Analysis

  • max time kernel
    82s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2023, 12:54

General

  • Target

    6a511ebd58b37b5e0e9ec4ffa6a93b295ee62bf74ef86487dfb448849b3ae80a.exe

  • Size

    720KB

  • MD5

    1ec25110a6cb478a4d2bb2f5adedfb5f

  • SHA1

    92db021b75fd1f36401f536ad77385734ecc50c3

  • SHA256

    6a511ebd58b37b5e0e9ec4ffa6a93b295ee62bf74ef86487dfb448849b3ae80a

  • SHA512

    fb1a84bfd388493d7bee368dd0b21b78d1546e1aa89f78382d0cefac8ce9afd07e8d3022da5a3a7466788b032fac29e9c8d4ab46cd982dc892e6a6dd604a966d

  • SSDEEP

    12288:/QOgkhaGZ6WVv8YbXfPJXjgYCws1k5EnUmrAB5viOAvthHI92v+sq4CSW/:/Q/GZLj50YLs1k5ae5vi7tt2kZJCl/

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

firmu

C2

193.233.20.32:4125

Attributes
  • auth_value

    9f3e5e35e4a3a38fc36c5a851728aa33

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 32 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a511ebd58b37b5e0e9ec4ffa6a93b295ee62bf74ef86487dfb448849b3ae80a.exe
    "C:\Users\Admin\AppData\Local\Temp\6a511ebd58b37b5e0e9ec4ffa6a93b295ee62bf74ef86487dfb448849b3ae80a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX2692.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX2692.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr580098.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr580098.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku525293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku525293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3280
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 1132
          4⤵
          • Program crash
          PID:4860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr698188.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr698188.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 428
      2⤵
      • Program crash
      PID:2932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3280 -ip 3280
    1⤵
      PID:1880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5076 -ip 5076
      1⤵
        PID:1000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr698188.exe

        Filesize

        175KB

        MD5

        6b780eb9c71d7b15142e05f33765678b

        SHA1

        1b853b28e715a7c7a8e4a39567e7b22697265741

        SHA256

        2067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76

        SHA512

        a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr698188.exe

        Filesize

        175KB

        MD5

        6b780eb9c71d7b15142e05f33765678b

        SHA1

        1b853b28e715a7c7a8e4a39567e7b22697265741

        SHA256

        2067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76

        SHA512

        a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX2692.exe

        Filesize

        411KB

        MD5

        8d91ec84f02718c369e9f9eaab51e1ce

        SHA1

        1b0018def4b3cdadce39384d6a2e79f56fe44053

        SHA256

        819583e33839182609181cc48b1bafc0ebab7bbb484e87a91629952d7498939e

        SHA512

        b2eccec0af45552760fe620416eb8020f456d70a08cdea3d0f3de18de0784a9593d78743af3c51b9e7783a1b8681caaa2f55d1b71d3cc935d5f60daa97cb2b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX2692.exe

        Filesize

        411KB

        MD5

        8d91ec84f02718c369e9f9eaab51e1ce

        SHA1

        1b0018def4b3cdadce39384d6a2e79f56fe44053

        SHA256

        819583e33839182609181cc48b1bafc0ebab7bbb484e87a91629952d7498939e

        SHA512

        b2eccec0af45552760fe620416eb8020f456d70a08cdea3d0f3de18de0784a9593d78743af3c51b9e7783a1b8681caaa2f55d1b71d3cc935d5f60daa97cb2b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr580098.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr580098.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku525293.exe

        Filesize

        385KB

        MD5

        caff184a81a985eaf2586bf5718a9034

        SHA1

        f443603f67b615813370fbd5d936b73acd1f9bba

        SHA256

        a29ac52c5442775c1131743f1a283bcf84da104673753887b64b2692b32c6ebb

        SHA512

        f4eff40ac6c79739f0fe1edad8998e2577ec7c8a0b921b19f9a438dc435e38dad6d130b538a36c04ebe5dd9bd239e9da180484329c5732e5e1a19de71158e77d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku525293.exe

        Filesize

        385KB

        MD5

        caff184a81a985eaf2586bf5718a9034

        SHA1

        f443603f67b615813370fbd5d936b73acd1f9bba

        SHA256

        a29ac52c5442775c1131743f1a283bcf84da104673753887b64b2692b32c6ebb

        SHA512

        f4eff40ac6c79739f0fe1edad8998e2577ec7c8a0b921b19f9a438dc435e38dad6d130b538a36c04ebe5dd9bd239e9da180484329c5732e5e1a19de71158e77d

      • memory/952-1090-0x00000000049A0000-0x00000000049B0000-memory.dmp

        Filesize

        64KB

      • memory/952-1088-0x0000000000140000-0x0000000000172000-memory.dmp

        Filesize

        200KB

      • memory/1648-148-0x0000000000880000-0x000000000088A000-memory.dmp

        Filesize

        40KB

      • memory/3280-196-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-208-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-160-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/3280-161-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-162-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-164-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-166-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-168-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-170-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-172-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-174-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-176-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-178-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-180-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-182-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-184-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-186-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-188-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-190-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-192-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-194-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-158-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/3280-198-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-200-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-202-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-204-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-206-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-159-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/3280-210-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-212-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-214-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-216-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-218-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-220-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-222-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/3280-1067-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/3280-1068-0x0000000007EF0000-0x0000000007FFA000-memory.dmp

        Filesize

        1.0MB

      • memory/3280-1069-0x0000000004E40000-0x0000000004E52000-memory.dmp

        Filesize

        72KB

      • memory/3280-1070-0x0000000004E60000-0x0000000004E9C000-memory.dmp

        Filesize

        240KB

      • memory/3280-1071-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/3280-1074-0x0000000008280000-0x0000000008312000-memory.dmp

        Filesize

        584KB

      • memory/3280-1075-0x0000000008320000-0x0000000008386000-memory.dmp

        Filesize

        408KB

      • memory/3280-1076-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/3280-1077-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/3280-1078-0x0000000008DC0000-0x0000000008E36000-memory.dmp

        Filesize

        472KB

      • memory/3280-1079-0x0000000008E50000-0x0000000008EA0000-memory.dmp

        Filesize

        320KB

      • memory/3280-1080-0x0000000008EB0000-0x0000000009072000-memory.dmp

        Filesize

        1.8MB

      • memory/3280-157-0x0000000002DB0000-0x0000000002DFB000-memory.dmp

        Filesize

        300KB

      • memory/3280-156-0x0000000007320000-0x00000000078C4000-memory.dmp

        Filesize

        5.6MB

      • memory/3280-1081-0x0000000009090000-0x00000000095BC000-memory.dmp

        Filesize

        5.2MB

      • memory/3280-1083-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/5076-149-0x0000000004A30000-0x0000000004ABC000-memory.dmp

        Filesize

        560KB

      • memory/5076-150-0x0000000000400000-0x0000000002BE2000-memory.dmp

        Filesize

        39.9MB