_value

    8a60e8b2ec79d6a7e92f9feac39b8830

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe
    "C:\Users\Admin\AppData\Local\Temp\a974201a64abc57d7807502aa5684ac9560b355af955dd182b4455a6d398aa7b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4580.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4580.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7086.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7086.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1084
          4⤵
          • Program crash
          PID:5060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 1348
          4⤵
          • Program crash
          PID:4676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085251.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085251.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1552
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2728 -ip 2728
    1⤵
      PID:2076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3116 -ip 3116
      1⤵
        PID:3684

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085251.exe

        Filesize

        175KB

        MD5

        bdd8a15b31fef779bac8b5d0515bde84

        SHA1

        ae702d9d0e7c9070e5f1e1de19c942c3a562ad71

        SHA256

        c61a707626f34537dfec0f751337728b96c6f816f5c4ecbee31ed637150b8ab6

        SHA512

        5c3eda0027d352cd7bbb54406dbb6dde41fbd641b99df8c338e3445ba1ce4f706bf3de690057975d84ccff2f1ca632826e890024120b2c8a9eada3e81953b65f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085251.exe

        Filesize

        175KB

        MD5

        bdd8a15b31fef779bac8b5d0515bde84

        SHA1

        ae702d9d0e7c9070e5f1e1de19c942c3a562ad71

        SHA256

        c61a707626f34537dfec0f751337728b96c6f816f5c4ecbee31ed637150b8ab6

        SHA512

        5c3eda0027d352cd7bbb54406dbb6dde41fbd641b99df8c338e3445ba1ce4f706bf3de690057975d84ccff2f1ca632826e890024120b2c8a9eada3e81953b65f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4580.exe

        Filesize

        546KB

        MD5

        927ceb1c2cee70966322af24779e9991

        SHA1

        1cdb2b440b6061cbe7cb0bfcfb2bfd41a282edfe

        SHA256

        f0d1e42c46405e271b42a36db03f88e738df5f3101d3507e1217e79fcc34faf1

        SHA512

        e1a102992e2d48436626aa9c609a4bcba7cfd7492bcca8b6e3fe4c86616ad0ae2e349ff5b4982d1e2e86a2565d6cd2e5acc752329275ca27dab42d4001ad0cd7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4580.exe

        Filesize

        546KB

        MD5

        927ceb1c2cee70966322af24779e9991

        SHA1

        1cdb2b440b6061cbe7cb0bfcfb2bfd41a282edfe

        SHA256

        f0d1e42c46405e271b42a36db03f88e738df5f3101d3507e1217e79fcc34faf1

        SHA512

        e1a102992e2d48436626aa9c609a4bcba7cfd7492bcca8b6e3fe4c86616ad0ae2e349ff5b4982d1e2e86a2565d6cd2e5acc752329275ca27dab42d4001ad0cd7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7086.exe

        Filesize

        328KB

        MD5

        79804700263d76df72c31d187b83d207

        SHA1

        10ecdd5a342f2ee14a5d0fee08471f75f65ba729

        SHA256

        123b1324dfd9edf2b3f825f7f1ae596f58eafa8d456956e1b8baee006829c84e

        SHA512

        8d8fbc2a4acb719ee8fa5a9f8bbfc117e94eb1e70c47f0447980a40e2a7f981df0c1b3a47bef5c9f05c2234b80b02b2bc9c6a725229f8c96d5c260e2492279ed

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7086.exe

        Filesize

        328KB

        MD5

        79804700263d76df72c31d187b83d207

        SHA1

        10ecdd5a342f2ee14a5d0fee08471f75f65ba729

        SHA256

        123b1324dfd9edf2b3f825f7f1ae596f58eafa8d456956e1b8baee006829c84e

        SHA512

        8d8fbc2a4acb719ee8fa5a9f8bbfc117e94eb1e70c47f0447980a40e2a7f981df0c1b3a47bef5c9f05c2234b80b02b2bc9c6a725229f8c96d5c260e2492279ed

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe

        Filesize

        386KB

        MD5

        311900cb8eb51a37e7494209a5b5fe1f

        SHA1

        edb9d35290083f301bfd44d967c036773170a45f

        SHA256

        9a3b038956a2c7368336c8156c7dbeebc1708ba5a72736f0dae9a236198e7fd7

        SHA512

        c36e278137430ea243fac23983915e61d13d175fe2c766d2e5ad7a5aa17269896613f5809383b8e00d63ed9734e8029fb3d259d0b70db95d77e48e787f957472

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe

        Filesize

        386KB

        MD5

        311900cb8eb51a37e7494209a5b5fe1f

        SHA1

        edb9d35290083f301bfd44d967c036773170a45f

        SHA256

        9a3b038956a2c7368336c8156c7dbeebc1708ba5a72736f0dae9a236198e7fd7

        SHA512

        c36e278137430ea243fac23983915e61d13d175fe2c766d2e5ad7a5aa17269896613f5809383b8e00d63ed9734e8029fb3d259d0b70db95d77e48e787f957472

      • memory/1552-1121-0x0000000000D30000-0x0000000000D62000-memory.dmp

        Filesize

        200KB

      • memory/1552-1122-0x00000000055F0000-0x0000000005600000-memory.dmp

        Filesize

        64KB

      • memory/2728-161-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-175-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-153-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-155-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-157-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-159-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-150-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-163-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-165-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-167-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-169-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-171-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-173-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-151-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-177-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2728-178-0x00000000075C0000-0x00000000075D0000-memory.dmp

        Filesize

        64KB

      • memory/2728-179-0x00000000075C0000-0x00000000075D0000-memory.dmp

        Filesize

        64KB

      • memory/2728-180-0x00000000075C0000-0x00000000075D0000-memory.dmp

        Filesize

        64KB

      • memory/2728-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/2728-183-0x00000000075C0000-0x00000000075D0000-memory.dmp

        Filesize

        64KB

      • memory/2728-184-0x00000000075C0000-0x00000000075D0000-memory.dmp

        Filesize

        64KB

      • memory/2728-185-0x00000000075C0000-0x00000000075D0000-memory.dmp

        Filesize

        64KB

      • memory/2728-186-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/2728-149-0x00000000075D0000-0x0000000007B74000-memory.dmp

        Filesize

        5.6MB

      • memory/2728-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp

        Filesize

        180KB

      • memory/3116-193-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB

      • memory/3116-226-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-195-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-198-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-196-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-200-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-202-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-204-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-206-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-208-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-210-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-212-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-214-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-218-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-216-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-220-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-222-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-194-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB

      • memory/3116-224-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-228-0x0000000007710000-0x000000000774F000-memory.dmp

        Filesize

        252KB

      • memory/3116-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/3116-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/3116-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/3116-1104-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/3116-1105-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB

      • memory/3116-1107-0x00000000083C0000-0x0000000008452000-memory.dmp

        Filesize

        584KB

      • memory/3116-1108-0x0000000008460000-0x00000000084C6000-memory.dmp

        Filesize

        408KB

      • memory/3116-1109-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB

      • memory/3116-1110-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB

      • memory/3116-1111-0x0000000008DC0000-0x0000000008F82000-memory.dmp

        Filesize

        1.8MB

      • memory/3116-1112-0x0000000008FA0000-0x00000000094CC000-memory.dmp

        Filesize

        5.2MB

      • memory/3116-1113-0x0000000009610000-0x0000000009686000-memory.dmp

        Filesize

        472KB

      • memory/3116-191-0x0000000002DC0000-0x0000000002E0B000-memory.dmp

        Filesize

        300KB

      • memory/3116-192-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB

      • memory/3116-1114-0x00000000096A0000-0x00000000096F0000-memory.dmp

        Filesize

        320KB

      • memory/3116-1116-0x0000000007150000-0x0000000007160000-memory.dmp

        Filesize

        64KB