Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2023, 07:44

General

  • Target

    6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe

  • Size

    849KB

  • MD5

    00fef243108a8b82413db2561578cae4

  • SHA1

    20ce8e4a9cfaaad8f006902bf02f48fea066e7db

  • SHA256

    6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65

  • SHA512

    310159c5cf7bb2e33d3885daa67b184a54fc7d206b91205f6aff4406afaacb21a8b26d3727563bf0b0b3341db70064fb6621cfd78c34b01e237f0fae25dbfcf1

  • SSDEEP

    24576:4yw7e1KyMgHygNOPTOODBY3GXZOwKRqfM4l:/pQaHyhdYAX

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dante

C2

185.161.248.73:4164

Attributes
  • auth_value

    f4066af6b8a6f23125c8ee48288a3f90

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe
    "C:\Users\Admin\AppData\Local\Temp\6e29abe52375408e42c3a9cb9ff421d22872e51983c6dff59788ae0e09b29b65.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48409278.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48409278.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p17687719.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p17687719.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1528
          4⤵
          • Program crash
          PID:1844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91556505.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91556505.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s06020330.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s06020330.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1080
        3⤵
        • Program crash
        PID:3236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1288 -ip 1288
    1⤵
      PID:1996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5008 -ip 5008
      1⤵
        PID:1544

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s06020330.exe

              Filesize

              294KB

              MD5

              1de90774a36d9b52369e89cb23a06ffb

              SHA1

              158dfaf81687b55a0375369d07a3f266978e9fce

              SHA256

              068f8fce5f14532ca0886bae6506c39970ff6f5d470237ba1233353c0e6569b4

              SHA512

              ed982f45cff1c27b9aad2071087f0d9a9083ae63f62e49a9f462a1479b478957ec370997dd6bc1e4f7147bc0bf8b3922535fcbfc0e30a4cd1b7d53694337cd37

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s06020330.exe

              Filesize

              294KB

              MD5

              1de90774a36d9b52369e89cb23a06ffb

              SHA1

              158dfaf81687b55a0375369d07a3f266978e9fce

              SHA256

              068f8fce5f14532ca0886bae6506c39970ff6f5d470237ba1233353c0e6569b4

              SHA512

              ed982f45cff1c27b9aad2071087f0d9a9083ae63f62e49a9f462a1479b478957ec370997dd6bc1e4f7147bc0bf8b3922535fcbfc0e30a4cd1b7d53694337cd37

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48409278.exe

              Filesize

              569KB

              MD5

              06785247019760d7f86bb5e4deea4400

              SHA1

              56a8483361016750b4bc05bc9dd561e8ae877620

              SHA256

              a84e857c1370c1e721102be5863e655a05c4c8aa8ef09f5133654e064eff3dfe

              SHA512

              f78be0203b765147bb110ddad2dd102f2565832ba07e089ae469f6c988d5b4eacf50535f6818aa19f02a186f87e20e860b4cb6d4b3fea646852ff58a354456d4

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y48409278.exe

              Filesize

              569KB

              MD5

              06785247019760d7f86bb5e4deea4400

              SHA1

              56a8483361016750b4bc05bc9dd561e8ae877620

              SHA256

              a84e857c1370c1e721102be5863e655a05c4c8aa8ef09f5133654e064eff3dfe

              SHA512

              f78be0203b765147bb110ddad2dd102f2565832ba07e089ae469f6c988d5b4eacf50535f6818aa19f02a186f87e20e860b4cb6d4b3fea646852ff58a354456d4

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p17687719.exe

              Filesize

              479KB

              MD5

              6801d2d22a9762428ffa87af84370a1e

              SHA1

              228bfcf90ae47353809051c595bd964bf4b3542a

              SHA256

              2d626212794b7b33ef493611506839c4e4db04cef6f77150f5853e2f44abcfa6

              SHA512

              bf6a7ab4e32a16d5f5a7117a37a5c1c0d9efcd48b056d0267752dafb6fefc428718efafb71454299039b6d488f8229835f5f1455c68d7d8c44c92271d7913172

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p17687719.exe

              Filesize

              479KB

              MD5

              6801d2d22a9762428ffa87af84370a1e

              SHA1

              228bfcf90ae47353809051c595bd964bf4b3542a

              SHA256

              2d626212794b7b33ef493611506839c4e4db04cef6f77150f5853e2f44abcfa6

              SHA512

              bf6a7ab4e32a16d5f5a7117a37a5c1c0d9efcd48b056d0267752dafb6fefc428718efafb71454299039b6d488f8229835f5f1455c68d7d8c44c92271d7913172

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91556505.exe

              Filesize

              169KB

              MD5

              19fbe6da5616752a9597cc1172374f9c

              SHA1

              46554141a875d93cbb905cb18bdef76acad0d6dc

              SHA256

              6b37f5630a8eb4f1cf9000c8a2b801f8d4ea32c0ca8d17ac5e98e00811d9ccb5

              SHA512

              60bc1cd75773401631b74779b2bd6009f4d6ba76c91ec0de2bbee0cbb8eda1a45d3f0b9c2af3f04bd8121e6ca4d449134e92450d377be5f47d149989ca34e316

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r91556505.exe

              Filesize

              169KB

              MD5

              19fbe6da5616752a9597cc1172374f9c

              SHA1

              46554141a875d93cbb905cb18bdef76acad0d6dc

              SHA256

              6b37f5630a8eb4f1cf9000c8a2b801f8d4ea32c0ca8d17ac5e98e00811d9ccb5

              SHA512

              60bc1cd75773401631b74779b2bd6009f4d6ba76c91ec0de2bbee0cbb8eda1a45d3f0b9c2af3f04bd8121e6ca4d449134e92450d377be5f47d149989ca34e316

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • C:\Windows\Temp\1.exe

              Filesize

              168KB

              MD5

              f16fb63d4e551d3808e8f01f2671b57e

              SHA1

              781153ad6235a1152da112de1fb39a6f2d063575

              SHA256

              8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

              SHA512

              fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

            • memory/1288-204-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-214-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-164-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-167-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-165-0x00000000007D0000-0x000000000082B000-memory.dmp

              Filesize

              364KB

            • memory/1288-168-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1288-170-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1288-171-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-173-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1288-176-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-178-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-174-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-180-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-182-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-184-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-186-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-188-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-190-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-192-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-194-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-196-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-198-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-206-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-160-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-202-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-200-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-208-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-210-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-212-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-162-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-216-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-158-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-156-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-154-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-148-0x0000000004E70000-0x0000000005414000-memory.dmp

              Filesize

              5.6MB

            • memory/1288-2312-0x0000000004E60000-0x0000000004E70000-memory.dmp

              Filesize

              64KB

            • memory/1288-149-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-150-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1288-152-0x0000000005420000-0x0000000005480000-memory.dmp

              Filesize

              384KB

            • memory/1476-2313-0x0000000005280000-0x0000000005898000-memory.dmp

              Filesize

              6.1MB

            • memory/1476-2311-0x00000000002D0000-0x00000000002FE000-memory.dmp

              Filesize

              184KB

            • memory/1476-2315-0x0000000004B10000-0x0000000004B22000-memory.dmp

              Filesize

              72KB

            • memory/1476-2314-0x0000000004D70000-0x0000000004E7A000-memory.dmp

              Filesize

              1.0MB

            • memory/1476-2327-0x00000000058A0000-0x0000000005906000-memory.dmp

              Filesize

              408KB

            • memory/1476-2316-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

              Filesize

              240KB

            • memory/1476-2325-0x0000000004F90000-0x0000000005006000-memory.dmp

              Filesize

              472KB

            • memory/1476-2326-0x00000000050B0000-0x0000000005142000-memory.dmp

              Filesize

              584KB

            • memory/1476-2318-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/1476-2329-0x0000000008510000-0x0000000008A3C000-memory.dmp

              Filesize

              5.2MB

            • memory/1476-2328-0x0000000005F80000-0x0000000006142000-memory.dmp

              Filesize

              1.8MB

            • memory/4444-2330-0x0000000005CE0000-0x0000000005D30000-memory.dmp

              Filesize

              320KB

            • memory/4444-2324-0x0000000004A50000-0x0000000004A60000-memory.dmp

              Filesize

              64KB

            • memory/4444-2323-0x0000000000180000-0x00000000001B0000-memory.dmp

              Filesize

              192KB

            • memory/5008-2365-0x00000000007A0000-0x00000000007CD000-memory.dmp

              Filesize

              180KB

            • memory/5008-2366-0x0000000004E00000-0x0000000004E10000-memory.dmp

              Filesize

              64KB

            • memory/5008-2367-0x0000000004E00000-0x0000000004E10000-memory.dmp

              Filesize

              64KB

            • memory/5008-2368-0x0000000004E00000-0x0000000004E10000-memory.dmp

              Filesize

              64KB