Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 19:26

General

  • Target

    fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985.exe

  • Size

    781KB

  • MD5

    8775139de783151827b9809b7d02ef5d

  • SHA1

    dc418295992dcebb28b77c6d73431ae85eaae614

  • SHA256

    fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985

  • SHA512

    c07182e2e1200cb6e30489136d8f17c115e4bb102dcd393ff66ff0a8a4c4440442db5f2583babf387739efd244433d72fde1732b095e5c54cfd80ee5ff942f08

  • SSDEEP

    24576:tyO01DymUlO9DShS/oE4EL34gZSfT7xnH57:IBDymUuJL3lWT

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985.exe
    "C:\Users\Admin\AppData\Local\Temp\fc3162ef6623fbe674d2bd9b434261da830a199c55674f2b73b2986054a27985.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 1368
          4⤵
          • Program crash
          PID:388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4212 -ip 4212
    1⤵
      PID:4732

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe

      Filesize

      177KB

      MD5

      e5a6c2e51c88c34329468d35843130da

      SHA1

      7b3f5d4f9e21eda2ebb8315bb4af15c88edec39b

      SHA256

      717e81d764366a82c780a7dfc0031326cd32dbc7885f973777f28ac46c59cb15

      SHA512

      3f5361a92b0be08f362153d9509bd90c65699c5748b4f8d6c018f272245805137b00e2aebdbc6475b9f4c2c75e7bfee0695fda9cfc25fc77fff89810788b3a88

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o14030097.exe

      Filesize

      177KB

      MD5

      e5a6c2e51c88c34329468d35843130da

      SHA1

      7b3f5d4f9e21eda2ebb8315bb4af15c88edec39b

      SHA256

      717e81d764366a82c780a7dfc0031326cd32dbc7885f973777f28ac46c59cb15

      SHA512

      3f5361a92b0be08f362153d9509bd90c65699c5748b4f8d6c018f272245805137b00e2aebdbc6475b9f4c2c75e7bfee0695fda9cfc25fc77fff89810788b3a88

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe

      Filesize

      576KB

      MD5

      e92a4070bf4d5fc8b73921275539d270

      SHA1

      85a79b4b0f929a8f28e6992a4428d08af5b4c9fb

      SHA256

      176c5fac8ed5d5672d51402c5f26270d6eb42fda621b8ff4f0d779693ba9e95c

      SHA512

      0b4ddbfadae7345462ce2df638f7f1375498ca2ece83d4fd1de115041855433520192b216f415235d82cc5a9d8c5ff12ab62161931310160aff756a6358c3ab4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x98249521.exe

      Filesize

      576KB

      MD5

      e92a4070bf4d5fc8b73921275539d270

      SHA1

      85a79b4b0f929a8f28e6992a4428d08af5b4c9fb

      SHA256

      176c5fac8ed5d5672d51402c5f26270d6eb42fda621b8ff4f0d779693ba9e95c

      SHA512

      0b4ddbfadae7345462ce2df638f7f1375498ca2ece83d4fd1de115041855433520192b216f415235d82cc5a9d8c5ff12ab62161931310160aff756a6358c3ab4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

      Filesize

      574KB

      MD5

      3c53d43b4fbff190dfbcd1fde747dffb

      SHA1

      91bab36c550c9bccd69be5c14874a32de0036fd2

      SHA256

      5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

      SHA512

      2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m40166906.exe

      Filesize

      574KB

      MD5

      3c53d43b4fbff190dfbcd1fde747dffb

      SHA1

      91bab36c550c9bccd69be5c14874a32de0036fd2

      SHA256

      5bb4f17699598846667500cc92baf85b7f0f3c2aa5be9976f0b622faec287226

      SHA512

      2e56b69f1b2d865d0faba4e8cca88cc439121452550d22d1eb4674d4f3b08ee7f3b3bfe0a5089f444f2df8b6fea6051e7586626635b1aab48c4d5a15e26b12de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe

      Filesize

      171KB

      MD5

      c7afae88b68f0ab63143ee7c42c59ec7

      SHA1

      d4f5fc84cc8a7c53a37a08d36e845e6d98a12581

      SHA256

      aec3a2c637ff8f7f77dbf84cbadd62a76172aae3760e013811c517684b60fb9f

      SHA512

      9f6e5bfbbc12722d02ed42bbbd6500cf58bcc2eb361017b77b643d90e4d808a2f2dfa52742c7160ccd03891be934b777a55a0cdd2dd3f8c4407706af0ea78b47

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n78398376.exe

      Filesize

      171KB

      MD5

      c7afae88b68f0ab63143ee7c42c59ec7

      SHA1

      d4f5fc84cc8a7c53a37a08d36e845e6d98a12581

      SHA256

      aec3a2c637ff8f7f77dbf84cbadd62a76172aae3760e013811c517684b60fb9f

      SHA512

      9f6e5bfbbc12722d02ed42bbbd6500cf58bcc2eb361017b77b643d90e4d808a2f2dfa52742c7160ccd03891be934b777a55a0cdd2dd3f8c4407706af0ea78b47

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/1676-2327-0x0000000000660000-0x0000000000690000-memory.dmp

      Filesize

      192KB

    • memory/1676-2329-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

      Filesize

      64KB

    • memory/1676-2333-0x000000000B470000-0x000000000B4C0000-memory.dmp

      Filesize

      320KB

    • memory/3844-2370-0x0000000004A60000-0x0000000004A70000-memory.dmp

      Filesize

      64KB

    • memory/3844-2369-0x0000000004A60000-0x0000000004A70000-memory.dmp

      Filesize

      64KB

    • memory/3844-2373-0x0000000004A60000-0x0000000004A70000-memory.dmp

      Filesize

      64KB

    • memory/3844-2372-0x0000000004A60000-0x0000000004A70000-memory.dmp

      Filesize

      64KB

    • memory/3844-2371-0x0000000004A60000-0x0000000004A70000-memory.dmp

      Filesize

      64KB

    • memory/4124-2320-0x00000000053B0000-0x00000000053EC000-memory.dmp

      Filesize

      240KB

    • memory/4124-2335-0x0000000008AE0000-0x000000000900C000-memory.dmp

      Filesize

      5.2MB

    • memory/4124-2328-0x0000000005220000-0x0000000005230000-memory.dmp

      Filesize

      64KB

    • memory/4124-2334-0x0000000006730000-0x00000000068F2000-memory.dmp

      Filesize

      1.8MB

    • memory/4124-2331-0x0000000005F70000-0x0000000006002000-memory.dmp

      Filesize

      584KB

    • memory/4124-2319-0x0000000005220000-0x0000000005230000-memory.dmp

      Filesize

      64KB

    • memory/4124-2318-0x0000000005350000-0x0000000005362000-memory.dmp

      Filesize

      72KB

    • memory/4124-2317-0x0000000005440000-0x000000000554A000-memory.dmp

      Filesize

      1.0MB

    • memory/4124-2316-0x0000000005950000-0x0000000005F68000-memory.dmp

      Filesize

      6.1MB

    • memory/4124-2332-0x00000000058C0000-0x0000000005926000-memory.dmp

      Filesize

      408KB

    • memory/4124-2315-0x00000000008C0000-0x00000000008EE000-memory.dmp

      Filesize

      184KB

    • memory/4124-2330-0x00000000057C0000-0x0000000005836000-memory.dmp

      Filesize

      472KB

    • memory/4212-172-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-182-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-192-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-208-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-210-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-212-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-214-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-206-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-204-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-202-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-216-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-198-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-2308-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-2309-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-2310-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-200-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-196-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-190-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-186-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-188-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-184-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-194-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-178-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-2322-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-180-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-174-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-176-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-170-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-168-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-166-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-164-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-162-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-160-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-158-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-156-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-154-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-153-0x0000000005620000-0x0000000005680000-memory.dmp

      Filesize

      384KB

    • memory/4212-152-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-151-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-150-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/4212-149-0x0000000005010000-0x00000000055B4000-memory.dmp

      Filesize

      5.6MB

    • memory/4212-148-0x0000000000A10000-0x0000000000A6B000-memory.dmp

      Filesize

      364KB