Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 13:57

General

  • Target

    6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe

  • Size

    686KB

  • MD5

    8a351fb07109b5313380d8c59f0848a2

  • SHA1

    27006ef799e8511b72ce3cf57b118b447db6b190

  • SHA256

    6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3

  • SHA512

    b645d3335c2ce2ed051be224d459602e9b01253568dc0f7d69ed18079806736c7c979f7cd601ce274abdc017294c89c7a851eac06e12e99216345e85ab401f0a

  • SSDEEP

    12288:KMrmy908qC7k1yjxdrL//+Fti7N7VTIJ3iwPnVLds9YV:gyNq4k1yNN7mFtsQ5iO1EYV

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0a097dca3c42dadabd5788c0bc5b0a373fe08cc6272ad150681c882c2611e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245704.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245704.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1080
          4⤵
          • Program crash
          PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3638.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 1756
          4⤵
          • Program crash
          PID:1196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232727.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232727.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4736 -ip 4736
    1⤵
      PID:4244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4296 -ip 4296
      1⤵
        PID:2144

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232727.exe

              Filesize

              175KB

              MD5

              df9baae013ed51bfb0e889cfffe7b6d2

              SHA1

              fd1f10ad96d5c5787e4d0600ac3199b51b23081e

              SHA256

              0d1321bb46aadae262243b5fa14c22c7282ba67726f04ae57d6c87a622da19f8

              SHA512

              2356bdcc0cd5f6ff7c2cf30bb5925819444e53399c67c9171850990b685454809adfbb4cf45202ecd5ddd51c41edc9067b74b5e81c832e99c5799874e058fbb2

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232727.exe

              Filesize

              175KB

              MD5

              df9baae013ed51bfb0e889cfffe7b6d2

              SHA1

              fd1f10ad96d5c5787e4d0600ac3199b51b23081e

              SHA256

              0d1321bb46aadae262243b5fa14c22c7282ba67726f04ae57d6c87a622da19f8

              SHA512

              2356bdcc0cd5f6ff7c2cf30bb5925819444e53399c67c9171850990b685454809adfbb4cf45202ecd5ddd51c41edc9067b74b5e81c832e99c5799874e058fbb2

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245704.exe

              Filesize

              544KB

              MD5

              120199ef863c341519bf46098043defe

              SHA1

              adda16d112099e56c8000a85a505bcbfdd37d63f

              SHA256

              06c8c9e7268c93d3e3a1bf5c242af7f34d4895885792c4436c1945445869d30d

              SHA512

              5fd29db9a4f82fc4907472fe81cfcbb4f2b89b8c3ba8ff501d8e5b16eb722d0ca779e4aab8b19705bbce866dd30f9fc9c580ea749c4040a9594a7678e7f746a7

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245704.exe

              Filesize

              544KB

              MD5

              120199ef863c341519bf46098043defe

              SHA1

              adda16d112099e56c8000a85a505bcbfdd37d63f

              SHA256

              06c8c9e7268c93d3e3a1bf5c242af7f34d4895885792c4436c1945445869d30d

              SHA512

              5fd29db9a4f82fc4907472fe81cfcbb4f2b89b8c3ba8ff501d8e5b16eb722d0ca779e4aab8b19705bbce866dd30f9fc9c580ea749c4040a9594a7678e7f746a7

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exe

              Filesize

              326KB

              MD5

              71df80bd3a42b603bdd5b93ad5a48007

              SHA1

              7fb9b5b06b30824737f86ec6d3b8f3a0fc22dc70

              SHA256

              5e01f2d2e6e4da5129af0579d1696892e95a90612fba66f226e2b332917c3f76

              SHA512

              98255a4fbea89ac79faf2e960ab8cd8a1bf42ec65cf270f420dab691da7e1e9f4407123fa016ed2cbe32699f294de226b99a30b007ab301479375472efa52a39

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2210.exe

              Filesize

              326KB

              MD5

              71df80bd3a42b603bdd5b93ad5a48007

              SHA1

              7fb9b5b06b30824737f86ec6d3b8f3a0fc22dc70

              SHA256

              5e01f2d2e6e4da5129af0579d1696892e95a90612fba66f226e2b332917c3f76

              SHA512

              98255a4fbea89ac79faf2e960ab8cd8a1bf42ec65cf270f420dab691da7e1e9f4407123fa016ed2cbe32699f294de226b99a30b007ab301479375472efa52a39

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3638.exe

              Filesize

              384KB

              MD5

              0eb8613915f64af0021032f7280c9855

              SHA1

              8fbf864dd085d9e30dcedbedc228b0425bf31f43

              SHA256

              8cc9d56206bba7790b59e867de9e1ea7f7a25ee82d6b83952f9375e4d48cf9c1

              SHA512

              532e01206f7ee4e9b26073acd6ee2192e1cc4b84e9cf2b0afded8894a1651b45ed85c191d63ed9bf91f03feb5850e17475e5104b6202c641fd71de9306c2607a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3638.exe

              Filesize

              384KB

              MD5

              0eb8613915f64af0021032f7280c9855

              SHA1

              8fbf864dd085d9e30dcedbedc228b0425bf31f43

              SHA256

              8cc9d56206bba7790b59e867de9e1ea7f7a25ee82d6b83952f9375e4d48cf9c1

              SHA512

              532e01206f7ee4e9b26073acd6ee2192e1cc4b84e9cf2b0afded8894a1651b45ed85c191d63ed9bf91f03feb5850e17475e5104b6202c641fd71de9306c2607a

            • memory/4296-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

              Filesize

              1.0MB

            • memory/4296-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

              Filesize

              72KB

            • memory/4296-1116-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-1115-0x00000000090C0000-0x00000000095EC000-memory.dmp

              Filesize

              5.2MB

            • memory/4296-1114-0x0000000008EB0000-0x0000000009072000-memory.dmp

              Filesize

              1.8MB

            • memory/4296-1113-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-1112-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-1111-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-1110-0x0000000008CF0000-0x0000000008D40000-memory.dmp

              Filesize

              320KB

            • memory/4296-1109-0x0000000008C60000-0x0000000008CD6000-memory.dmp

              Filesize

              472KB

            • memory/4296-1108-0x0000000008460000-0x00000000084C6000-memory.dmp

              Filesize

              408KB

            • memory/4296-1107-0x00000000083C0000-0x0000000008452000-memory.dmp

              Filesize

              584KB

            • memory/4296-1105-0x0000000008110000-0x000000000814C000-memory.dmp

              Filesize

              240KB

            • memory/4296-1104-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-204-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmp

              Filesize

              6.1MB

            • memory/4296-226-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-228-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-224-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-222-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-208-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-218-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-217-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-191-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-192-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-194-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-196-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-198-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-200-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-202-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-215-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4296-210-0x0000000002B90000-0x0000000002BDB000-memory.dmp

              Filesize

              300KB

            • memory/4296-220-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-206-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-211-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-214-0x0000000007150000-0x000000000718F000-memory.dmp

              Filesize

              252KB

            • memory/4296-213-0x0000000007300000-0x0000000007310000-memory.dmp

              Filesize

              64KB

            • memory/4736-153-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-148-0x00000000071A0000-0x0000000007744000-memory.dmp

              Filesize

              5.6MB

            • memory/4736-152-0x0000000003010000-0x0000000003020000-memory.dmp

              Filesize

              64KB

            • memory/4736-172-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-185-0x0000000003010000-0x0000000003020000-memory.dmp

              Filesize

              64KB

            • memory/4736-183-0x0000000003010000-0x0000000003020000-memory.dmp

              Filesize

              64KB

            • memory/4736-182-0x0000000003010000-0x0000000003020000-memory.dmp

              Filesize

              64KB

            • memory/4736-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

              Filesize

              39.5MB

            • memory/4736-180-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-150-0x0000000003010000-0x0000000003020000-memory.dmp

              Filesize

              64KB

            • memory/4736-178-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-170-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-151-0x0000000003010000-0x0000000003020000-memory.dmp

              Filesize

              64KB

            • memory/4736-176-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-154-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-168-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-166-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-164-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-162-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-160-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-158-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-156-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-174-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

              Filesize

              72KB

            • memory/4736-149-0x0000000002B80000-0x0000000002BAD000-memory.dmp

              Filesize

              180KB

            • memory/4736-186-0x0000000000400000-0x0000000002B7F000-memory.dmp

              Filesize

              39.5MB

            • memory/4784-1122-0x0000000000090000-0x00000000000C2000-memory.dmp

              Filesize

              200KB

            • memory/4784-1123-0x0000000004970000-0x0000000004980000-memory.dmp

              Filesize

              64KB