Analysis

  • max time kernel
    125s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:44

General

  • Target

    b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe

  • Size

    890KB

  • MD5

    cf044ef6066b956c134c2a63c966e37f

  • SHA1

    3fa449b2ad158e12c02acc3a45099743b5ada59e

  • SHA256

    b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205

  • SHA512

    940a566da3ddd716d7d791cc401b73daa445b4c9500a3ada3a5bb0b0168ae80707dc85598cca0210fee21ae8648b71ca81556099ce59d40300779892d6718c32

  • SSDEEP

    12288:Dy90bFiw+5CLeGBwgMRlV4PFVRiY3CL9wwECiVI+bbLe2FDPYcS4+P84:Dy4fJXK4NVRiYCxwwE+q5SPX

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dork

C2

185.161.248.73:4164

Attributes
  • auth_value

    e81be7d6cfb453cc812e1b4890eeadad

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe
    "C:\Users\Admin\AppData\Local\Temp\b5cee56909b8f047ef65d508a0032122ef6a93ddfd1028d194d5109327b63205.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59910283.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59910283.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32262701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32262701.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5016
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1208
          4⤵
          • Program crash
          PID:3796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r98913897.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r98913897.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s15156005.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s15156005.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 1084
        3⤵
        • Program crash
        PID:2144
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5016 -ip 5016
    1⤵
      PID:1380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2556 -ip 2556
      1⤵
        PID:5060

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s15156005.exe

              Filesize

              344KB

              MD5

              2f69919137c52116cb8d726bbb9bfd39

              SHA1

              e7a7c86e937f89cf9d3acef2bc5bbc973ff99ab2

              SHA256

              35304551c82cc075060f00830fb72fe39a72a4593883c15c126e7e2b9edd5604

              SHA512

              e65344e581ec28662974a08d6dc615ee4bc782e922d1dd1146b7df6012b3d8a9991b135d8dfa192d40bbed8fd0aa9d33f3e60bfc0ac197d10094eddb73af8197

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s15156005.exe

              Filesize

              344KB

              MD5

              2f69919137c52116cb8d726bbb9bfd39

              SHA1

              e7a7c86e937f89cf9d3acef2bc5bbc973ff99ab2

              SHA256

              35304551c82cc075060f00830fb72fe39a72a4593883c15c126e7e2b9edd5604

              SHA512

              e65344e581ec28662974a08d6dc615ee4bc782e922d1dd1146b7df6012b3d8a9991b135d8dfa192d40bbed8fd0aa9d33f3e60bfc0ac197d10094eddb73af8197

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59910283.exe

              Filesize

              589KB

              MD5

              ec1ae64ed8c07c7d4a592d3ef9e47248

              SHA1

              b66f53a6e5974bf4d5ed717a443af102dafc6887

              SHA256

              4f084b69f0a8d68172dffce3be31ccfd1ce371e6c265a391311b610b8bb4da74

              SHA512

              6efcf8b99cb1617ef49324308aab04108f9300fd00e477be42c0fa24e1f3da8e423d563ccc06d9f977b520c859f188711ea4a236691a74110e40a41b7a555377

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y59910283.exe

              Filesize

              589KB

              MD5

              ec1ae64ed8c07c7d4a592d3ef9e47248

              SHA1

              b66f53a6e5974bf4d5ed717a443af102dafc6887

              SHA256

              4f084b69f0a8d68172dffce3be31ccfd1ce371e6c265a391311b610b8bb4da74

              SHA512

              6efcf8b99cb1617ef49324308aab04108f9300fd00e477be42c0fa24e1f3da8e423d563ccc06d9f977b520c859f188711ea4a236691a74110e40a41b7a555377

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32262701.exe

              Filesize

              529KB

              MD5

              0948641d2c61845175bd623c867b2b58

              SHA1

              e4c665103e887ffca17429ceec013a1cedc5a012

              SHA256

              ba55907607980fdea15d5232bdd340b4c5bad63f51cc2d48b0485c27a5fc3613

              SHA512

              f277c2e4d5354619b0a089fc989f070382a6ba6551db03012c480d0d255b516a2c8a649ae476711c4fd957309f917c7aed90d92143c68facaf2df2549b650555

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p32262701.exe

              Filesize

              529KB

              MD5

              0948641d2c61845175bd623c867b2b58

              SHA1

              e4c665103e887ffca17429ceec013a1cedc5a012

              SHA256

              ba55907607980fdea15d5232bdd340b4c5bad63f51cc2d48b0485c27a5fc3613

              SHA512

              f277c2e4d5354619b0a089fc989f070382a6ba6551db03012c480d0d255b516a2c8a649ae476711c4fd957309f917c7aed90d92143c68facaf2df2549b650555

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r98913897.exe

              Filesize

              169KB

              MD5

              f4b48b598b0faa46cf88ab742b7559c6

              SHA1

              4c35cedd0cfa542739bbf5f9f1fa0ab413fa947b

              SHA256

              ab0751837085be7f1f3c71a3e44f3afd9a43e543420ccdc2a9e89f35958e126f

              SHA512

              b75f0f463afb8fc1c5ff9ab133048ece746020caba5231c21de34b22e4c66bfefc80426eb6f8c94009cbaa0201431e136ac73c6b4e54a93e21198d8c8b6f852e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r98913897.exe

              Filesize

              169KB

              MD5

              f4b48b598b0faa46cf88ab742b7559c6

              SHA1

              4c35cedd0cfa542739bbf5f9f1fa0ab413fa947b

              SHA256

              ab0751837085be7f1f3c71a3e44f3afd9a43e543420ccdc2a9e89f35958e126f

              SHA512

              b75f0f463afb8fc1c5ff9ab133048ece746020caba5231c21de34b22e4c66bfefc80426eb6f8c94009cbaa0201431e136ac73c6b4e54a93e21198d8c8b6f852e

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • memory/1464-2325-0x00000000052E0000-0x00000000052F0000-memory.dmp

              Filesize

              64KB

            • memory/1464-2324-0x000000000A860000-0x000000000A872000-memory.dmp

              Filesize

              72KB

            • memory/1464-2323-0x000000000A930000-0x000000000AA3A000-memory.dmp

              Filesize

              1.0MB

            • memory/1464-2326-0x000000000A8C0000-0x000000000A8FC000-memory.dmp

              Filesize

              240KB

            • memory/1464-2339-0x00000000052E0000-0x00000000052F0000-memory.dmp

              Filesize

              64KB

            • memory/1464-2322-0x000000000ADB0000-0x000000000B3C8000-memory.dmp

              Filesize

              6.1MB

            • memory/1464-2314-0x0000000000AF0000-0x0000000000B1E000-memory.dmp

              Filesize

              184KB

            • memory/1464-2335-0x000000000AD20000-0x000000000AD86000-memory.dmp

              Filesize

              408KB

            • memory/1960-2337-0x0000000008E90000-0x00000000093BC000-memory.dmp

              Filesize

              5.2MB

            • memory/1960-2334-0x0000000005A30000-0x0000000005AC2000-memory.dmp

              Filesize

              584KB

            • memory/1960-2333-0x0000000005910000-0x0000000005986000-memory.dmp

              Filesize

              472KB

            • memory/1960-2332-0x00000000054D0000-0x00000000054E0000-memory.dmp

              Filesize

              64KB

            • memory/1960-2331-0x0000000000C50000-0x0000000000C80000-memory.dmp

              Filesize

              192KB

            • memory/1960-2336-0x0000000006900000-0x0000000006AC2000-memory.dmp

              Filesize

              1.8MB

            • memory/1960-2338-0x0000000006AD0000-0x0000000006B20000-memory.dmp

              Filesize

              320KB

            • memory/1960-2340-0x00000000054D0000-0x00000000054E0000-memory.dmp

              Filesize

              64KB

            • memory/2556-2347-0x00000000026A0000-0x00000000026CD000-memory.dmp

              Filesize

              180KB

            • memory/2556-2348-0x0000000005110000-0x0000000005120000-memory.dmp

              Filesize

              64KB

            • memory/2556-2349-0x0000000005110000-0x0000000005120000-memory.dmp

              Filesize

              64KB

            • memory/2556-2350-0x0000000005110000-0x0000000005120000-memory.dmp

              Filesize

              64KB

            • memory/2556-2380-0x0000000005110000-0x0000000005120000-memory.dmp

              Filesize

              64KB

            • memory/2556-2381-0x0000000005110000-0x0000000005120000-memory.dmp

              Filesize

              64KB

            • memory/2556-2382-0x0000000005110000-0x0000000005120000-memory.dmp

              Filesize

              64KB

            • memory/5016-172-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-186-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-206-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-208-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-210-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-212-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-214-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-202-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-200-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-2313-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-198-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-196-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-2316-0x0000000000C20000-0x0000000000C7B000-memory.dmp

              Filesize

              364KB

            • memory/5016-2317-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-2318-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-2319-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-2321-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-194-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-192-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-190-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-188-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-204-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-184-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-182-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-180-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-178-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-176-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-174-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-170-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-168-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-166-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-165-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-163-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/5016-162-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-160-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-158-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-154-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-156-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-153-0x0000000005790000-0x00000000057F0000-memory.dmp

              Filesize

              384KB

            • memory/5016-152-0x00000000051E0000-0x0000000005784000-memory.dmp

              Filesize

              5.6MB

            • memory/5016-151-0x0000000000400000-0x0000000000A95000-memory.dmp

              Filesize

              6.6MB

            • memory/5016-149-0x0000000000C20000-0x0000000000C7B000-memory.dmp

              Filesize

              364KB

            • memory/5016-148-0x0000000000400000-0x0000000000A95000-memory.dmp

              Filesize

              6.6MB