Analysis

  • max time kernel
    65s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2023 15:49

General

  • Target

    0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe

  • Size

    686KB

  • MD5

    2884a70322919d08210d11db599ec073

  • SHA1

    e5ee516fe50bd47cc834904fed616f33dcedfe48

  • SHA256

    0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a

  • SHA512

    417d31444bf02551a74e3a1d240b99fb90f1c5747a08b388a3edbe5877e84076bd229cf3e0f0fdd940506479b45528eae3f1334c7f65dbc7e75de6dceba0e660

  • SSDEEP

    12288:CMrIy90xncoXxvRpn5UO21N3v0bp7R4/RXZ7VTIeNilKdfol:+yUn/XxvdUO219v0bp7RbYiAdI

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe
    "C:\Users\Admin\AppData\Local\Temp\0090f95e11eeb3ddd59d35c307c7c49ce354414d21e2d6dcfcd31eabd78a799a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410575.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410575.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7846.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7846.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 1084
          4⤵
          • Program crash
          PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8138.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8138.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1328
          4⤵
          • Program crash
          PID:972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si977045.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si977045.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3896
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5064 -ip 5064
    1⤵
      PID:1088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1696 -ip 1696
      1⤵
        PID:2800

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si977045.exe

        Filesize

        175KB

        MD5

        906d268aed8a5ff404a00da73ddb9b4d

        SHA1

        cc6903f393419687a561d7ca36c373029e47cb9a

        SHA256

        b9a39ad1965772694d1deb2ef7a9cb21457139f6f37e8af8d58a2dcfe5beac4c

        SHA512

        1dee5a6d6f84141b1a23f46e5e37cd98e78875bc2e796fef4db9be8c3ab28dcf920aaaa8ca5587e12b2682d58c31349ea67f72fd91ebf64c90dbfcd2b08a488f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si977045.exe

        Filesize

        175KB

        MD5

        906d268aed8a5ff404a00da73ddb9b4d

        SHA1

        cc6903f393419687a561d7ca36c373029e47cb9a

        SHA256

        b9a39ad1965772694d1deb2ef7a9cb21457139f6f37e8af8d58a2dcfe5beac4c

        SHA512

        1dee5a6d6f84141b1a23f46e5e37cd98e78875bc2e796fef4db9be8c3ab28dcf920aaaa8ca5587e12b2682d58c31349ea67f72fd91ebf64c90dbfcd2b08a488f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410575.exe

        Filesize

        544KB

        MD5

        332ac0c5dbec00a67c9ded3205126fc0

        SHA1

        6df3105c63e297e10c98953ca3167c4f8928ad2a

        SHA256

        b4e9d1e1b21b70f927e4f858e8ab4de342eb528ebb4407eedaf52c2d77b5fb99

        SHA512

        8b5ca135b219667f8555a8e710a96afcad5b6202f878b72462a79affb91f4d23386d86a04574a87c7b2d44426ce9b1cf210437bf7c20198d7ecd138d636c6dc2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410575.exe

        Filesize

        544KB

        MD5

        332ac0c5dbec00a67c9ded3205126fc0

        SHA1

        6df3105c63e297e10c98953ca3167c4f8928ad2a

        SHA256

        b4e9d1e1b21b70f927e4f858e8ab4de342eb528ebb4407eedaf52c2d77b5fb99

        SHA512

        8b5ca135b219667f8555a8e710a96afcad5b6202f878b72462a79affb91f4d23386d86a04574a87c7b2d44426ce9b1cf210437bf7c20198d7ecd138d636c6dc2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7846.exe

        Filesize

        326KB

        MD5

        e8946364ecac8e8730b477a15c6ac5ea

        SHA1

        57a6736f0d8b444fd953a2ed1f49fd6708d6be43

        SHA256

        c37d06f2145761a8ee137e9d4d9d7ef4698c70fcf685ad3ca55bebfb4a378cb1

        SHA512

        2fd8ad160c5f16bdcc1af2f1d55d4f8d40ecf3690ea3a8e557fded518e56b79d1ce5bc3c09f0de75f9d44a2d2d048eacc922fcdb43ca673a031ac193e2e4ef0d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7846.exe

        Filesize

        326KB

        MD5

        e8946364ecac8e8730b477a15c6ac5ea

        SHA1

        57a6736f0d8b444fd953a2ed1f49fd6708d6be43

        SHA256

        c37d06f2145761a8ee137e9d4d9d7ef4698c70fcf685ad3ca55bebfb4a378cb1

        SHA512

        2fd8ad160c5f16bdcc1af2f1d55d4f8d40ecf3690ea3a8e557fded518e56b79d1ce5bc3c09f0de75f9d44a2d2d048eacc922fcdb43ca673a031ac193e2e4ef0d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8138.exe

        Filesize

        384KB

        MD5

        fcf17f0aa68e9ea4322a1616d8344041

        SHA1

        4506d219fca97fb46354f2d2ba1e6ab58cf8970e

        SHA256

        329550f7030c607f632933a66b8b25815dd21e26b48ad3d84bab0ae8809f1e32

        SHA512

        6a1ba4967972d1fb97457f5edfcb68597c37db4d2285d0527125bcec5cb94b0b267967440abee5127338bdd7260308c87ea6ed802c18ca8941cab0c5a6695002

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8138.exe

        Filesize

        384KB

        MD5

        fcf17f0aa68e9ea4322a1616d8344041

        SHA1

        4506d219fca97fb46354f2d2ba1e6ab58cf8970e

        SHA256

        329550f7030c607f632933a66b8b25815dd21e26b48ad3d84bab0ae8809f1e32

        SHA512

        6a1ba4967972d1fb97457f5edfcb68597c37db4d2285d0527125bcec5cb94b0b267967440abee5127338bdd7260308c87ea6ed802c18ca8941cab0c5a6695002

      • memory/1696-1102-0x0000000008070000-0x000000000817A000-memory.dmp

        Filesize

        1.0MB

      • memory/1696-1101-0x00000000079D0000-0x0000000007FE8000-memory.dmp

        Filesize

        6.1MB

      • memory/1696-216-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-214-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-200-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-202-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-1115-0x0000000008DA0000-0x0000000008F62000-memory.dmp

        Filesize

        1.8MB

      • memory/1696-1114-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-1113-0x0000000008D10000-0x0000000008D60000-memory.dmp

        Filesize

        320KB

      • memory/1696-1112-0x0000000008C80000-0x0000000008CF6000-memory.dmp

        Filesize

        472KB

      • memory/1696-204-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-1111-0x0000000008560000-0x00000000085C6000-memory.dmp

        Filesize

        408KB

      • memory/1696-1110-0x00000000084C0000-0x0000000008552000-memory.dmp

        Filesize

        584KB

      • memory/1696-1109-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-1108-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-1107-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-1105-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-1104-0x00000000081D0000-0x000000000820C000-memory.dmp

        Filesize

        240KB

      • memory/1696-1103-0x00000000081B0000-0x00000000081C2000-memory.dmp

        Filesize

        72KB

      • memory/1696-218-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-228-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-226-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-224-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-192-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-191-0x0000000002C60000-0x0000000002CAB000-memory.dmp

        Filesize

        300KB

      • memory/1696-193-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-194-0x0000000007250000-0x0000000007260000-memory.dmp

        Filesize

        64KB

      • memory/1696-198-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-195-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-196-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-222-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-1116-0x0000000008F70000-0x000000000949C000-memory.dmp

        Filesize

        5.2MB

      • memory/1696-220-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-206-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-208-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-210-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/1696-212-0x0000000007850000-0x000000000788F000-memory.dmp

        Filesize

        252KB

      • memory/3896-1122-0x0000000000430000-0x0000000000462000-memory.dmp

        Filesize

        200KB

      • memory/3896-1123-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/5064-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/5064-170-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

        Filesize

        180KB

      • memory/5064-151-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/5064-152-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/5064-186-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/5064-184-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/5064-150-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/5064-183-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/5064-182-0x00000000073C0000-0x00000000073D0000-memory.dmp

        Filesize

        64KB

      • memory/5064-153-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-180-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-178-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-176-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-174-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-172-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-168-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-166-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-164-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-162-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-160-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-149-0x00000000073D0000-0x0000000007974000-memory.dmp

        Filesize

        5.6MB

      • memory/5064-158-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-156-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB

      • memory/5064-154-0x0000000004960000-0x0000000004972000-memory.dmp

        Filesize

        72KB