Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 21:33

General

  • Target

    5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe

  • Size

    700KB

  • MD5

    af71d23fa23391f4ae7b17e4b0b25d4c

  • SHA1

    fc35f4c3b5a4b0db48738d86fa83203f56dfc2b7

  • SHA256

    5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf

  • SHA512

    61dd94403ce8611fa3f8797f4101fe043f19b0bec8eb630cc411eea23723ec94e6e27987687c197cac1a7176ff123922d4cf802c7325d96a0e46aac35e9b2b0c

  • SSDEEP

    12288:+MrIy90sli6ydVrt9KY/XeD9D5wcARCNsfkeTQjgqFs4lFywPcyGQ:GySH7MYXfJfb0fplj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe
    "C:\Users\Admin\AppData\Local\Temp\5dc7282ad316eb66eed7e047299fd0db161e4e7dc816351fda8c3f2dbfde5cbf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895528.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895528.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5598.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5598.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 1084
          4⤵
          • Program crash
          PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5243.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 1340
          4⤵
          • Program crash
          PID:3380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477584.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477584.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2416 -ip 2416
    1⤵
      PID:228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1972 -ip 1972
      1⤵
        PID:2152

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477584.exe

        Filesize

        175KB

        MD5

        64a455dffdbc0f968c29b58d6c71cdd3

        SHA1

        f95b57d4958f391d5a1d230711b89155b5856944

        SHA256

        a03343f415e0c9fec73eee61a1995cd100bdbc5084c7c008b09dd0da79e70739

        SHA512

        33571587061772a54e35a8f869c663e73decec0a042c966ae9ad22ac474d49fa446c30691ae07dbd644fbf7a3870cd3cb3e1d1b45eadb831da17421e9f4a6b76

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477584.exe

        Filesize

        175KB

        MD5

        64a455dffdbc0f968c29b58d6c71cdd3

        SHA1

        f95b57d4958f391d5a1d230711b89155b5856944

        SHA256

        a03343f415e0c9fec73eee61a1995cd100bdbc5084c7c008b09dd0da79e70739

        SHA512

        33571587061772a54e35a8f869c663e73decec0a042c966ae9ad22ac474d49fa446c30691ae07dbd644fbf7a3870cd3cb3e1d1b45eadb831da17421e9f4a6b76

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895528.exe

        Filesize

        558KB

        MD5

        b87e8c273f356b072c31f06a9cb1a04f

        SHA1

        3be77358d8bd7b2762c3b82020c7b76d88de529e

        SHA256

        64bf7e8dbe86528888d08512ea287123fde37e8dc683c9419ad00433cefb9992

        SHA512

        effd6811f966e68ee9de4cfc9e42f137d95cde0913fc26249584c5fbd3ef86710772072dfd18a74b628062ab9cdbd472038c9220c8ed26b9f5ea72450790f523

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895528.exe

        Filesize

        558KB

        MD5

        b87e8c273f356b072c31f06a9cb1a04f

        SHA1

        3be77358d8bd7b2762c3b82020c7b76d88de529e

        SHA256

        64bf7e8dbe86528888d08512ea287123fde37e8dc683c9419ad00433cefb9992

        SHA512

        effd6811f966e68ee9de4cfc9e42f137d95cde0913fc26249584c5fbd3ef86710772072dfd18a74b628062ab9cdbd472038c9220c8ed26b9f5ea72450790f523

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5598.exe

        Filesize

        307KB

        MD5

        a5ad3577a804fe113ec9eadda8b6504f

        SHA1

        aec8e38ff3c453538ad58f36028a9cc1b8abbe84

        SHA256

        ef030d9c07c0e58bddbe73ccce059ef5e48106c4fb196978ff47f281d8579414

        SHA512

        be168077ba0041159a6957e35ac57d07c4ff1e28ba9b8ce316e10bbe3e759712a119b80ae95cad1b14d04b974b88345ccf1a2a5ca2bb0523cc13be8cdecef3f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5598.exe

        Filesize

        307KB

        MD5

        a5ad3577a804fe113ec9eadda8b6504f

        SHA1

        aec8e38ff3c453538ad58f36028a9cc1b8abbe84

        SHA256

        ef030d9c07c0e58bddbe73ccce059ef5e48106c4fb196978ff47f281d8579414

        SHA512

        be168077ba0041159a6957e35ac57d07c4ff1e28ba9b8ce316e10bbe3e759712a119b80ae95cad1b14d04b974b88345ccf1a2a5ca2bb0523cc13be8cdecef3f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5243.exe

        Filesize

        365KB

        MD5

        68e8cf54d550b18d71327fc2049e6988

        SHA1

        b5627ac6225b16db39761b9b38d8b2aa7b6811c7

        SHA256

        7c30ecb1ca46b18bb151ddfb6d9cc25578e405b035f5d44a13810890240467b9

        SHA512

        7c22d9197ffb968321d9bcdbc70278145dc08c9b51646bb38c68e2c675be7a5dbde1c67fd5d6f5d6b9dd01e70b3248e802d9fdb38b1a0f72ee3906ba3b44a1f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5243.exe

        Filesize

        365KB

        MD5

        68e8cf54d550b18d71327fc2049e6988

        SHA1

        b5627ac6225b16db39761b9b38d8b2aa7b6811c7

        SHA256

        7c30ecb1ca46b18bb151ddfb6d9cc25578e405b035f5d44a13810890240467b9

        SHA512

        7c22d9197ffb968321d9bcdbc70278145dc08c9b51646bb38c68e2c675be7a5dbde1c67fd5d6f5d6b9dd01e70b3248e802d9fdb38b1a0f72ee3906ba3b44a1f8

      • memory/1456-1124-0x0000000005850000-0x0000000005860000-memory.dmp

        Filesize

        64KB

      • memory/1456-1123-0x0000000005850000-0x0000000005860000-memory.dmp

        Filesize

        64KB

      • memory/1456-1122-0x0000000000C70000-0x0000000000CA2000-memory.dmp

        Filesize

        200KB

      • memory/1972-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1972-1105-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-1116-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-1115-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/1972-1114-0x0000000006A50000-0x0000000006C12000-memory.dmp

        Filesize

        1.8MB

      • memory/1972-1113-0x00000000069C0000-0x0000000006A10000-memory.dmp

        Filesize

        320KB

      • memory/1972-1112-0x0000000006930000-0x00000000069A6000-memory.dmp

        Filesize

        472KB

      • memory/1972-1111-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-1110-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-1109-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-1108-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1972-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1972-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1972-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1972-1101-0x0000000005470000-0x0000000005A88000-memory.dmp

        Filesize

        6.1MB

      • memory/1972-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-191-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/1972-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-194-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-192-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-197-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1972-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1972-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/2416-174-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-183-0x00000000026E0000-0x00000000026F0000-memory.dmp

        Filesize

        64KB

      • memory/2416-153-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-184-0x00000000026E0000-0x00000000026F0000-memory.dmp

        Filesize

        64KB

      • memory/2416-172-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-182-0x00000000026E0000-0x00000000026F0000-memory.dmp

        Filesize

        64KB

      • memory/2416-154-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-170-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-178-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-158-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-180-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-176-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2416-156-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2416-168-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-166-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-164-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-162-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-160-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/2416-152-0x00000000026E0000-0x00000000026F0000-memory.dmp

        Filesize

        64KB

      • memory/2416-151-0x00000000026E0000-0x00000000026F0000-memory.dmp

        Filesize

        64KB

      • memory/2416-150-0x00000000026E0000-0x00000000026F0000-memory.dmp

        Filesize

        64KB

      • memory/2416-149-0x0000000000740000-0x000000000076D000-memory.dmp

        Filesize

        180KB

      • memory/2416-148-0x0000000004D60000-0x0000000005304000-memory.dmp

        Filesize

        5.6MB