Analysis

  • max time kernel
    146s
  • max time network
    94s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 07:48

General

  • Target

    be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe

  • Size

    1.5MB

  • MD5

    09561a100b1576f09fb7f518174bed05

  • SHA1

    5916ee531c7a10e4ec5e601695370a211d3d1c16

  • SHA256

    be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0

  • SHA512

    656515275c790f298aa8e9ccb158f28a3434777742bb7c30a727a8a964b22d86db555ce9fbd7ceadc688c3b2e2fc0c391be61ae2b6468c660a7909e99c57373c

  • SSDEEP

    49152:juLgpUVaEEo2fmX0FZDfQT9K1btlHOqnU:7pFEFymeDf7fHRU

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe
    "C:\Users\Admin\AppData\Local\Temp\be76a066b210baca199783fa8738a670e904db65263f726c3c160783fae708e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3875541.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3875541.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1864090.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1864090.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3094298.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3094298.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4824
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5794959.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5794959.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4904
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7035701.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7035701.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4948
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5506962.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5506962.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0710220.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0710220.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            PID:4416
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 624
              6⤵
              • Program crash
              PID:4376
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 704
              6⤵
              • Program crash
              PID:3080
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 844
              6⤵
              • Program crash
              PID:5000
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 852
              6⤵
              • Program crash
              PID:4224
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 892
              6⤵
              • Program crash
              PID:4984
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 812
              6⤵
              • Program crash
              PID:3852
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1124
              6⤵
              • Program crash
              PID:1500
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1156
              6⤵
              • Program crash
              PID:3204
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 1180
              6⤵
              • Program crash
              PID:1000

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3875541.exe

          Filesize

          1.4MB

          MD5

          5dae4e1904b309eb772966ff932ad006

          SHA1

          4aeb588c4918f912f5d04164db5c97b3493886ae

          SHA256

          95ecb8db2ef445db93c42e4363baee54b719b6ddf3dcd730b471b288805b5825

          SHA512

          7aef43a451a1db000ff9dab4ca2628bfe9c92968d358098c4602e92004ef00a9919607f6e357e02e13db8016a12339ce546be6a164aad63320e127b082369be9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3875541.exe

          Filesize

          1.4MB

          MD5

          5dae4e1904b309eb772966ff932ad006

          SHA1

          4aeb588c4918f912f5d04164db5c97b3493886ae

          SHA256

          95ecb8db2ef445db93c42e4363baee54b719b6ddf3dcd730b471b288805b5825

          SHA512

          7aef43a451a1db000ff9dab4ca2628bfe9c92968d358098c4602e92004ef00a9919607f6e357e02e13db8016a12339ce546be6a164aad63320e127b082369be9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1864090.exe

          Filesize

          915KB

          MD5

          6931b76644bcd76f2fac255b0295fb26

          SHA1

          8b8b8b0fc31a41c60631c56cee874b9d79b6847a

          SHA256

          ea41e42b8b97768c2e08dc2c8b81277f0d733f9054c026ad6398fc4752368133

          SHA512

          333ef8ed88bbe1eea9b23e371caced17d0b31c21c428d902017d107631853c6cbbe0a1b7b96841d021e4aa9434e95fdd33028ca0c848cd09d8e70e940a4ee85c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1864090.exe

          Filesize

          915KB

          MD5

          6931b76644bcd76f2fac255b0295fb26

          SHA1

          8b8b8b0fc31a41c60631c56cee874b9d79b6847a

          SHA256

          ea41e42b8b97768c2e08dc2c8b81277f0d733f9054c026ad6398fc4752368133

          SHA512

          333ef8ed88bbe1eea9b23e371caced17d0b31c21c428d902017d107631853c6cbbe0a1b7b96841d021e4aa9434e95fdd33028ca0c848cd09d8e70e940a4ee85c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3094298.exe

          Filesize

          711KB

          MD5

          6cd0b504389ae69995824f569a2dac75

          SHA1

          ce82b163040d939c31838eea431e5018f633b969

          SHA256

          c188a0f0b9626d968bd3e36fa81550ef0e505441c70ced7ab1514dd68b603cc0

          SHA512

          2444f1c431936ec858738eaa55429af89ac6a3626e6e38200ba7cde159de14b9a6b5fa957ad69a3f743034dfba7691451f3659a0160f5e7ca30fd57b44fbcf2b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3094298.exe

          Filesize

          711KB

          MD5

          6cd0b504389ae69995824f569a2dac75

          SHA1

          ce82b163040d939c31838eea431e5018f633b969

          SHA256

          c188a0f0b9626d968bd3e36fa81550ef0e505441c70ced7ab1514dd68b603cc0

          SHA512

          2444f1c431936ec858738eaa55429af89ac6a3626e6e38200ba7cde159de14b9a6b5fa957ad69a3f743034dfba7691451f3659a0160f5e7ca30fd57b44fbcf2b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0710220.exe

          Filesize

          349KB

          MD5

          92e0d3c0259ab700515feb200638cca5

          SHA1

          ddebf5ed73fa0f5dea77433bbfa65e0c791ef51f

          SHA256

          a5da072488d149b82f11348291eea03e4955809c07a3f01dc3f0f80aa5107ea8

          SHA512

          ddbd3ed184d1afd2d3bc40e16d369c580ac53e5d938e9d982e41e506c4ec53a899d374aa44ccdc88e9e00f6fc7d20c1d71be405a98d0757482237744fe38f0bf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0710220.exe

          Filesize

          349KB

          MD5

          92e0d3c0259ab700515feb200638cca5

          SHA1

          ddebf5ed73fa0f5dea77433bbfa65e0c791ef51f

          SHA256

          a5da072488d149b82f11348291eea03e4955809c07a3f01dc3f0f80aa5107ea8

          SHA512

          ddbd3ed184d1afd2d3bc40e16d369c580ac53e5d938e9d982e41e506c4ec53a899d374aa44ccdc88e9e00f6fc7d20c1d71be405a98d0757482237744fe38f0bf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5794959.exe

          Filesize

          416KB

          MD5

          79e60a60ae628044bed5268ad0ddc5d9

          SHA1

          c0ae7d992652db605f288743fe93bce67090e739

          SHA256

          a37c97dbf610e902607003737696cebc9ae021947cd247eb4351e9434c9c376c

          SHA512

          86052956f5158b55cac249a5aa23c95d1552e889c90477a91cad96bcf8c5979a42a683582023f64d666fbd553a4ec111e9e442a370f632d91b672a49facf14c0

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5794959.exe

          Filesize

          416KB

          MD5

          79e60a60ae628044bed5268ad0ddc5d9

          SHA1

          c0ae7d992652db605f288743fe93bce67090e739

          SHA256

          a37c97dbf610e902607003737696cebc9ae021947cd247eb4351e9434c9c376c

          SHA512

          86052956f5158b55cac249a5aa23c95d1552e889c90477a91cad96bcf8c5979a42a683582023f64d666fbd553a4ec111e9e442a370f632d91b672a49facf14c0

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7035701.exe

          Filesize

          360KB

          MD5

          9c2dbb974871de26d611455fa8143bef

          SHA1

          1ff50dd2c0af360b18afe73ba4fca981770f7a91

          SHA256

          7f0ed1254a7b740b3e1de375b10f963f27db2a02861becc6b315813a5b18638d

          SHA512

          46acf22850ecedd2cabc5827961d7bb795e69bffe81e3e96071613e57822c3fdc14395ca2373d145af386d4d1e8fd682e09ccd807870a7768ddae43405147421

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7035701.exe

          Filesize

          360KB

          MD5

          9c2dbb974871de26d611455fa8143bef

          SHA1

          1ff50dd2c0af360b18afe73ba4fca981770f7a91

          SHA256

          7f0ed1254a7b740b3e1de375b10f963f27db2a02861becc6b315813a5b18638d

          SHA512

          46acf22850ecedd2cabc5827961d7bb795e69bffe81e3e96071613e57822c3fdc14395ca2373d145af386d4d1e8fd682e09ccd807870a7768ddae43405147421

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5506962.exe

          Filesize

          168KB

          MD5

          10f873310e7516ed33229f4416f75108

          SHA1

          ae13ebf13210139e3f4e7170a125ea887e1ea4dd

          SHA256

          f482fb05c2a3e42309f5c10547433942b99b20484876f949320a4b2b56932db0

          SHA512

          22d0f49049a45fbb8587b46202676c215c4845bbdd678e61cde751ef4a0cb15704976abb3ba73902da480be12772f9806222cd5312053cb35f77702fb56eeaf4

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5506962.exe

          Filesize

          168KB

          MD5

          10f873310e7516ed33229f4416f75108

          SHA1

          ae13ebf13210139e3f4e7170a125ea887e1ea4dd

          SHA256

          f482fb05c2a3e42309f5c10547433942b99b20484876f949320a4b2b56932db0

          SHA512

          22d0f49049a45fbb8587b46202676c215c4845bbdd678e61cde751ef4a0cb15704976abb3ba73902da480be12772f9806222cd5312053cb35f77702fb56eeaf4

        • memory/3648-209-0x0000000005BB0000-0x0000000005C42000-memory.dmp

          Filesize

          584KB

        • memory/3648-206-0x0000000005620000-0x000000000565E000-memory.dmp

          Filesize

          248KB

        • memory/3648-213-0x0000000008FA0000-0x00000000094CC000-memory.dmp

          Filesize

          5.2MB

        • memory/3648-212-0x0000000007220000-0x00000000073E2000-memory.dmp

          Filesize

          1.8MB

        • memory/3648-211-0x0000000006660000-0x00000000066B0000-memory.dmp

          Filesize

          320KB

        • memory/3648-210-0x0000000005C50000-0x0000000005CB6000-memory.dmp

          Filesize

          408KB

        • memory/3648-200-0x0000000000C50000-0x0000000000C80000-memory.dmp

          Filesize

          192KB

        • memory/3648-208-0x0000000005A90000-0x0000000005B06000-memory.dmp

          Filesize

          472KB

        • memory/3648-207-0x0000000005660000-0x00000000056AB000-memory.dmp

          Filesize

          300KB

        • memory/3648-214-0x00000000056E0000-0x00000000056F0000-memory.dmp

          Filesize

          64KB

        • memory/3648-205-0x00000000056E0000-0x00000000056F0000-memory.dmp

          Filesize

          64KB

        • memory/3648-204-0x0000000002F30000-0x0000000002F42000-memory.dmp

          Filesize

          72KB

        • memory/3648-203-0x0000000005900000-0x0000000005A0A000-memory.dmp

          Filesize

          1.0MB

        • memory/3648-202-0x0000000005E00000-0x0000000006406000-memory.dmp

          Filesize

          6.0MB

        • memory/3648-201-0x0000000001300000-0x0000000001306000-memory.dmp

          Filesize

          24KB

        • memory/4416-221-0x0000000000400000-0x00000000006F1000-memory.dmp

          Filesize

          2.9MB

        • memory/4416-220-0x00000000007E0000-0x0000000000815000-memory.dmp

          Filesize

          212KB

        • memory/4948-160-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4948-191-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/4948-192-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4948-193-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4948-194-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4948-196-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/4948-190-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-188-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-186-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-184-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-182-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-180-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-178-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-176-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-174-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-172-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-170-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-168-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-166-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-164-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-163-0x0000000002410000-0x0000000002422000-memory.dmp

          Filesize

          72KB

        • memory/4948-162-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4948-161-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/4948-159-0x0000000002410000-0x0000000002428000-memory.dmp

          Filesize

          96KB

        • memory/4948-158-0x0000000004DF0000-0x00000000052EE000-memory.dmp

          Filesize

          5.0MB

        • memory/4948-157-0x0000000000A60000-0x0000000000A7A000-memory.dmp

          Filesize

          104KB

        • memory/4948-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB