Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 21:59

General

  • Target

    0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe

  • Size

    699KB

  • MD5

    72f662e99029495da4fcffaf869297ab

  • SHA1

    4212846b0ab979c40fa414b8625e34ec6a2f38e0

  • SHA256

    0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426

  • SHA512

    f522319985e3e02a583638246b2a47ec7a867be07fc0d77c584b6cf4d8264bde8902a82e35ad9d8a971a0d951d953552e1591c29a8d37632f3cbbb9c6d6c4a4a

  • SSDEEP

    12288:wMrjy90aJIzLo0yCy2EYuVI4N7huajp8Ggaj70Tc087v5:DyVJIg0yCkpuajptgaH0V87x

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe
    "C:\Users\Admin\AppData\Local\Temp\0a92a9a50858f95532eb3096b73d24ba6d90cba9b7cdf40cdfee39be9f10e426.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576299.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576299.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2250.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2250.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 1084
          4⤵
          • Program crash
          PID:3464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4617.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4617.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 1348
          4⤵
          • Program crash
          PID:4356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si779815.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si779815.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1948
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4444
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4608 -ip 4608
    1⤵
      PID:380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3284 -ip 3284
      1⤵
        PID:948

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si779815.exe

        Filesize

        175KB

        MD5

        31261284ed51a095b49ca0acd10cbb97

        SHA1

        24b58b5fd96aacf57afba241fa69acaddfae347a

        SHA256

        e0e36c53e348ff60ad6b75ff246321e343859b4331e254980ae6335aca8941ed

        SHA512

        4d9c83166c008ad0ac0af428293bc7eda882360b03cbcade227a514b271dd9eb74d093790c93348dd9a5fe0ea4ff3d721a545a410304a516a48a695601dc0f4b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si779815.exe

        Filesize

        175KB

        MD5

        31261284ed51a095b49ca0acd10cbb97

        SHA1

        24b58b5fd96aacf57afba241fa69acaddfae347a

        SHA256

        e0e36c53e348ff60ad6b75ff246321e343859b4331e254980ae6335aca8941ed

        SHA512

        4d9c83166c008ad0ac0af428293bc7eda882360b03cbcade227a514b271dd9eb74d093790c93348dd9a5fe0ea4ff3d721a545a410304a516a48a695601dc0f4b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576299.exe

        Filesize

        557KB

        MD5

        563609d3e43a20ddd16ec33ed212c1d8

        SHA1

        da262e846123bb3b16453349efdcaabf8a24b42e

        SHA256

        5f0a99a1e4de1659465e764fc81e0e16f41f2ec49e81563fd0342dc9b0d6c1b2

        SHA512

        8fd431f9bbd0f8d4aa50c4b22af617554149127edf782696e98f4d23ac134f71c3ec75114031b09968043cee286aeea032fa01d75ea9a14724b0eab618e9dcac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un576299.exe

        Filesize

        557KB

        MD5

        563609d3e43a20ddd16ec33ed212c1d8

        SHA1

        da262e846123bb3b16453349efdcaabf8a24b42e

        SHA256

        5f0a99a1e4de1659465e764fc81e0e16f41f2ec49e81563fd0342dc9b0d6c1b2

        SHA512

        8fd431f9bbd0f8d4aa50c4b22af617554149127edf782696e98f4d23ac134f71c3ec75114031b09968043cee286aeea032fa01d75ea9a14724b0eab618e9dcac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2250.exe

        Filesize

        307KB

        MD5

        e548fc6b3464f90262814e2a412ad824

        SHA1

        7ed7992b9cb3755dcca7d68e96335d3be83b4c11

        SHA256

        94ff93e117ac03c77fd613466014f53760c9962de30d192cdf1c62438ccefc9b

        SHA512

        bc4aeed66da6516dd20ed240e50c9ebdc3214c634ce821a2267a575522c43aa36ab15701ae98d16ba9b995c9c0377b01b8811523c23de4a7a9a8cbf9e7c78eff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2250.exe

        Filesize

        307KB

        MD5

        e548fc6b3464f90262814e2a412ad824

        SHA1

        7ed7992b9cb3755dcca7d68e96335d3be83b4c11

        SHA256

        94ff93e117ac03c77fd613466014f53760c9962de30d192cdf1c62438ccefc9b

        SHA512

        bc4aeed66da6516dd20ed240e50c9ebdc3214c634ce821a2267a575522c43aa36ab15701ae98d16ba9b995c9c0377b01b8811523c23de4a7a9a8cbf9e7c78eff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4617.exe

        Filesize

        365KB

        MD5

        ef93d74ba47a1f6df4d889841454da58

        SHA1

        3dcafc154866eb589929eacf739a50a86c62ac57

        SHA256

        79131adbd4a7b0bdb60541b4de6aefbcbfe25bc2fefb3f703b9e6f1838498af0

        SHA512

        975de3a3e2f9a258f34c9f444d71b7da703f5e3b0315ee2e89fa874c782a714508488b127c8bbbdefed8579e457f8301287956f7ccee0ec560144af5171e12d2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4617.exe

        Filesize

        365KB

        MD5

        ef93d74ba47a1f6df4d889841454da58

        SHA1

        3dcafc154866eb589929eacf739a50a86c62ac57

        SHA256

        79131adbd4a7b0bdb60541b4de6aefbcbfe25bc2fefb3f703b9e6f1838498af0

        SHA512

        975de3a3e2f9a258f34c9f444d71b7da703f5e3b0315ee2e89fa874c782a714508488b127c8bbbdefed8579e457f8301287956f7ccee0ec560144af5171e12d2

      • memory/1948-1133-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/1948-1132-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/1948-1131-0x00000000004B0000-0x00000000004E2000-memory.dmp

        Filesize

        200KB

      • memory/3284-1110-0x0000000004DE0000-0x0000000004EEA000-memory.dmp

        Filesize

        1.0MB

      • memory/3284-1113-0x0000000005B30000-0x0000000005B6C000-memory.dmp

        Filesize

        240KB

      • memory/3284-1124-0x00000000081F0000-0x0000000008240000-memory.dmp

        Filesize

        320KB

      • memory/3284-1123-0x0000000002810000-0x0000000002886000-memory.dmp

        Filesize

        472KB

      • memory/3284-1122-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-1121-0x00000000067A0000-0x0000000006CCC000-memory.dmp

        Filesize

        5.2MB

      • memory/3284-1120-0x00000000065D0000-0x0000000006792000-memory.dmp

        Filesize

        1.8MB

      • memory/3284-1119-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/3284-1118-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/3284-1117-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-1116-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-1115-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-1112-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-1111-0x0000000004F20000-0x0000000004F32000-memory.dmp

        Filesize

        72KB

      • memory/3284-1109-0x0000000005510000-0x0000000005B28000-memory.dmp

        Filesize

        6.1MB

      • memory/3284-236-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-234-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-232-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-230-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-228-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-200-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-199-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-202-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-204-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-206-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-208-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-210-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-212-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-216-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-214-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-219-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-221-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-222-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-223-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-226-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3284-224-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3284-218-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4608-178-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-191-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4608-158-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-192-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4608-173-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4608-190-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4608-156-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-174-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-182-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-164-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-180-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-176-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-194-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4608-160-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-189-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4608-170-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-172-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4608-168-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-166-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-162-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-154-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-153-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4608-152-0x0000000004FA0000-0x0000000005544000-memory.dmp

        Filesize

        5.6MB

      • memory/4608-151-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4608-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB