Analysis

  • max time kernel
    52s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 21:36

General

  • Target

    b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe

  • Size

    699KB

  • MD5

    03979b982b7948f80f6548b1dd81b95e

  • SHA1

    a1c83bad34a96783c04b6df645b564d011c2d0c5

  • SHA256

    b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090

  • SHA512

    4eb1fbbec18e3db8b719d45ef7a9d6791f33fef1c13624c2d9ea826bbe4f4cdf794f714260b160e3f40ab070624afcdd4562a1ebbe72c8e25664929531ee3c14

  • SSDEEP

    12288:PMray90uhWn+XZ2OTmADxyB7lWnOahFXiQzj7LeRPiyDghD:lyBU2X7DxS7IPnXiQzHLeRKyDghD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe
    "C:\Users\Admin\AppData\Local\Temp\b7d72c89c95e3f70ff02e7828a8f98e2488a2d8cff864ffc05d2c1a6f12cb090.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un481407.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un481407.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3118.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3118.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1076
          4⤵
          • Program crash
          PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1810.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1810.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1556
          4⤵
          • Program crash
          PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630362.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630362.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1968 -ip 1968
    1⤵
      PID:4388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2868 -ip 2868
      1⤵
        PID:3596

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630362.exe

        Filesize

        175KB

        MD5

        04ce436a9f5d91e7f4537b2f1d043302

        SHA1

        95602e42555c4ccd8f120632f1a26a5acd85cc5a

        SHA256

        ca37030d4941e5e2119370e921adc31acba849e8ff2729a59dfc535f1bfc9166

        SHA512

        4aeca95b131586f1ab1697800a0b06ad221e449ef295104a950e88884455496acd786c8b12c14edf55936434a9f394f131ff5dd8b2a21a406b5617b28706521e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630362.exe

        Filesize

        175KB

        MD5

        04ce436a9f5d91e7f4537b2f1d043302

        SHA1

        95602e42555c4ccd8f120632f1a26a5acd85cc5a

        SHA256

        ca37030d4941e5e2119370e921adc31acba849e8ff2729a59dfc535f1bfc9166

        SHA512

        4aeca95b131586f1ab1697800a0b06ad221e449ef295104a950e88884455496acd786c8b12c14edf55936434a9f394f131ff5dd8b2a21a406b5617b28706521e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un481407.exe

        Filesize

        557KB

        MD5

        7a68cb0197d828c021fa7fe7e30e8249

        SHA1

        b82e2e8564474738c07a3d02842aa88093e43936

        SHA256

        8741e52b7464e6da9089f23b5f7870b2f5b6d8ad1f31d85f55b6b8b4abe7e426

        SHA512

        b22d64c98242253feaf80cd45a9c09ac64ff2373da91c1acad11ce2a16c87d0dacbaf5f1e13cf181a19eee2dbd53d36ddfab8552ebd67d824cb4f0303c6bb5b4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un481407.exe

        Filesize

        557KB

        MD5

        7a68cb0197d828c021fa7fe7e30e8249

        SHA1

        b82e2e8564474738c07a3d02842aa88093e43936

        SHA256

        8741e52b7464e6da9089f23b5f7870b2f5b6d8ad1f31d85f55b6b8b4abe7e426

        SHA512

        b22d64c98242253feaf80cd45a9c09ac64ff2373da91c1acad11ce2a16c87d0dacbaf5f1e13cf181a19eee2dbd53d36ddfab8552ebd67d824cb4f0303c6bb5b4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3118.exe

        Filesize

        307KB

        MD5

        629dda5ab31b5b11d230e84414139176

        SHA1

        bb9c4ad31d94ab3a061a15ce716650a27d85c3d3

        SHA256

        677720072bdc5c71954cfa2639cbe2c7a3441bcedb449cf268b11d6d6976d541

        SHA512

        05902fa5fa2e469a4c8f9e528af3137204adae1c04bdefbaa27715348cbf15337b287dd30a077d49f080df7e0a6a8f952d2d9aba622305fd7018b1b916a66697

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3118.exe

        Filesize

        307KB

        MD5

        629dda5ab31b5b11d230e84414139176

        SHA1

        bb9c4ad31d94ab3a061a15ce716650a27d85c3d3

        SHA256

        677720072bdc5c71954cfa2639cbe2c7a3441bcedb449cf268b11d6d6976d541

        SHA512

        05902fa5fa2e469a4c8f9e528af3137204adae1c04bdefbaa27715348cbf15337b287dd30a077d49f080df7e0a6a8f952d2d9aba622305fd7018b1b916a66697

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1810.exe

        Filesize

        365KB

        MD5

        8e76bde4a687164be26b09df3c6373ff

        SHA1

        63da9a4432842d99f2ade0edd7df3f71cd43f7bd

        SHA256

        c0c5c89c17e2e509bec4ec3dcb14e14de910d2859f8bce8ac8918aac5656fa84

        SHA512

        8555657f01938f7dc08c304b71c1ace7f4e7d2ac2b3412768f0abd7a3b55929c29a5d1824e3ce307db2b43242b6805e13dc1577ebe88a7be724d3d08e2b5c1ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1810.exe

        Filesize

        365KB

        MD5

        8e76bde4a687164be26b09df3c6373ff

        SHA1

        63da9a4432842d99f2ade0edd7df3f71cd43f7bd

        SHA256

        c0c5c89c17e2e509bec4ec3dcb14e14de910d2859f8bce8ac8918aac5656fa84

        SHA512

        8555657f01938f7dc08c304b71c1ace7f4e7d2ac2b3412768f0abd7a3b55929c29a5d1824e3ce307db2b43242b6805e13dc1577ebe88a7be724d3d08e2b5c1ac

      • memory/1968-148-0x0000000004F60000-0x0000000005504000-memory.dmp

        Filesize

        5.6MB

      • memory/1968-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1968-150-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1968-152-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1968-151-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1968-153-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-154-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-156-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-158-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-160-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-162-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-164-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-166-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-168-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-170-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-172-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-174-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-176-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-178-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-180-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/1968-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1968-182-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1968-183-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1968-184-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1968-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2868-191-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-192-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-194-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-196-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-198-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-200-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-202-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-204-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-206-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-208-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-210-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-212-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-214-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-216-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-218-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-220-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-222-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-224-0x00000000052B0000-0x00000000052EF000-memory.dmp

        Filesize

        252KB

      • memory/2868-263-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-265-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-261-0x0000000002100000-0x000000000214B000-memory.dmp

        Filesize

        300KB

      • memory/2868-266-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/2868-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/2868-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/2868-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/2868-1105-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/2868-1107-0x0000000006710000-0x00000000067A2000-memory.dmp

        Filesize

        584KB

      • memory/2868-1109-0x00000000067E0000-0x0000000006856000-memory.dmp

        Filesize

        472KB

      • memory/2868-1110-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/2868-1111-0x00000000068F0000-0x0000000006AB2000-memory.dmp

        Filesize

        1.8MB

      • memory/2868-1112-0x0000000006AC0000-0x0000000006FEC000-memory.dmp

        Filesize

        5.2MB

      • memory/2868-1113-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-1114-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-1115-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2868-1116-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/4720-1122-0x0000000000CB0000-0x0000000000CE2000-memory.dmp

        Filesize

        200KB

      • memory/4720-1123-0x0000000005570000-0x0000000005580000-memory.dmp

        Filesize

        64KB

      • memory/4720-1124-0x0000000005570000-0x0000000005580000-memory.dmp

        Filesize

        64KB