Analysis

  • max time kernel
    144s
  • max time network
    92s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 20:59

General

  • Target

    b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe

  • Size

    566KB

  • MD5

    3018e1b1a967b8b7dee26d6bccd2d479

  • SHA1

    b5579dac9d1a8ac7771660d98e35ff3095a3c101

  • SHA256

    b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa

  • SHA512

    6e837fd5e18dfa9bf82f6708b1dc9c23ca39eaad34ebf826bfbc5c5df3c6f0367c5a0ee3a07bacf21732c33b99fde158c975feca96bf4a4ad64175b9d95a7f97

  • SSDEEP

    12288:4Mrzy90GRqejk2BC/7ATDfSH1MyprE79IaLCNm8h725J:byrjk2BCkv6HFrs9I4I7yJ

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe
    "C:\Users\Admin\AppData\Local\Temp\b6edffb354a9ba86f3b231c852efa52e0d70e1c6344d5852137851e9d9c396aa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7726120.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7726120.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8961287.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8961287.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7352402.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7352402.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5035530.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5035530.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 616
        3⤵
        • Program crash
        PID:3728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 696
        3⤵
        • Program crash
        PID:4820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 800
        3⤵
        • Program crash
        PID:3052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 836
        3⤵
        • Program crash
        PID:60
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 872
        3⤵
        • Program crash
        PID:796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 880
        3⤵
        • Program crash
        PID:4372
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 1124
        3⤵
        • Program crash
        PID:4416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 1176
        3⤵
        • Program crash
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 1232
        3⤵
        • Program crash
        PID:4336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5035530.exe

    Filesize

    268KB

    MD5

    a4eb4e137792b30be6d940d42de0f60b

    SHA1

    032d66d7c7fa344500d60a94eef5c8bed10097b1

    SHA256

    239c3be17117f8f51c44b8f5f532902914308360a13a71e6107f82b3eb375406

    SHA512

    c2fe547fe386d13ea2ed9154ca7521d2608c57c45b7d8cfbdf8845fb92b89c918f04ae21b703cb663c71a9645dae19828ac44d2f68ff43d675909dbda710d485

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5035530.exe

    Filesize

    268KB

    MD5

    a4eb4e137792b30be6d940d42de0f60b

    SHA1

    032d66d7c7fa344500d60a94eef5c8bed10097b1

    SHA256

    239c3be17117f8f51c44b8f5f532902914308360a13a71e6107f82b3eb375406

    SHA512

    c2fe547fe386d13ea2ed9154ca7521d2608c57c45b7d8cfbdf8845fb92b89c918f04ae21b703cb663c71a9645dae19828ac44d2f68ff43d675909dbda710d485

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7726120.exe

    Filesize

    307KB

    MD5

    f2070eeeea1abf39df1d33b58fe9e08d

    SHA1

    2906ca832dcb9872ca9ace5df0aa169046ce0914

    SHA256

    1a50e0125188669d086effe741fc9d31658aab155c8e5569bc13225c29b5c1f7

    SHA512

    0d3f5d2be53195e9159bb2d8b235568909c438a044fe7a72c61a065966e15622e8a1fcc1ead51355fda21feab45f0850ff23152587219dfe9cd8ac9b41a45c43

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7726120.exe

    Filesize

    307KB

    MD5

    f2070eeeea1abf39df1d33b58fe9e08d

    SHA1

    2906ca832dcb9872ca9ace5df0aa169046ce0914

    SHA256

    1a50e0125188669d086effe741fc9d31658aab155c8e5569bc13225c29b5c1f7

    SHA512

    0d3f5d2be53195e9159bb2d8b235568909c438a044fe7a72c61a065966e15622e8a1fcc1ead51355fda21feab45f0850ff23152587219dfe9cd8ac9b41a45c43

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8961287.exe

    Filesize

    168KB

    MD5

    615c4d3fc81e66018298444d66df53a2

    SHA1

    1b6ff8670337f3df2bacf6aaa625b493ae7ec90e

    SHA256

    e5ce3b8c6d634181ad63d1c75d21053f1140753c45e609a1b1526c7d79fca03d

    SHA512

    3d3c18209422897c58ce6eddc99bdbcc4545b870070ef9bac1143cd6001e7e07cd69d1a3fad59243d5ec47838507abfada5c64d541caa4f0c4f4c3d3235e50f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8961287.exe

    Filesize

    168KB

    MD5

    615c4d3fc81e66018298444d66df53a2

    SHA1

    1b6ff8670337f3df2bacf6aaa625b493ae7ec90e

    SHA256

    e5ce3b8c6d634181ad63d1c75d21053f1140753c45e609a1b1526c7d79fca03d

    SHA512

    3d3c18209422897c58ce6eddc99bdbcc4545b870070ef9bac1143cd6001e7e07cd69d1a3fad59243d5ec47838507abfada5c64d541caa4f0c4f4c3d3235e50f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7352402.exe

    Filesize

    178KB

    MD5

    46caf90e940afa162c0c30a5e07934d5

    SHA1

    cf781e9a7e5b9f2a3f079a8392c838adc0c7a187

    SHA256

    6b950428b745a73b7ec23f170c990c2f32a3f0cdbc28d66b6d3d83c26f2a8ebd

    SHA512

    29f4b0ab42ef094c2b65e21e9af576c924a89a595016fa5b536f8524c7d70361182327b3b7b01fffb0391d8c8f88f81ca0ead736c8d570ea663b0774c7cf0223

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7352402.exe

    Filesize

    178KB

    MD5

    46caf90e940afa162c0c30a5e07934d5

    SHA1

    cf781e9a7e5b9f2a3f079a8392c838adc0c7a187

    SHA256

    6b950428b745a73b7ec23f170c990c2f32a3f0cdbc28d66b6d3d83c26f2a8ebd

    SHA512

    29f4b0ab42ef094c2b65e21e9af576c924a89a595016fa5b536f8524c7d70361182327b3b7b01fffb0391d8c8f88f81ca0ead736c8d570ea663b0774c7cf0223

  • memory/1088-177-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-183-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-190-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/1088-189-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/1088-188-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/1088-187-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-185-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-181-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-179-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-175-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-173-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-171-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-169-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-167-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-155-0x00000000021F0000-0x000000000220A000-memory.dmp

    Filesize

    104KB

  • memory/1088-156-0x00000000022B0000-0x00000000022C8000-memory.dmp

    Filesize

    96KB

  • memory/1088-157-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/1088-158-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/1088-159-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

    Filesize

    64KB

  • memory/1088-160-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-161-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-163-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/1088-165-0x00000000022B0000-0x00000000022C2000-memory.dmp

    Filesize

    72KB

  • memory/3788-196-0x00000000007A0000-0x00000000007D5000-memory.dmp

    Filesize

    212KB

  • memory/3788-197-0x0000000000400000-0x00000000006C4000-memory.dmp

    Filesize

    2.8MB

  • memory/4316-140-0x000000000A590000-0x000000000A5CE000-memory.dmp

    Filesize

    248KB

  • memory/4316-145-0x000000000B690000-0x000000000BB8E000-memory.dmp

    Filesize

    5.0MB

  • memory/4316-148-0x000000000BE60000-0x000000000C022000-memory.dmp

    Filesize

    1.8MB

  • memory/4316-137-0x000000000AB80000-0x000000000B186000-memory.dmp

    Filesize

    6.0MB

  • memory/4316-147-0x000000000B5F0000-0x000000000B640000-memory.dmp

    Filesize

    320KB

  • memory/4316-146-0x000000000AAA0000-0x000000000AB06000-memory.dmp

    Filesize

    408KB

  • memory/4316-138-0x000000000A680000-0x000000000A78A000-memory.dmp

    Filesize

    1.0MB

  • memory/4316-149-0x000000000C560000-0x000000000CA8C000-memory.dmp

    Filesize

    5.2MB

  • memory/4316-144-0x000000000AA00000-0x000000000AA92000-memory.dmp

    Filesize

    584KB

  • memory/4316-143-0x000000000A8E0000-0x000000000A956000-memory.dmp

    Filesize

    472KB

  • memory/4316-142-0x000000000A610000-0x000000000A65B000-memory.dmp

    Filesize

    300KB

  • memory/4316-141-0x00000000050E0000-0x00000000050F0000-memory.dmp

    Filesize

    64KB

  • memory/4316-136-0x0000000002A50000-0x0000000002A56000-memory.dmp

    Filesize

    24KB

  • memory/4316-135-0x0000000000830000-0x0000000000860000-memory.dmp

    Filesize

    192KB

  • memory/4316-150-0x00000000050E0000-0x00000000050F0000-memory.dmp

    Filesize

    64KB

  • memory/4316-139-0x000000000A570000-0x000000000A582000-memory.dmp

    Filesize

    72KB