Analysis

  • max time kernel
    146s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 17:42

General

  • Target

    009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe

  • Size

    643KB

  • MD5

    29858890051ad74ed52b303195ff9f21

  • SHA1

    67b2ebdbe72ef72d92623994c8e10f020723b46e

  • SHA256

    009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e

  • SHA512

    70e8649db5b4f5491a15d95935fb17149b63d1cdf6288ae61dc15b3224a5d4496ae2d952f59306f385395af9aab209eb9a015fa6ba3c99f04fd05c3830deee6c

  • SSDEEP

    12288:iMrny90Fr91Rz9HLgrhYa/R8AlyQbxmo6Jb/BiZnN4b8YmZS5cs:lykjL0Lp8PMKJ1EnNwFmZSis

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe
    "C:\Users\Admin\AppData\Local\Temp\009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7985417.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7985417.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9156487.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9156487.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4284535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4284535.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6095783.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6095783.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 620
        3⤵
        • Program crash
        PID:4832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 712
        3⤵
        • Program crash
        PID:4316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 840
        3⤵
        • Program crash
        PID:4928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 848
        3⤵
        • Program crash
        PID:2588
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 876
        3⤵
        • Program crash
        PID:4700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 840
        3⤵
        • Program crash
        PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1124
        3⤵
        • Program crash
        PID:3516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1156
        3⤵
        • Program crash
        PID:812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1144
        3⤵
        • Program crash
        PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6095783.exe

    Filesize

    271KB

    MD5

    d48b7d2aae5539fd75a388c79d9bc9eb

    SHA1

    d841865b426e503ed1e7e1f2f564c16344d2b8a8

    SHA256

    d07c631a6c5db5a2e17f8d382a3f1b143f86e28c27e019530293abb87a73a9e7

    SHA512

    3e852fdf9c923895d3229a93999b1ab5051cbad12aa224cfefa4cdc99ee05ffe754684f1ac2d4834b54a6535164bb47262e9e26f54b02191f3239e1372c9f4aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6095783.exe

    Filesize

    271KB

    MD5

    d48b7d2aae5539fd75a388c79d9bc9eb

    SHA1

    d841865b426e503ed1e7e1f2f564c16344d2b8a8

    SHA256

    d07c631a6c5db5a2e17f8d382a3f1b143f86e28c27e019530293abb87a73a9e7

    SHA512

    3e852fdf9c923895d3229a93999b1ab5051cbad12aa224cfefa4cdc99ee05ffe754684f1ac2d4834b54a6535164bb47262e9e26f54b02191f3239e1372c9f4aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7985417.exe

    Filesize

    383KB

    MD5

    5d2b318a0d9992bb58d8dc7090c5a26b

    SHA1

    3496f2dad79c1035a84d5362c72ed91b0d22bf02

    SHA256

    020d3dc25038d6c3ab0c237c4be2c533885fc4e105aaf657d90f93da471c7f7a

    SHA512

    c6a50184553565a49099c09afbe6769c8265fb3dab73225daec90fb942ffef273893fcd57b56bb14e0dc179774cd709ad250ab2278ad92ff38f67e1d37f8790f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7985417.exe

    Filesize

    383KB

    MD5

    5d2b318a0d9992bb58d8dc7090c5a26b

    SHA1

    3496f2dad79c1035a84d5362c72ed91b0d22bf02

    SHA256

    020d3dc25038d6c3ab0c237c4be2c533885fc4e105aaf657d90f93da471c7f7a

    SHA512

    c6a50184553565a49099c09afbe6769c8265fb3dab73225daec90fb942ffef273893fcd57b56bb14e0dc179774cd709ad250ab2278ad92ff38f67e1d37f8790f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9156487.exe

    Filesize

    168KB

    MD5

    4fe8d66c297eb2f59a08afa04721c48a

    SHA1

    44d7b6d8f22b87ebad7af7eb6b814fc9c4e49313

    SHA256

    52dae3ad409cba892826cf298c4907f6554c83d8d70433f0ede559d01ae365ef

    SHA512

    ffe300b0b39c92f06b6bd45a3a0fa1e106a95690fc944e975cfa4560130270692744bf132adac3db23e0966c800061927e77d74a6ef89807cfef00d99eadbeb4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9156487.exe

    Filesize

    168KB

    MD5

    4fe8d66c297eb2f59a08afa04721c48a

    SHA1

    44d7b6d8f22b87ebad7af7eb6b814fc9c4e49313

    SHA256

    52dae3ad409cba892826cf298c4907f6554c83d8d70433f0ede559d01ae365ef

    SHA512

    ffe300b0b39c92f06b6bd45a3a0fa1e106a95690fc944e975cfa4560130270692744bf132adac3db23e0966c800061927e77d74a6ef89807cfef00d99eadbeb4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4284535.exe

    Filesize

    291KB

    MD5

    a0eee3fb123cfe4cdac09ec33c61a4d5

    SHA1

    de76d87177bec3be716f6168b024575b2f97cd02

    SHA256

    1a45c3bbc4c93ed02eb68062bd99c7b03f6c7ff77523e8c90abd62b078336ffd

    SHA512

    62c03fe5179f8a332f85d2f5e57d953e31d17f85001e6760f151bb37c4e8ea2dc824c94cb37acf9ce332fb6da5f48377219ae14820b092c9357ed52338cb66b0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4284535.exe

    Filesize

    291KB

    MD5

    a0eee3fb123cfe4cdac09ec33c61a4d5

    SHA1

    de76d87177bec3be716f6168b024575b2f97cd02

    SHA256

    1a45c3bbc4c93ed02eb68062bd99c7b03f6c7ff77523e8c90abd62b078336ffd

    SHA512

    62c03fe5179f8a332f85d2f5e57d953e31d17f85001e6760f151bb37c4e8ea2dc824c94cb37acf9ce332fb6da5f48377219ae14820b092c9357ed52338cb66b0

  • memory/2664-139-0x0000000005900000-0x0000000005912000-memory.dmp

    Filesize

    72KB

  • memory/2664-144-0x000000000B130000-0x000000000B1C2000-memory.dmp

    Filesize

    584KB

  • memory/2664-137-0x000000000B310000-0x000000000B916000-memory.dmp

    Filesize

    6.0MB

  • memory/2664-138-0x000000000AE10000-0x000000000AF1A000-memory.dmp

    Filesize

    1.0MB

  • memory/2664-135-0x0000000000F60000-0x0000000000F90000-memory.dmp

    Filesize

    192KB

  • memory/2664-140-0x000000000AD00000-0x000000000AD3E000-memory.dmp

    Filesize

    248KB

  • memory/2664-141-0x0000000005970000-0x0000000005980000-memory.dmp

    Filesize

    64KB

  • memory/2664-142-0x000000000AD40000-0x000000000AD8B000-memory.dmp

    Filesize

    300KB

  • memory/2664-143-0x000000000B010000-0x000000000B086000-memory.dmp

    Filesize

    472KB

  • memory/2664-136-0x00000000018D0000-0x00000000018D6000-memory.dmp

    Filesize

    24KB

  • memory/2664-145-0x000000000B090000-0x000000000B0F6000-memory.dmp

    Filesize

    408KB

  • memory/2664-146-0x000000000C120000-0x000000000C61E000-memory.dmp

    Filesize

    5.0MB

  • memory/2664-147-0x000000000BE80000-0x000000000C042000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-148-0x000000000CB50000-0x000000000D07C000-memory.dmp

    Filesize

    5.2MB

  • memory/2664-149-0x000000000BE30000-0x000000000BE80000-memory.dmp

    Filesize

    320KB

  • memory/3756-199-0x0000000000800000-0x0000000000835000-memory.dmp

    Filesize

    212KB

  • memory/3756-200-0x0000000000400000-0x00000000006C3000-memory.dmp

    Filesize

    2.8MB

  • memory/4636-155-0x00000000021F0000-0x000000000220A000-memory.dmp

    Filesize

    104KB

  • memory/4636-176-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-158-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/4636-159-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/4636-160-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/4636-161-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-162-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-164-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-166-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-168-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-170-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-172-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-174-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-157-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4636-178-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-180-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-182-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-184-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-186-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-188-0x0000000002400000-0x0000000002412000-memory.dmp

    Filesize

    72KB

  • memory/4636-189-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/4636-190-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/4636-156-0x0000000002400000-0x0000000002418000-memory.dmp

    Filesize

    96KB

  • memory/4636-191-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/4636-193-0x0000000004AF0000-0x0000000004B00000-memory.dmp

    Filesize

    64KB

  • memory/4636-194-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB