Analysis

  • max time kernel
    144s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 17:45

General

  • Target

    f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe

  • Size

    567KB

  • MD5

    99daf4300b4c86edaba87d1016401224

  • SHA1

    c0b7ab8d387881b3a273e5a3d14ec1eab718046b

  • SHA256

    f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e

  • SHA512

    2f31d3028cb47090a6cd340f685badbf58b9913c1446e5a98d5d67628d5392bd11f6fab5f4bc4931519dd97ea4e51a5c1abbea14a6b16144410503c822d7e18f

  • SSDEEP

    12288:6Mr3y90LhdGp2smzGncldwvT9ARTx8SRMDcEgLT:1y0hd9NKcldOTwPMY9T

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe
    "C:\Users\Admin\AppData\Local\Temp\f444cc75ecc83b4a51efb524a7ef9c08767f5347b6974d287d3c348a039a531e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1874770.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1874770.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6112013.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6112013.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6810198.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6810198.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6777217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6777217.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 620
        3⤵
        • Program crash
        PID:4672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 700
        3⤵
        • Program crash
        PID:1076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 840
        3⤵
        • Program crash
        PID:4788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 880
        3⤵
        • Program crash
        PID:4808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 868
        3⤵
        • Program crash
        PID:2136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 892
        3⤵
        • Program crash
        PID:3860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 1120
        3⤵
        • Program crash
        PID:4540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 1152
        3⤵
        • Program crash
        PID:2756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 1160
        3⤵
        • Program crash
        PID:760

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6777217.exe

          Filesize

          271KB

          MD5

          79fc672a1483d585f917bb4a780ae011

          SHA1

          d3ee383f4660af7896a7b918cc5049397168d54c

          SHA256

          6f6ccf5217262c28391bfedee6806f01dd0310cb9292f24863eb94c717312706

          SHA512

          fa479321bd52961052943675139c5ed7de7acecd264dd44cab3b2f93da52f94cc138002cb1f21b7e9c08a3ead32921231da80fd259530fc67dc07cdfff178149

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6777217.exe

          Filesize

          271KB

          MD5

          79fc672a1483d585f917bb4a780ae011

          SHA1

          d3ee383f4660af7896a7b918cc5049397168d54c

          SHA256

          6f6ccf5217262c28391bfedee6806f01dd0310cb9292f24863eb94c717312706

          SHA512

          fa479321bd52961052943675139c5ed7de7acecd264dd44cab3b2f93da52f94cc138002cb1f21b7e9c08a3ead32921231da80fd259530fc67dc07cdfff178149

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1874770.exe

          Filesize

          307KB

          MD5

          454907a35ecb8ca556196286a993f4d4

          SHA1

          50f2b36d908e3b874f399882c47a45b6f9a23997

          SHA256

          59ba74f06965847d6840efe3684134725260a3fd961f291fcf0d23dc98b95fa6

          SHA512

          6e62c9ef1543796f8fad3d2b1045f3be16157719bba3c5a76cdb72a0b277a5671567efe96563410492343772726e0e0ffb552658519f7de831b86bea5b2b5d5e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1874770.exe

          Filesize

          307KB

          MD5

          454907a35ecb8ca556196286a993f4d4

          SHA1

          50f2b36d908e3b874f399882c47a45b6f9a23997

          SHA256

          59ba74f06965847d6840efe3684134725260a3fd961f291fcf0d23dc98b95fa6

          SHA512

          6e62c9ef1543796f8fad3d2b1045f3be16157719bba3c5a76cdb72a0b277a5671567efe96563410492343772726e0e0ffb552658519f7de831b86bea5b2b5d5e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6112013.exe

          Filesize

          168KB

          MD5

          ec918872d78cad1b782b37fb5e4ecb39

          SHA1

          db7d00430f9228e57b1e64acef91a0712f00d9b6

          SHA256

          e2e222aa8f2b683d2646d2942f965e800d30e3ba04c2fa6a2a14b37135279318

          SHA512

          badbefd92f2b190d4c219124d78d50d0d70f845af49b7d934a97502263dab072b4f481439d7285c31f6e595d4a175e9deb220ac9c8e1655546a502559d2fa6ec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6112013.exe

          Filesize

          168KB

          MD5

          ec918872d78cad1b782b37fb5e4ecb39

          SHA1

          db7d00430f9228e57b1e64acef91a0712f00d9b6

          SHA256

          e2e222aa8f2b683d2646d2942f965e800d30e3ba04c2fa6a2a14b37135279318

          SHA512

          badbefd92f2b190d4c219124d78d50d0d70f845af49b7d934a97502263dab072b4f481439d7285c31f6e595d4a175e9deb220ac9c8e1655546a502559d2fa6ec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6810198.exe

          Filesize

          177KB

          MD5

          d15972a5611924ada84f1587f182514e

          SHA1

          086790c6815593d7efe74ca0c887d39a88a0729b

          SHA256

          182ccde60c380acb150a690a256724091c2d33cfb6bea2b0532e081e6594a300

          SHA512

          cfd75e7521f2d2864ea1f0ced4f61dc098884bc36ada51b44a56d45f223c8fdf90d161e53a08555b5139f7163659f3a2b659eb5986cd69b0f0ed374a2354d64d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6810198.exe

          Filesize

          177KB

          MD5

          d15972a5611924ada84f1587f182514e

          SHA1

          086790c6815593d7efe74ca0c887d39a88a0729b

          SHA256

          182ccde60c380acb150a690a256724091c2d33cfb6bea2b0532e081e6594a300

          SHA512

          cfd75e7521f2d2864ea1f0ced4f61dc098884bc36ada51b44a56d45f223c8fdf90d161e53a08555b5139f7163659f3a2b659eb5986cd69b0f0ed374a2354d64d

        • memory/2580-143-0x0000000004DF0000-0x0000000004E66000-memory.dmp

          Filesize

          472KB

        • memory/2580-148-0x0000000005F70000-0x0000000006132000-memory.dmp

          Filesize

          1.8MB

        • memory/2580-141-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

          Filesize

          248KB

        • memory/2580-142-0x0000000004B20000-0x0000000004B6B000-memory.dmp

          Filesize

          300KB

        • memory/2580-139-0x00000000023D0000-0x00000000023E2000-memory.dmp

          Filesize

          72KB

        • memory/2580-144-0x0000000004F10000-0x0000000004FA2000-memory.dmp

          Filesize

          584KB

        • memory/2580-145-0x0000000004E70000-0x0000000004ED6000-memory.dmp

          Filesize

          408KB

        • memory/2580-146-0x0000000006150000-0x000000000664E000-memory.dmp

          Filesize

          5.0MB

        • memory/2580-147-0x0000000005D50000-0x0000000005DA0000-memory.dmp

          Filesize

          320KB

        • memory/2580-140-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2580-149-0x0000000007EA0000-0x00000000083CC000-memory.dmp

          Filesize

          5.2MB

        • memory/2580-150-0x0000000004B10000-0x0000000004B20000-memory.dmp

          Filesize

          64KB

        • memory/2580-138-0x0000000004C30000-0x0000000004D3A000-memory.dmp

          Filesize

          1.0MB

        • memory/2580-137-0x0000000005130000-0x0000000005736000-memory.dmp

          Filesize

          6.0MB

        • memory/2580-135-0x0000000000160000-0x0000000000190000-memory.dmp

          Filesize

          192KB

        • memory/2580-136-0x00000000008A0000-0x00000000008A6000-memory.dmp

          Filesize

          24KB

        • memory/3012-196-0x00000000006D0000-0x0000000000705000-memory.dmp

          Filesize

          212KB

        • memory/3012-197-0x0000000000400000-0x00000000006C3000-memory.dmp

          Filesize

          2.8MB

        • memory/4224-158-0x0000000002560000-0x0000000002570000-memory.dmp

          Filesize

          64KB

        • memory/4224-160-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-161-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-163-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-167-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-165-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-169-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-171-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-173-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-175-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-177-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-179-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-181-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-183-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-185-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-187-0x0000000004E20000-0x0000000004E32000-memory.dmp

          Filesize

          72KB

        • memory/4224-188-0x0000000002560000-0x0000000002570000-memory.dmp

          Filesize

          64KB

        • memory/4224-189-0x0000000002560000-0x0000000002570000-memory.dmp

          Filesize

          64KB

        • memory/4224-190-0x0000000002560000-0x0000000002570000-memory.dmp

          Filesize

          64KB

        • memory/4224-159-0x0000000002560000-0x0000000002570000-memory.dmp

          Filesize

          64KB

        • memory/4224-156-0x0000000002560000-0x0000000002570000-memory.dmp

          Filesize

          64KB

        • memory/4224-157-0x0000000004E20000-0x0000000004E38000-memory.dmp

          Filesize

          96KB

        • memory/4224-155-0x0000000002530000-0x000000000254A000-memory.dmp

          Filesize

          104KB