Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 21:48

General

  • Target

    c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe

  • Size

    700KB

  • MD5

    9186474d288e94e19db82d309c7d4fc9

  • SHA1

    a984ae6b36af0d371faceb895fd6452f08414896

  • SHA256

    c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f

  • SHA512

    02c7ae2685019480bd9599c511fc9f3df23d684fcc3ef00d2b380c7ddc75afab7eaab551d29b819e0534a2dd1c38e2540e8dbc6e1053555c5093f39461bea0dd

  • SSDEEP

    12288:ZMrby90BIDzt/qeCaKh9Do1cA6j8FgX0aLrPKfjBRmcVocLDJNH:CyrtnpKc6j8WX0WsjBnBNH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe
    "C:\Users\Admin\AppData\Local\Temp\c7d318b942f17fa7059c3d3735f8ad7fff0fd74a2cb5baedf4da10a04093135f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374368.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374368.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1684.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1684.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 1084
          4⤵
          • Program crash
          PID:864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5742.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5742.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 1360
          4⤵
          • Program crash
          PID:2924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824525.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824525.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3380
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2000 -ip 2000
    1⤵
      PID:4192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3684 -ip 3684
      1⤵
        PID:4940

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824525.exe

        Filesize

        175KB

        MD5

        3e5f1669652a44498479869cc4654f70

        SHA1

        0f0ad0a31feba8bb58cc1869f4f2d10c83a48e0f

        SHA256

        042c25e657a89825eeb90d396f02bb7572987f009f1175d8c7e00754d3c643b7

        SHA512

        27e399ce7ede3559036ef79119bf3d55e5e61954e1a943f18081b5867e88ed5ea836c323cd49f587543de5d350d2d8d3f4fc56178db9c712856aeda992b5eb2f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824525.exe

        Filesize

        175KB

        MD5

        3e5f1669652a44498479869cc4654f70

        SHA1

        0f0ad0a31feba8bb58cc1869f4f2d10c83a48e0f

        SHA256

        042c25e657a89825eeb90d396f02bb7572987f009f1175d8c7e00754d3c643b7

        SHA512

        27e399ce7ede3559036ef79119bf3d55e5e61954e1a943f18081b5867e88ed5ea836c323cd49f587543de5d350d2d8d3f4fc56178db9c712856aeda992b5eb2f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374368.exe

        Filesize

        558KB

        MD5

        174f2d6318a6ae792987a2210a3928d9

        SHA1

        3c7cfb5c05897bb56f4734aec8a643567e948e83

        SHA256

        92164a92dc0fe8d92fdc462335ac595aa9df68c2b0aef65b429da18300bedffe

        SHA512

        5d4913c2c1966eb3605dc7e94bd60ccec5b7fd1b3bb6782f1dd0224ee3c59a7789fd898740878c1538ffdd8c504361f46bea5d74da6b3bd72e542d1b3bc5d714

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374368.exe

        Filesize

        558KB

        MD5

        174f2d6318a6ae792987a2210a3928d9

        SHA1

        3c7cfb5c05897bb56f4734aec8a643567e948e83

        SHA256

        92164a92dc0fe8d92fdc462335ac595aa9df68c2b0aef65b429da18300bedffe

        SHA512

        5d4913c2c1966eb3605dc7e94bd60ccec5b7fd1b3bb6782f1dd0224ee3c59a7789fd898740878c1538ffdd8c504361f46bea5d74da6b3bd72e542d1b3bc5d714

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1684.exe

        Filesize

        307KB

        MD5

        e0975014f3c18e095b89dbf76bf36ea9

        SHA1

        b2f3ce3fb366b9e18b22860dab14f70916b77107

        SHA256

        94ff8b5dc77ccb1bdd38f905d8d7f7e937ac7649027bb3d3ddfb8ff5afeb4ef9

        SHA512

        49a748f78014c44d183eea637fa64bc73fe46d72ca5e7cad4b0e9cf3a94024d1dec3641391638a55ecfd9d2fa78e28669b9e3ad762704dc37bfb9bf7b9ce3ea1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1684.exe

        Filesize

        307KB

        MD5

        e0975014f3c18e095b89dbf76bf36ea9

        SHA1

        b2f3ce3fb366b9e18b22860dab14f70916b77107

        SHA256

        94ff8b5dc77ccb1bdd38f905d8d7f7e937ac7649027bb3d3ddfb8ff5afeb4ef9

        SHA512

        49a748f78014c44d183eea637fa64bc73fe46d72ca5e7cad4b0e9cf3a94024d1dec3641391638a55ecfd9d2fa78e28669b9e3ad762704dc37bfb9bf7b9ce3ea1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5742.exe

        Filesize

        365KB

        MD5

        673c381373ea38866653e9fba7f081b1

        SHA1

        97c77d0c5e3383904190c3b67ff7b7e51e774678

        SHA256

        72bfa271e2985d76fed0097366a3a4ea351344eeea0627b7f8d3f472425b1b51

        SHA512

        2d07372eac30a21accb979fc21a6c8d1d01b5b1a1839b0d0d433d33900e4cadab3bf8f9318fdeb2cca9356d490c1420898302607c82283940c94c56bc1f46caa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5742.exe

        Filesize

        365KB

        MD5

        673c381373ea38866653e9fba7f081b1

        SHA1

        97c77d0c5e3383904190c3b67ff7b7e51e774678

        SHA256

        72bfa271e2985d76fed0097366a3a4ea351344eeea0627b7f8d3f472425b1b51

        SHA512

        2d07372eac30a21accb979fc21a6c8d1d01b5b1a1839b0d0d433d33900e4cadab3bf8f9318fdeb2cca9356d490c1420898302607c82283940c94c56bc1f46caa

      • memory/2000-148-0x0000000004C90000-0x0000000005234000-memory.dmp

        Filesize

        5.6MB

      • memory/2000-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2000-150-0x00000000027E0000-0x00000000027F0000-memory.dmp

        Filesize

        64KB

      • memory/2000-153-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-154-0x00000000027E0000-0x00000000027F0000-memory.dmp

        Filesize

        64KB

      • memory/2000-152-0x00000000027E0000-0x00000000027F0000-memory.dmp

        Filesize

        64KB

      • memory/2000-151-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-156-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-158-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-160-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-162-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-164-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-166-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-168-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-170-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-172-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-174-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-176-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-178-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-180-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/2000-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2000-182-0x00000000027E0000-0x00000000027F0000-memory.dmp

        Filesize

        64KB

      • memory/2000-183-0x00000000027E0000-0x00000000027F0000-memory.dmp

        Filesize

        64KB

      • memory/2000-184-0x00000000027E0000-0x00000000027F0000-memory.dmp

        Filesize

        64KB

      • memory/2000-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3380-1122-0x00000000001D0000-0x0000000000202000-memory.dmp

        Filesize

        200KB

      • memory/3380-1123-0x0000000004A60000-0x0000000004A70000-memory.dmp

        Filesize

        64KB

      • memory/3684-194-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-226-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-196-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-198-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-199-0x0000000000820000-0x000000000086B000-memory.dmp

        Filesize

        300KB

      • memory/3684-201-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-203-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-202-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-206-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-205-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-210-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-208-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-212-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-214-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-216-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-218-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-220-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-222-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-224-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-192-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-228-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-1101-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/3684-1102-0x0000000005AC0000-0x0000000005BCA000-memory.dmp

        Filesize

        1.0MB

      • memory/3684-1103-0x0000000005C00000-0x0000000005C12000-memory.dmp

        Filesize

        72KB

      • memory/3684-1104-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-1105-0x0000000005C20000-0x0000000005C5C000-memory.dmp

        Filesize

        240KB

      • memory/3684-1107-0x0000000005F10000-0x0000000005FA2000-memory.dmp

        Filesize

        584KB

      • memory/3684-1108-0x0000000005FB0000-0x0000000006016000-memory.dmp

        Filesize

        408KB

      • memory/3684-1109-0x00000000066B0000-0x0000000006726000-memory.dmp

        Filesize

        472KB

      • memory/3684-1110-0x0000000006740000-0x0000000006790000-memory.dmp

        Filesize

        320KB

      • memory/3684-1111-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-1112-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-1113-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3684-191-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/3684-1114-0x00000000067C0000-0x0000000006982000-memory.dmp

        Filesize

        1.8MB

      • memory/3684-1115-0x0000000006990000-0x0000000006EBC000-memory.dmp

        Filesize

        5.2MB

      • memory/3684-1116-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB