Analysis

  • max time kernel
    168s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:38

General

  • Target

    fda62ef2a98557836db4a15e4daf783300da40f3287f49f565942737ff18842e.exe

  • Size

    566KB

  • MD5

    d9d8138409bbbb7d09d9ddb6a60202e9

  • SHA1

    9a1e909a951f39e08a33dd54a656d47e2b8877b8

  • SHA256

    fda62ef2a98557836db4a15e4daf783300da40f3287f49f565942737ff18842e

  • SHA512

    51915c2b8763eaa167a4117d16cca00f9593698392714a50576be2f66a3154223d01313f169878805076a84dcfa5ba630cbb1d705569e8eeccfd07a0300445ef

  • SSDEEP

    12288:YMrRy90hkU9zXHHigTyXE47QpYsaVXgPzjeC:pyvU9Xi7XApYzVQ/

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fda62ef2a98557836db4a15e4daf783300da40f3287f49f565942737ff18842e.exe
    "C:\Users\Admin\AppData\Local\Temp\fda62ef2a98557836db4a15e4daf783300da40f3287f49f565942737ff18842e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2592787.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2592787.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1364942.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1364942.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2951539.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2951539.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8196275.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8196275.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 696
        3⤵
        • Program crash
        PID:1592
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 780
        3⤵
        • Program crash
        PID:1420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 800
        3⤵
        • Program crash
        PID:3316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 976
        3⤵
        • Program crash
        PID:3424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1008
        3⤵
        • Program crash
        PID:2092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1008
        3⤵
        • Program crash
        PID:4988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1216
        3⤵
        • Program crash
        PID:3036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1152
        3⤵
        • Program crash
        PID:1028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1192
        3⤵
        • Program crash
        PID:2696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1352
        3⤵
        • Program crash
        PID:3532
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        PID:1288
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 808
        3⤵
        • Program crash
        PID:4320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4804 -ip 4804
    1⤵
      PID:3684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4804 -ip 4804
      1⤵
        PID:3204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4804 -ip 4804
        1⤵
          PID:2636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4804 -ip 4804
          1⤵
            PID:1260
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4804 -ip 4804
            1⤵
              PID:4500
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4804 -ip 4804
              1⤵
                PID:1516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4804 -ip 4804
                1⤵
                  PID:3768
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4804 -ip 4804
                  1⤵
                    PID:3952
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4804 -ip 4804
                    1⤵
                      PID:3044
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4804 -ip 4804
                      1⤵
                        PID:440
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4804 -ip 4804
                        1⤵
                          PID:1344

                        Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8196275.exe

                                Filesize

                                268KB

                                MD5

                                b32c037ee28210ef31f32a00d0239255

                                SHA1

                                219b74dced609655a7f60d7c70e80b78f5fabc26

                                SHA256

                                8a2efe15e2bf6d634913ce13e372eebc141fcd5898e7d7c0d1b3dac5dc9e8f12

                                SHA512

                                42ee360f1aa9dd91bd7bd30aed320bb7b019622f54105359aff00298d7f8d59dee903396f90b00e0636a3955344c75ce22389c714c10769758c1382520bbbbaf

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m8196275.exe

                                Filesize

                                268KB

                                MD5

                                b32c037ee28210ef31f32a00d0239255

                                SHA1

                                219b74dced609655a7f60d7c70e80b78f5fabc26

                                SHA256

                                8a2efe15e2bf6d634913ce13e372eebc141fcd5898e7d7c0d1b3dac5dc9e8f12

                                SHA512

                                42ee360f1aa9dd91bd7bd30aed320bb7b019622f54105359aff00298d7f8d59dee903396f90b00e0636a3955344c75ce22389c714c10769758c1382520bbbbaf

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2592787.exe

                                Filesize

                                307KB

                                MD5

                                7be36e0fcef9d9404ddb79f6713a2d18

                                SHA1

                                fd07e4e183ad0838b7e672cde877274cc2e3a7aa

                                SHA256

                                3cda3cc6da3eb9ff257255160a85a1f2a4f50aa79f557e397083e3e34e05efe4

                                SHA512

                                ac9e295c94bdfa9d56c327df2f98d2b55b4184ad4cb6c91672e9fe9d71d1c90e402e79f7119cd345e02f1361072679818c079964d22164a66a65fce7199075ea

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2592787.exe

                                Filesize

                                307KB

                                MD5

                                7be36e0fcef9d9404ddb79f6713a2d18

                                SHA1

                                fd07e4e183ad0838b7e672cde877274cc2e3a7aa

                                SHA256

                                3cda3cc6da3eb9ff257255160a85a1f2a4f50aa79f557e397083e3e34e05efe4

                                SHA512

                                ac9e295c94bdfa9d56c327df2f98d2b55b4184ad4cb6c91672e9fe9d71d1c90e402e79f7119cd345e02f1361072679818c079964d22164a66a65fce7199075ea

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1364942.exe

                                Filesize

                                168KB

                                MD5

                                cab1e6da9e6da4513e78605f43a770b2

                                SHA1

                                02891ce606606566c3d193a039fe5750d5c087ef

                                SHA256

                                bf101611b40586cfd6723bdaf4f9c06e7fdfb8bb1fd15c04bfbf6ecbf7a3fb9a

                                SHA512

                                265886a7a90e8d673f4dc58f61e237f8ce8fef65bc6c52793b544456835e6217426b603cb4bae0d42de9fcc82768c82938ba261870f8b7968dc0ffb5d581f7f9

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1364942.exe

                                Filesize

                                168KB

                                MD5

                                cab1e6da9e6da4513e78605f43a770b2

                                SHA1

                                02891ce606606566c3d193a039fe5750d5c087ef

                                SHA256

                                bf101611b40586cfd6723bdaf4f9c06e7fdfb8bb1fd15c04bfbf6ecbf7a3fb9a

                                SHA512

                                265886a7a90e8d673f4dc58f61e237f8ce8fef65bc6c52793b544456835e6217426b603cb4bae0d42de9fcc82768c82938ba261870f8b7968dc0ffb5d581f7f9

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2951539.exe

                                Filesize

                                178KB

                                MD5

                                dea34e51eada03e5f6d2121c2b5a24f4

                                SHA1

                                46cbbe9a8be7fab1ca500700ac772fc60080a81a

                                SHA256

                                f92a712e4b5b909e9da568f74a77f25b03b3cd6b647262f50dfbb56b705e2a75

                                SHA512

                                b056cb763aa769393fe001bd62bbb1fd3a454be95f5d88e8da322076a89ec4220b67afff338871a593b3c60f15bebdd483f78459993cfb1885f726ebd41c5dae

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2951539.exe

                                Filesize

                                178KB

                                MD5

                                dea34e51eada03e5f6d2121c2b5a24f4

                                SHA1

                                46cbbe9a8be7fab1ca500700ac772fc60080a81a

                                SHA256

                                f92a712e4b5b909e9da568f74a77f25b03b3cd6b647262f50dfbb56b705e2a75

                                SHA512

                                b056cb763aa769393fe001bd62bbb1fd3a454be95f5d88e8da322076a89ec4220b67afff338871a593b3c60f15bebdd483f78459993cfb1885f726ebd41c5dae

                              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                Filesize

                                268KB

                                MD5

                                b32c037ee28210ef31f32a00d0239255

                                SHA1

                                219b74dced609655a7f60d7c70e80b78f5fabc26

                                SHA256

                                8a2efe15e2bf6d634913ce13e372eebc141fcd5898e7d7c0d1b3dac5dc9e8f12

                                SHA512

                                42ee360f1aa9dd91bd7bd30aed320bb7b019622f54105359aff00298d7f8d59dee903396f90b00e0636a3955344c75ce22389c714c10769758c1382520bbbbaf

                              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                Filesize

                                268KB

                                MD5

                                b32c037ee28210ef31f32a00d0239255

                                SHA1

                                219b74dced609655a7f60d7c70e80b78f5fabc26

                                SHA256

                                8a2efe15e2bf6d634913ce13e372eebc141fcd5898e7d7c0d1b3dac5dc9e8f12

                                SHA512

                                42ee360f1aa9dd91bd7bd30aed320bb7b019622f54105359aff00298d7f8d59dee903396f90b00e0636a3955344c75ce22389c714c10769758c1382520bbbbaf

                              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                Filesize

                                268KB

                                MD5

                                b32c037ee28210ef31f32a00d0239255

                                SHA1

                                219b74dced609655a7f60d7c70e80b78f5fabc26

                                SHA256

                                8a2efe15e2bf6d634913ce13e372eebc141fcd5898e7d7c0d1b3dac5dc9e8f12

                                SHA512

                                42ee360f1aa9dd91bd7bd30aed320bb7b019622f54105359aff00298d7f8d59dee903396f90b00e0636a3955344c75ce22389c714c10769758c1382520bbbbaf

                              • memory/876-149-0x000000000A3E0000-0x000000000A4EA000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/876-154-0x0000000004E20000-0x0000000004E96000-memory.dmp

                                Filesize

                                472KB

                              • memory/876-156-0x000000000B4A0000-0x000000000BA44000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/876-157-0x000000000A840000-0x000000000A8A6000-memory.dmp

                                Filesize

                                408KB

                              • memory/876-158-0x000000000BC20000-0x000000000BDE2000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/876-159-0x000000000C320000-0x000000000C84C000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/876-160-0x000000000BA50000-0x000000000BAA0000-memory.dmp

                                Filesize

                                320KB

                              • memory/876-155-0x000000000A6A0000-0x000000000A732000-memory.dmp

                                Filesize

                                584KB

                              • memory/876-153-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                Filesize

                                64KB

                              • memory/876-152-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                Filesize

                                64KB

                              • memory/876-151-0x000000000A370000-0x000000000A3AC000-memory.dmp

                                Filesize

                                240KB

                              • memory/876-150-0x000000000A310000-0x000000000A322000-memory.dmp

                                Filesize

                                72KB

                              • memory/876-148-0x000000000A8D0000-0x000000000AEE8000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/876-147-0x00000000005A0000-0x00000000005D0000-memory.dmp

                                Filesize

                                192KB

                              • memory/3924-172-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-193-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-176-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-178-0x0000000004A20000-0x0000000004A30000-memory.dmp

                                Filesize

                                64KB

                              • memory/3924-181-0x0000000004A20000-0x0000000004A30000-memory.dmp

                                Filesize

                                64KB

                              • memory/3924-180-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-183-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-185-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-187-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-189-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-191-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-177-0x0000000004A20000-0x0000000004A30000-memory.dmp

                                Filesize

                                64KB

                              • memory/3924-195-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-196-0x0000000004A20000-0x0000000004A30000-memory.dmp

                                Filesize

                                64KB

                              • memory/3924-197-0x0000000004A20000-0x0000000004A30000-memory.dmp

                                Filesize

                                64KB

                              • memory/3924-198-0x0000000004A20000-0x0000000004A30000-memory.dmp

                                Filesize

                                64KB

                              • memory/3924-174-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-170-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-165-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-166-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/3924-168-0x0000000004950000-0x0000000004962000-memory.dmp

                                Filesize

                                72KB

                              • memory/4804-206-0x00000000007C0000-0x00000000007F5000-memory.dmp

                                Filesize

                                212KB

                              • memory/4804-205-0x0000000000400000-0x00000000006C4000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4804-204-0x00000000007C0000-0x00000000007F5000-memory.dmp

                                Filesize

                                212KB