Analysis

  • max time kernel
    80s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 18:50

General

  • Target

    8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe

  • Size

    687KB

  • MD5

    3b6bd5b4ed4f9ed6a667da92e054c69e

  • SHA1

    5d6c26e84110e020fd4013a842c496023f373d03

  • SHA256

    8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db

  • SHA512

    d64d48bf11001e0cf84a599496c5f4e0c9e9fe3b7e793c569d5195f38847d8841cf1ceb99a9636c8ea92d12233607d21bdab5757feeb0815445e9a46af91b258

  • SSDEEP

    12288:jMrwy90wm2gdg/25jI9qzGf55CuvgTyL9ogDApUU1BM4zXkAqeP/wzV7b:7yfm28O0jBGfnN3L9ogUCUIePP/wzRb

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

viza

C2

193.233.20.32:4125

Attributes
  • auth_value

    153a106a89fae7251f2dc17be2eb5720

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe
    "C:\Users\Admin\AppData\Local\Temp\8007c5a4df1a45fefdbe65d1509439ea50de9a865f4d789f5cad8e861e1965db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800590.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800590.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1886.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:432
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 1080
          4⤵
          • Program crash
          PID:540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8409.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8409.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1212
          4⤵
          • Program crash
          PID:4392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122582.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122582.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 432 -ip 432
    1⤵
      PID:4436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 380 -ip 380
      1⤵
        PID:976

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122582.exe

        Filesize

        175KB

        MD5

        ee59ed8d569a7ffd44c985c447f60e1f

        SHA1

        7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

        SHA256

        6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

        SHA512

        0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122582.exe

        Filesize

        175KB

        MD5

        ee59ed8d569a7ffd44c985c447f60e1f

        SHA1

        7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

        SHA256

        6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

        SHA512

        0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800590.exe

        Filesize

        545KB

        MD5

        cf4db7ae78e99e15f970055523a0ab83

        SHA1

        250e52ea022d8e3bb406b243e50c26ce45a4a270

        SHA256

        8fad90d92654a72f62639f19966a8ee69c3e7e7ba228676525666595cbb46bb5

        SHA512

        9ad3d423631f0a56fdd7c23ec1db443ae1b8353c68375982591706b119ddbdf23c525a7b48df836da9fe9d6ce0f1406708328437f8fe3e1f38cab6537f2fbbb2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800590.exe

        Filesize

        545KB

        MD5

        cf4db7ae78e99e15f970055523a0ab83

        SHA1

        250e52ea022d8e3bb406b243e50c26ce45a4a270

        SHA256

        8fad90d92654a72f62639f19966a8ee69c3e7e7ba228676525666595cbb46bb5

        SHA512

        9ad3d423631f0a56fdd7c23ec1db443ae1b8353c68375982591706b119ddbdf23c525a7b48df836da9fe9d6ce0f1406708328437f8fe3e1f38cab6537f2fbbb2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1886.exe

        Filesize

        325KB

        MD5

        d4e323940019c98aeef282f7a32a240a

        SHA1

        8f101d2e7f6543fb7b7bd9a89e1ee46ba3f9f2c0

        SHA256

        1253adbf5275a6c825fb14e07785089516ef5dda34c8edc6947889f429329e8d

        SHA512

        af12a11a2649fbc12f5ded116a834f7ac39ae7358dd2b673146601011f30122449ed861335cf07ddee0d99a95c219750e22e55de58df55aa330b9daacc28cb16

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1886.exe

        Filesize

        325KB

        MD5

        d4e323940019c98aeef282f7a32a240a

        SHA1

        8f101d2e7f6543fb7b7bd9a89e1ee46ba3f9f2c0

        SHA256

        1253adbf5275a6c825fb14e07785089516ef5dda34c8edc6947889f429329e8d

        SHA512

        af12a11a2649fbc12f5ded116a834f7ac39ae7358dd2b673146601011f30122449ed861335cf07ddee0d99a95c219750e22e55de58df55aa330b9daacc28cb16

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8409.exe

        Filesize

        383KB

        MD5

        1e9e0cff15a5fbdb504b5c66d08e1c7d

        SHA1

        eeb3e4fe842bbb29c6512b76d5e005432aa89b14

        SHA256

        f62b71fac4c116b8f78adf01e6efc30698fd466a2d0116c2163d22c13f0b540a

        SHA512

        546764945742119279ac7818df6770e836131d5af904c53bfea08b507467f8b15391c4e6883f5c7fd4efb2a3f3edb9010365f5cac030bd7bc48a9b017f639d84

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8409.exe

        Filesize

        383KB

        MD5

        1e9e0cff15a5fbdb504b5c66d08e1c7d

        SHA1

        eeb3e4fe842bbb29c6512b76d5e005432aa89b14

        SHA256

        f62b71fac4c116b8f78adf01e6efc30698fd466a2d0116c2163d22c13f0b540a

        SHA512

        546764945742119279ac7818df6770e836131d5af904c53bfea08b507467f8b15391c4e6883f5c7fd4efb2a3f3edb9010365f5cac030bd7bc48a9b017f639d84

      • memory/376-1121-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/376-1120-0x0000000000200000-0x0000000000232000-memory.dmp

        Filesize

        200KB

      • memory/380-1099-0x0000000007880000-0x0000000007E98000-memory.dmp

        Filesize

        6.1MB

      • memory/380-1101-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-1114-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-1113-0x0000000009410000-0x0000000009460000-memory.dmp

        Filesize

        320KB

      • memory/380-1112-0x0000000009390000-0x0000000009406000-memory.dmp

        Filesize

        472KB

      • memory/380-1111-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-1110-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-1109-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-1108-0x0000000008D10000-0x000000000923C000-memory.dmp

        Filesize

        5.2MB

      • memory/380-1107-0x0000000008B40000-0x0000000008D02000-memory.dmp

        Filesize

        1.8MB

      • memory/380-1106-0x0000000008320000-0x0000000008386000-memory.dmp

        Filesize

        408KB

      • memory/380-1105-0x0000000008280000-0x0000000008312000-memory.dmp

        Filesize

        584KB

      • memory/380-1103-0x0000000007FB0000-0x0000000007FEC000-memory.dmp

        Filesize

        240KB

      • memory/380-1102-0x0000000007180000-0x0000000007192000-memory.dmp

        Filesize

        72KB

      • memory/380-1100-0x0000000007EA0000-0x0000000007FAA000-memory.dmp

        Filesize

        1.0MB

      • memory/380-226-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-224-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-222-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-220-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-192-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-191-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-193-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-190-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-189-0x0000000002B90000-0x0000000002BDB000-memory.dmp

        Filesize

        300KB

      • memory/380-196-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-195-0x00000000071C0000-0x00000000071D0000-memory.dmp

        Filesize

        64KB

      • memory/380-198-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-200-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-202-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-204-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-206-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-208-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-210-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-212-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-214-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-216-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/380-218-0x0000000004A50000-0x0000000004A8F000-memory.dmp

        Filesize

        252KB

      • memory/432-177-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-148-0x0000000004510000-0x000000000453D000-memory.dmp

        Filesize

        180KB

      • memory/432-155-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-183-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/432-153-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-182-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/432-159-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-180-0x0000000000400000-0x0000000002B7E000-memory.dmp

        Filesize

        39.5MB

      • memory/432-179-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/432-173-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-184-0x0000000000400000-0x0000000002B7E000-memory.dmp

        Filesize

        39.5MB

      • memory/432-157-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-178-0x0000000007260000-0x0000000007270000-memory.dmp

        Filesize

        64KB

      • memory/432-171-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-169-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-167-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-165-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-163-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-161-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-151-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-150-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB

      • memory/432-149-0x0000000007270000-0x0000000007814000-memory.dmp

        Filesize

        5.6MB

      • memory/432-175-0x0000000004AF0000-0x0000000004B02000-memory.dmp

        Filesize

        72KB