Analysis

  • max time kernel
    163s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:28

General

  • Target

    64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe

  • Size

    587KB

  • MD5

    fbf537cc0ac02ea7aa7aa5bc0671863f

  • SHA1

    884c98ee8b72763589a0d806da6d678710993943

  • SHA256

    64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8

  • SHA512

    6314170c1df6c87aa8731dd1eb553e8a5e21b547273bbb0c3cee40d4da5391f201c753057e7f4c15e7a06a0bb0f485bfa213b44a01085a7899d730e0d9f3d605

  • SSDEEP

    12288:uMrFy90yalWUP2uJvwRLIrMfccbPLACo34kbe:zyAzPnaRL7fVbPU1C

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe
    "C:\Users\Admin\AppData\Local\Temp\64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4303588.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4303588.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3417661.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3417661.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4420459.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4420459.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 1080
          4⤵
          • Program crash
          PID:2304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4804153.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4804153.exe
      2⤵
      • Executes dropped EXE
      PID:4340
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2608 -ip 2608
    1⤵
      PID:2788

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4804153.exe

      Filesize

      206KB

      MD5

      8f4271cf884d6c986dcd73839f96c8e0

      SHA1

      6c8a1beec6cd4244f40a6133865f98f8e8212bda

      SHA256

      bff491fefd7678904fbe47e3e6c81f0241ecb815e289ba13fad56dd08288a391

      SHA512

      ac0ab89519ca512b747901b4ba6e8cb74afb253f8fb50f09fe95bcc83379098495deab0519d16d610e1ba138f11912864b379d3fa20008a10fe492949fd3dd40

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4804153.exe

      Filesize

      206KB

      MD5

      8f4271cf884d6c986dcd73839f96c8e0

      SHA1

      6c8a1beec6cd4244f40a6133865f98f8e8212bda

      SHA256

      bff491fefd7678904fbe47e3e6c81f0241ecb815e289ba13fad56dd08288a391

      SHA512

      ac0ab89519ca512b747901b4ba6e8cb74afb253f8fb50f09fe95bcc83379098495deab0519d16d610e1ba138f11912864b379d3fa20008a10fe492949fd3dd40

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4303588.exe

      Filesize

      415KB

      MD5

      915fcb35636259d992d2f7ef9fcebb95

      SHA1

      2e287a37d666b17d2e1b9239ab1886e7369722d6

      SHA256

      f68e7c63eb35dce768c40fb46373fa3b82413b60e122c87a3ad88ced90962117

      SHA512

      40babfb691f0726313ceb34230643460918460b6befbf881d56362456606a8b46e36285b17b3d7abb3c39a0e1aa4f592ff01d8f60a520d8997324789c28c9127

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4303588.exe

      Filesize

      415KB

      MD5

      915fcb35636259d992d2f7ef9fcebb95

      SHA1

      2e287a37d666b17d2e1b9239ab1886e7369722d6

      SHA256

      f68e7c63eb35dce768c40fb46373fa3b82413b60e122c87a3ad88ced90962117

      SHA512

      40babfb691f0726313ceb34230643460918460b6befbf881d56362456606a8b46e36285b17b3d7abb3c39a0e1aa4f592ff01d8f60a520d8997324789c28c9127

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3417661.exe

      Filesize

      168KB

      MD5

      d5bc897b3c8fbf83a9a64b506bc743b3

      SHA1

      463bb03a82f519fd6f157c72cea3e76aa680feb5

      SHA256

      764eba4637d61e2fcab9b7e2aa0e9b5769573e1eced13c8790b92eedd6024bf5

      SHA512

      b2872327ed2f7b32fdef26948940bcd38f878baf92efad9db41dd733e86875ff48e63a8858c6f7e89cdb4d73862b1f5b9272b0477b1316d227e0b03b703b0773

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3417661.exe

      Filesize

      168KB

      MD5

      d5bc897b3c8fbf83a9a64b506bc743b3

      SHA1

      463bb03a82f519fd6f157c72cea3e76aa680feb5

      SHA256

      764eba4637d61e2fcab9b7e2aa0e9b5769573e1eced13c8790b92eedd6024bf5

      SHA512

      b2872327ed2f7b32fdef26948940bcd38f878baf92efad9db41dd733e86875ff48e63a8858c6f7e89cdb4d73862b1f5b9272b0477b1316d227e0b03b703b0773

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4420459.exe

      Filesize

      360KB

      MD5

      b58dad15f13abfc7f917d442fbe1a9b0

      SHA1

      672dfe5fb8c0d488637e37dff3a4e96427293dee

      SHA256

      814953835079a07dedc6cfc8916980d0c3c0d6c4a5c2374a044f5be9bb3546ae

      SHA512

      4a62d110ae056fef4de8765df7890625a2f99a5fff9acc06f9f9896fa2224878f9473f5d4a9e646b5f3d2366e84dde145bcdb54e62e6eabae71e824ce80c6d84

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4420459.exe

      Filesize

      360KB

      MD5

      b58dad15f13abfc7f917d442fbe1a9b0

      SHA1

      672dfe5fb8c0d488637e37dff3a4e96427293dee

      SHA256

      814953835079a07dedc6cfc8916980d0c3c0d6c4a5c2374a044f5be9bb3546ae

      SHA512

      4a62d110ae056fef4de8765df7890625a2f99a5fff9acc06f9f9896fa2224878f9473f5d4a9e646b5f3d2366e84dde145bcdb54e62e6eabae71e824ce80c6d84

    • memory/1300-153-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/1300-158-0x000000000B7C0000-0x000000000B982000-memory.dmp

      Filesize

      1.8MB

    • memory/1300-151-0x000000000A600000-0x000000000A63C000-memory.dmp

      Filesize

      240KB

    • memory/1300-154-0x000000000A840000-0x000000000A8B6000-memory.dmp

      Filesize

      472KB

    • memory/1300-155-0x000000000A8C0000-0x000000000A952000-memory.dmp

      Filesize

      584KB

    • memory/1300-156-0x000000000B220000-0x000000000B286000-memory.dmp

      Filesize

      408KB

    • memory/1300-157-0x000000000BA40000-0x000000000BFE4000-memory.dmp

      Filesize

      5.6MB

    • memory/1300-152-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/1300-159-0x000000000C520000-0x000000000CA4C000-memory.dmp

      Filesize

      5.2MB

    • memory/1300-160-0x000000000B720000-0x000000000B770000-memory.dmp

      Filesize

      320KB

    • memory/1300-150-0x000000000A5A0000-0x000000000A5B2000-memory.dmp

      Filesize

      72KB

    • memory/1300-149-0x000000000A680000-0x000000000A78A000-memory.dmp

      Filesize

      1.0MB

    • memory/1300-148-0x000000000AB90000-0x000000000B1A8000-memory.dmp

      Filesize

      6.1MB

    • memory/1300-147-0x00000000006F0000-0x000000000071E000-memory.dmp

      Filesize

      184KB

    • memory/2608-169-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-189-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-171-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-175-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-177-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-179-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-181-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-185-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-183-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-187-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-191-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-173-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-193-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-194-0x00000000007B0000-0x00000000007DD000-memory.dmp

      Filesize

      180KB

    • memory/2608-195-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2608-196-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2608-197-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2608-198-0x0000000000400000-0x00000000006F4000-memory.dmp

      Filesize

      3.0MB

    • memory/2608-199-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2608-200-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2608-201-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2608-204-0x0000000000400000-0x00000000006F4000-memory.dmp

      Filesize

      3.0MB

    • memory/2608-167-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB

    • memory/2608-166-0x0000000002760000-0x0000000002772000-memory.dmp

      Filesize

      72KB