Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:16

General

  • Target

    57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe

  • Size

    700KB

  • MD5

    19b85b8fb698a47dd1147019551834ea

  • SHA1

    909d35f195e14a17a41f5b3f13031b3894ab712c

  • SHA256

    57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae

  • SHA512

    76c97e27bd0fe0cfe29999833cf392df7bb68921648315c5b12976860651c484485bdac70309d1c61e8236daf726567addb1020a44afd2f21acce65f6bc5706e

  • SSDEEP

    12288:+Mrvy90LSikiDaELixMGyZUlvPdGLRj7uIjDh0Qt:ByKSifaEOxMgvPdKRHuIjDWQt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe
    "C:\Users\Admin\AppData\Local\Temp\57d5a3a31a5fa110e0c00da57908166a7f9a531528e6e8186b5c3d0a720a1aae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un210042.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un210042.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6657.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6657.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 1080
          4⤵
          • Program crash
          PID:2128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8389.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8389.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 1636
          4⤵
          • Program crash
          PID:3596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373869.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373869.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3028 -ip 3028
    1⤵
      PID:3276
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1460 -ip 1460
      1⤵
        PID:3888

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373869.exe

        Filesize

        175KB

        MD5

        17e9c00604f9f4a53f305e511a354be1

        SHA1

        9e5e4e29dc55fe792e3a08e6bd5d4fd587ad090f

        SHA256

        de3885497ccce243cf3aa02514eb83dc14c53144e3901292469f5bf28907231a

        SHA512

        b8c064884883ac627abb215507396489411aaa1e15d4f1e0bc72d3d2c322129b716dddd737eb3c4b78e49606f8304d58081f54d1bdfa57bb38ca14fae9ad52d5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si373869.exe

        Filesize

        175KB

        MD5

        17e9c00604f9f4a53f305e511a354be1

        SHA1

        9e5e4e29dc55fe792e3a08e6bd5d4fd587ad090f

        SHA256

        de3885497ccce243cf3aa02514eb83dc14c53144e3901292469f5bf28907231a

        SHA512

        b8c064884883ac627abb215507396489411aaa1e15d4f1e0bc72d3d2c322129b716dddd737eb3c4b78e49606f8304d58081f54d1bdfa57bb38ca14fae9ad52d5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un210042.exe

        Filesize

        557KB

        MD5

        c6c0b5e4de1820c5d147c3c47d5dc34e

        SHA1

        b7ce7a192b172647b3e15ea1b2dad08d1244f389

        SHA256

        c4865ee9bebd7f77d37571087b619b6a99beac2c0f5e3535caa19b87305cdf4f

        SHA512

        934ebfb0b4722c7876f768b0466927fdf1387ef3ebc3485dbf35e4587212f7937a22cf1188150b893e10e0ab8ed3865d47f3f9423a6a57ce5fcb315fa17179d6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un210042.exe

        Filesize

        557KB

        MD5

        c6c0b5e4de1820c5d147c3c47d5dc34e

        SHA1

        b7ce7a192b172647b3e15ea1b2dad08d1244f389

        SHA256

        c4865ee9bebd7f77d37571087b619b6a99beac2c0f5e3535caa19b87305cdf4f

        SHA512

        934ebfb0b4722c7876f768b0466927fdf1387ef3ebc3485dbf35e4587212f7937a22cf1188150b893e10e0ab8ed3865d47f3f9423a6a57ce5fcb315fa17179d6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6657.exe

        Filesize

        307KB

        MD5

        3b0f5b69e8da4cd8443f99f926044f8c

        SHA1

        a3b8b6dd34fcb335a95c5231f5bb9e537f358e46

        SHA256

        992db562ca2f1b9ab72252bc4bc04b5dbed18cec9877f3da48a1dc786566697d

        SHA512

        c24b41cb937b477384c6957a74576ca4fd465922885413d7f52948683234204be07ab3ead6bfb0e07ac8b9937ad8906678c39c553369c0eb4e4b9b9c2034288e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6657.exe

        Filesize

        307KB

        MD5

        3b0f5b69e8da4cd8443f99f926044f8c

        SHA1

        a3b8b6dd34fcb335a95c5231f5bb9e537f358e46

        SHA256

        992db562ca2f1b9ab72252bc4bc04b5dbed18cec9877f3da48a1dc786566697d

        SHA512

        c24b41cb937b477384c6957a74576ca4fd465922885413d7f52948683234204be07ab3ead6bfb0e07ac8b9937ad8906678c39c553369c0eb4e4b9b9c2034288e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8389.exe

        Filesize

        365KB

        MD5

        1ca9d0bd571b19e17845b794ecf96aaa

        SHA1

        83b4c58d150ae521e06728397e26f179a85c2027

        SHA256

        08b0c5da58b3773168137bbe94ccbef49fa6ceb6ca4313331287193a8e9cf25b

        SHA512

        f230709a4fc17958d8985472e94e582b7f0025143fadb1b91021e25b6c03965a0279f1025c8cb387fcab1a227e88d4ff4d3fafb5843e2e0ed54808dc57c973f7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8389.exe

        Filesize

        365KB

        MD5

        1ca9d0bd571b19e17845b794ecf96aaa

        SHA1

        83b4c58d150ae521e06728397e26f179a85c2027

        SHA256

        08b0c5da58b3773168137bbe94ccbef49fa6ceb6ca4313331287193a8e9cf25b

        SHA512

        f230709a4fc17958d8985472e94e582b7f0025143fadb1b91021e25b6c03965a0279f1025c8cb387fcab1a227e88d4ff4d3fafb5843e2e0ed54808dc57c973f7

      • memory/1460-1099-0x00000000054E0000-0x0000000005AF8000-memory.dmp

        Filesize

        6.1MB

      • memory/1460-1102-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1460-1114-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-1113-0x0000000006B10000-0x000000000703C000-memory.dmp

        Filesize

        5.2MB

      • memory/1460-1112-0x0000000006940000-0x0000000006B02000-memory.dmp

        Filesize

        1.8MB

      • memory/1460-1111-0x00000000068E0000-0x0000000006930000-memory.dmp

        Filesize

        320KB

      • memory/1460-1110-0x0000000006850000-0x00000000068C6000-memory.dmp

        Filesize

        472KB

      • memory/1460-1109-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-1108-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-1107-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-1105-0x0000000006600000-0x0000000006692000-memory.dmp

        Filesize

        584KB

      • memory/1460-1104-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/1460-1103-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1460-1100-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1460-226-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-224-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-222-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-216-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-220-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-218-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-190-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-189-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-192-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-194-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-197-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/1460-196-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-199-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-200-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-201-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-203-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-204-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1460-206-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-208-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-210-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-212-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/1460-214-0x00000000028D0000-0x000000000290F000-memory.dmp

        Filesize

        252KB

      • memory/3028-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-181-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3028-151-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-182-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3028-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-180-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3028-150-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3028-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-184-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3028-152-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-179-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3028-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3028-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/3028-148-0x0000000004F00000-0x00000000054A4000-memory.dmp

        Filesize

        5.6MB

      • memory/3720-1120-0x0000000000D60000-0x0000000000D92000-memory.dmp

        Filesize

        200KB

      • memory/3720-1121-0x00000000056A0000-0x00000000056B0000-memory.dmp

        Filesize

        64KB