Analysis

  • max time kernel
    79s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 11:21

General

  • Target

    536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe

  • Size

    688KB

  • MD5

    d96660f011cecbf930925e455e5a01d9

  • SHA1

    5c4a4d5661e4f6fafd1a68412d96d16670df52bb

  • SHA256

    536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404

  • SHA512

    a9a4e846f3837a01ce54c28dc92f3a788927d13fa2eb9275322c0a98522a6c17998b01f42f8ae99fd9d7dd7c64b02fcf550f9f2c6209f3b66b57848e88f6d2a2

  • SSDEEP

    12288:0MrOy90uB+DPhk7UNh7/6iCqMxZSNydFj099RF3ezDXkoV6LSfy8EgC6:CylqPhk7ShGiqdh29RF3ezooVCSDE/6

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

firmu

C2

193.233.20.32:4125

Attributes
  • auth_value

    9f3e5e35e4a3a38fc36c5a851728aa33

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe
    "C:\Users\Admin\AppData\Local\Temp\536a0ebca2cf3910264391011fa98ee97e2e72c4996b1203ae84c51b40246404.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022702.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9373.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9373.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 1092
          4⤵
          • Program crash
          PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6569.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6569.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 1372
          4⤵
          • Program crash
          PID:4508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121492.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4876
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3508 -ip 3508
    1⤵
      PID:4500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1784 -ip 1784
      1⤵
        PID:3192

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121492.exe

        Filesize

        175KB

        MD5

        6b780eb9c71d7b15142e05f33765678b

        SHA1

        1b853b28e715a7c7a8e4a39567e7b22697265741

        SHA256

        2067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76

        SHA512

        a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121492.exe

        Filesize

        175KB

        MD5

        6b780eb9c71d7b15142e05f33765678b

        SHA1

        1b853b28e715a7c7a8e4a39567e7b22697265741

        SHA256

        2067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76

        SHA512

        a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022702.exe

        Filesize

        546KB

        MD5

        cde24b89a93958c36de6ee910b43cad7

        SHA1

        d00d4168d4b66a2b61ee819d215a26514f781d41

        SHA256

        2810f24c5ce62a7a56b1a944c320b6766da1302b5b452dfe73166ddbf96860eb

        SHA512

        8979b0e5653f36dc725afb0abbd861fd693dd29cadce1128e172a901433be44102e3aa990a60433dc871b6939d34fe619804fa5e0064a414ca41dff1d3e25f4f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un022702.exe

        Filesize

        546KB

        MD5

        cde24b89a93958c36de6ee910b43cad7

        SHA1

        d00d4168d4b66a2b61ee819d215a26514f781d41

        SHA256

        2810f24c5ce62a7a56b1a944c320b6766da1302b5b452dfe73166ddbf96860eb

        SHA512

        8979b0e5653f36dc725afb0abbd861fd693dd29cadce1128e172a901433be44102e3aa990a60433dc871b6939d34fe619804fa5e0064a414ca41dff1d3e25f4f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9373.exe

        Filesize

        328KB

        MD5

        323753131e1274b0f3240424819e7d01

        SHA1

        44a35603335b29a1c9307bad9748042f33ba4e97

        SHA256

        632838806adbe78345ba5252d0496e7fe8ec10e65f3b4aa931d4d78c4e559d0d

        SHA512

        cb9d5bf1d4a553f864002c0bfc280fa7f9e8e37479f972d5dfecac534f6101d77c48bd5a6f915dccd2b848ca33b866d629c2d1b25a77f50da32f5b15c4186125

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9373.exe

        Filesize

        328KB

        MD5

        323753131e1274b0f3240424819e7d01

        SHA1

        44a35603335b29a1c9307bad9748042f33ba4e97

        SHA256

        632838806adbe78345ba5252d0496e7fe8ec10e65f3b4aa931d4d78c4e559d0d

        SHA512

        cb9d5bf1d4a553f864002c0bfc280fa7f9e8e37479f972d5dfecac534f6101d77c48bd5a6f915dccd2b848ca33b866d629c2d1b25a77f50da32f5b15c4186125

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6569.exe

        Filesize

        385KB

        MD5

        cd048cc36bef4480f946320a6d736fc1

        SHA1

        9a6e424de693f89f7a1593a790a3e22f764101e3

        SHA256

        dbe2e1aa25bca96916fa37ef9713a286f6dea4feaaa2a3ea974456d658e2cb82

        SHA512

        e538ce16d12723ca84a6d881206b5004c79bbe8c288b3f7570518734e872e8a572fdcf905aa1b681e347e7448881372e42365d1967e47c3b8f469e3284916e52

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6569.exe

        Filesize

        385KB

        MD5

        cd048cc36bef4480f946320a6d736fc1

        SHA1

        9a6e424de693f89f7a1593a790a3e22f764101e3

        SHA256

        dbe2e1aa25bca96916fa37ef9713a286f6dea4feaaa2a3ea974456d658e2cb82

        SHA512

        e538ce16d12723ca84a6d881206b5004c79bbe8c288b3f7570518734e872e8a572fdcf905aa1b681e347e7448881372e42365d1967e47c3b8f469e3284916e52

      • memory/1784-1102-0x0000000007E30000-0x0000000007F3A000-memory.dmp

        Filesize

        1.0MB

      • memory/1784-226-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-1116-0x000000000A630000-0x000000000A680000-memory.dmp

        Filesize

        320KB

      • memory/1784-1115-0x000000000A5A0000-0x000000000A616000-memory.dmp

        Filesize

        472KB

      • memory/1784-1114-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-204-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-1113-0x0000000009FC0000-0x000000000A4EC000-memory.dmp

        Filesize

        5.2MB

      • memory/1784-1112-0x0000000009DF0000-0x0000000009FB2000-memory.dmp

        Filesize

        1.8MB

      • memory/1784-1111-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-1109-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-1110-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-1108-0x0000000008950000-0x00000000089E2000-memory.dmp

        Filesize

        584KB

      • memory/1784-1107-0x0000000008280000-0x00000000082E6000-memory.dmp

        Filesize

        408KB

      • memory/1784-206-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-1105-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-1104-0x0000000007F90000-0x0000000007FCC000-memory.dmp

        Filesize

        240KB

      • memory/1784-1103-0x0000000007F70000-0x0000000007F82000-memory.dmp

        Filesize

        72KB

      • memory/1784-1101-0x0000000007810000-0x0000000007E28000-memory.dmp

        Filesize

        6.1MB

      • memory/1784-228-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-214-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-224-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-222-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-220-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-191-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

        Filesize

        300KB

      • memory/1784-192-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-208-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-193-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-195-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-196-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-198-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-200-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-202-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-218-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-216-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-194-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1784-210-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/1784-212-0x0000000007140000-0x000000000717F000-memory.dmp

        Filesize

        252KB

      • memory/3508-182-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/3508-178-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/3508-164-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-152-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-154-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-186-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/3508-185-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/3508-184-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/3508-156-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-150-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/3508-180-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/3508-179-0x00000000072E0000-0x00000000072F0000-memory.dmp

        Filesize

        64KB

      • memory/3508-177-0x0000000002C50000-0x0000000002C7D000-memory.dmp

        Filesize

        180KB

      • memory/3508-176-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-174-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-172-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-170-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-168-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-166-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-162-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-160-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-158-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-149-0x0000000004A80000-0x0000000004A92000-memory.dmp

        Filesize

        72KB

      • memory/3508-148-0x00000000072F0000-0x0000000007894000-memory.dmp

        Filesize

        5.6MB

      • memory/4876-1122-0x0000000000460000-0x0000000000492000-memory.dmp

        Filesize

        200KB

      • memory/4876-1123-0x0000000005090000-0x00000000050A0000-memory.dmp

        Filesize

        64KB

      • memory/4876-1124-0x0000000005090000-0x00000000050A0000-memory.dmp

        Filesize

        64KB