Analysis

  • max time kernel
    72s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:20

General

  • Target

    afd406a08c1f9df147d530515dd8c09e15305f48201418f8596ca78ecf562aff.exe

  • Size

    699KB

  • MD5

    2420e4e299c9310f706ab4078482b039

  • SHA1

    e92a30a664cc00c5579a7b48e56181bc7aef2e9e

  • SHA256

    afd406a08c1f9df147d530515dd8c09e15305f48201418f8596ca78ecf562aff

  • SHA512

    a7133d229bb92630f371f2e483584d9f9a6b25a1f78fc1d540271bd814ce1cf2e18150793c1c24d5fa19a859933e99560fb6c5830648b4d4c42224c93bd8a863

  • SSDEEP

    12288:kMrSy90qagSs0QiF8l9DG7cAfy4UBPdtWoY43j7sq2LWRed1:2y2EGFzfFUBvTf3HsnLWRc1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afd406a08c1f9df147d530515dd8c09e15305f48201418f8596ca78ecf562aff.exe
    "C:\Users\Admin\AppData\Local\Temp\afd406a08c1f9df147d530515dd8c09e15305f48201418f8596ca78ecf562aff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un469375.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un469375.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9243.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 1084
          4⤵
          • Program crash
          PID:3432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1877.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1877.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 1928
          4⤵
          • Program crash
          PID:528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587531.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587531.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3584
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1704 -ip 1704
    1⤵
      PID:3360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4404 -ip 4404
      1⤵
        PID:4176

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587531.exe

        Filesize

        175KB

        MD5

        2de790c370eb40d135e8b3e5efd21260

        SHA1

        a7662eb14c69e01466d268e4daf015c86ce60cea

        SHA256

        696ff8a4af1364079fe914e6f8d84b0a5c721fc4282a181b35af3b8bee7b8b46

        SHA512

        fadefd73c2df1779384997827f391cad0296c0575284fe0f4bbd06cd81958f9533c539035c3011a085dd99928803cb37deb98b205817bd4e9c858b3bf9ae38b4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587531.exe

        Filesize

        175KB

        MD5

        2de790c370eb40d135e8b3e5efd21260

        SHA1

        a7662eb14c69e01466d268e4daf015c86ce60cea

        SHA256

        696ff8a4af1364079fe914e6f8d84b0a5c721fc4282a181b35af3b8bee7b8b46

        SHA512

        fadefd73c2df1779384997827f391cad0296c0575284fe0f4bbd06cd81958f9533c539035c3011a085dd99928803cb37deb98b205817bd4e9c858b3bf9ae38b4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un469375.exe

        Filesize

        557KB

        MD5

        a041acae405d050dda85cc25e2239787

        SHA1

        e5ada55fb72dd7f410d05a078a10f0e1cfa26633

        SHA256

        51f4f78b60184eeb5a8780395c5708ae48be12c8252d73d7572bd10e0c60cc63

        SHA512

        8705e66e02f58dab35f4bd2846326cf3b919bc6bfa202e968428662b18a147e1bb7d3cd0434ac267c4c74c74caed62a4bbadd0f4d4a0c862db1ffefb8651326a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un469375.exe

        Filesize

        557KB

        MD5

        a041acae405d050dda85cc25e2239787

        SHA1

        e5ada55fb72dd7f410d05a078a10f0e1cfa26633

        SHA256

        51f4f78b60184eeb5a8780395c5708ae48be12c8252d73d7572bd10e0c60cc63

        SHA512

        8705e66e02f58dab35f4bd2846326cf3b919bc6bfa202e968428662b18a147e1bb7d3cd0434ac267c4c74c74caed62a4bbadd0f4d4a0c862db1ffefb8651326a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9243.exe

        Filesize

        307KB

        MD5

        d6727efec256403b3ac21de0ad59740f

        SHA1

        d4b0763a65969479aed8090c3ca635b805b782b9

        SHA256

        c20f3774b8d93c5c3d7311620631b77de7560eafc8e2e2b79eb1284cdd9f7c0d

        SHA512

        2f054491ac5a6ef03a604a92d255130478a7a7f64e56eec23b92bb510faf371d99671fbdb66df8cee40c2048ff4a66877d080e4d1289992d1d86092024ca16be

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9243.exe

        Filesize

        307KB

        MD5

        d6727efec256403b3ac21de0ad59740f

        SHA1

        d4b0763a65969479aed8090c3ca635b805b782b9

        SHA256

        c20f3774b8d93c5c3d7311620631b77de7560eafc8e2e2b79eb1284cdd9f7c0d

        SHA512

        2f054491ac5a6ef03a604a92d255130478a7a7f64e56eec23b92bb510faf371d99671fbdb66df8cee40c2048ff4a66877d080e4d1289992d1d86092024ca16be

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1877.exe

        Filesize

        365KB

        MD5

        cbeabf8a7b4cccd4e74cf894678e4ede

        SHA1

        fb59b3cec3d8043a7cdcd55bedd8504776035daf

        SHA256

        390296a13ac2bcf913e13d861f009f399a2b66c1abb4b5149b677485847d12d3

        SHA512

        0ff5d6bf772ec17b6bf4367d3bb72a93c079ca390bf2682ac12de5ca8e5063ed8d075e9663c3831ffa4fc80148104ba42ee1a01421152878c0c71e01ed47fb41

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1877.exe

        Filesize

        365KB

        MD5

        cbeabf8a7b4cccd4e74cf894678e4ede

        SHA1

        fb59b3cec3d8043a7cdcd55bedd8504776035daf

        SHA256

        390296a13ac2bcf913e13d861f009f399a2b66c1abb4b5149b677485847d12d3

        SHA512

        0ff5d6bf772ec17b6bf4367d3bb72a93c079ca390bf2682ac12de5ca8e5063ed8d075e9663c3831ffa4fc80148104ba42ee1a01421152878c0c71e01ed47fb41

      • memory/1704-162-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-168-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-151-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/1704-150-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/1704-152-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/1704-153-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-154-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-156-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-158-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-160-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-148-0x0000000004E80000-0x0000000005424000-memory.dmp

        Filesize

        5.6MB

      • memory/1704-164-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-166-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-149-0x00000000020D0000-0x00000000020FD000-memory.dmp

        Filesize

        180KB

      • memory/1704-170-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-172-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-174-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-176-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-178-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-180-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/1704-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1704-182-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/1704-183-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/1704-184-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/1704-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3584-1121-0x00000000003D0000-0x0000000000402000-memory.dmp

        Filesize

        200KB

      • memory/3584-1123-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1122-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/4404-194-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-196-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-198-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-200-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-202-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-204-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-206-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-208-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-210-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-212-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-214-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-216-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-218-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-220-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-222-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-224-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-382-0x0000000000940000-0x000000000098B000-memory.dmp

        Filesize

        300KB

      • memory/4404-384-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4404-386-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4404-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4404-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4404-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4404-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4404-1104-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4404-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/4404-1107-0x0000000006620000-0x00000000066B2000-memory.dmp

        Filesize

        584KB

      • memory/4404-1108-0x0000000006700000-0x0000000006776000-memory.dmp

        Filesize

        472KB

      • memory/4404-1109-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/4404-1110-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4404-1111-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4404-1112-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4404-192-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-191-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/4404-1113-0x00000000067F0000-0x00000000069B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4404-1114-0x00000000069D0000-0x0000000006EFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4404-1115-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB