Analysis

  • max time kernel
    131s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:01

General

  • Target

    04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe

  • Size

    700KB

  • MD5

    717514ae15efcee981b46931e0052845

  • SHA1

    b4bb3b60e8cd8d00eaf9efe980f2a29cf2eb657e

  • SHA256

    04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd

  • SHA512

    5d1f9b64d636008c4e321300921f7e1080535c038a1b0b391e910f4932462ad05b2c05d1315e1c9ec26ebdc4ba3b13e2ecd5ac5c226b69b222590acb942da0d5

  • SSDEEP

    12288:yMrEy90KqRrQUKwSYNQo7vE0uQxx0qH1ojIBH5f1Dlqv3:2ydqRrRKwXndFx0qHUSZDq/

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe
    "C:\Users\Admin\AppData\Local\Temp\04220ad921c7d7a76c84e673d7f896de7536844332d7db346567c8ae741cbfdd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8408.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8408.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1088
          4⤵
          • Program crash
          PID:3336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6888.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6888.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 1352
          4⤵
          • Program crash
          PID:2220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024128.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024128.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4204
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1800 -ip 1800
    1⤵
      PID:3064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2436 -ip 2436
      1⤵
        PID:4040
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4176

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024128.exe

        Filesize

        175KB

        MD5

        d53a8a5c4765638c8011383f2ff14309

        SHA1

        c735f69b1640c39cb51ec40bb951032c465c22f4

        SHA256

        a62c829832fad1462c6ba19220a8e6f20d525e7a3e3aec45fb91268f43e29a43

        SHA512

        d2e9246bc44f2b3c4b0ae53bd1f6be5116946332a4b3d70f2b2aedbfdb03508cbcae78cc4264ee8615236f258771a734811f51ecf8650b4b1f127725219b04fe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024128.exe

        Filesize

        175KB

        MD5

        d53a8a5c4765638c8011383f2ff14309

        SHA1

        c735f69b1640c39cb51ec40bb951032c465c22f4

        SHA256

        a62c829832fad1462c6ba19220a8e6f20d525e7a3e3aec45fb91268f43e29a43

        SHA512

        d2e9246bc44f2b3c4b0ae53bd1f6be5116946332a4b3d70f2b2aedbfdb03508cbcae78cc4264ee8615236f258771a734811f51ecf8650b4b1f127725219b04fe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356544.exe

        Filesize

        558KB

        MD5

        1dcc45898b48cf89060d97065d8363d8

        SHA1

        17ebf85300714b275382f2cf1cd4e7076fa3d0b9

        SHA256

        a027901710a6f1bd6eb084a8831a931c7823953674cc176dad2572530d39a9cb

        SHA512

        d04d5733eb66562f137e99e486e76f4ee1044a9d9cbe5c93b1d59147e7c609937ec425023d21cb0e510ecac61c142dec170ba9efa528be9f92617a09c5b3c197

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356544.exe

        Filesize

        558KB

        MD5

        1dcc45898b48cf89060d97065d8363d8

        SHA1

        17ebf85300714b275382f2cf1cd4e7076fa3d0b9

        SHA256

        a027901710a6f1bd6eb084a8831a931c7823953674cc176dad2572530d39a9cb

        SHA512

        d04d5733eb66562f137e99e486e76f4ee1044a9d9cbe5c93b1d59147e7c609937ec425023d21cb0e510ecac61c142dec170ba9efa528be9f92617a09c5b3c197

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8408.exe

        Filesize

        307KB

        MD5

        13e8283b9040acce14124470aa5d0a9a

        SHA1

        7db803114f3350150f0d66ecea03f6c9fda19cbc

        SHA256

        673f3a1a2c8afe694123cd9b3a86ec773bc73b1935c8f67b491c6f45a365ca1e

        SHA512

        7014baff713be88a2b3b72e48f0ae8d00a6a401dc149cb5ec086c72f24311fe6b109b0b21f3c3d92190c061f07d590d83f50dd9a0271f0a73e3d033ec3916c10

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8408.exe

        Filesize

        307KB

        MD5

        13e8283b9040acce14124470aa5d0a9a

        SHA1

        7db803114f3350150f0d66ecea03f6c9fda19cbc

        SHA256

        673f3a1a2c8afe694123cd9b3a86ec773bc73b1935c8f67b491c6f45a365ca1e

        SHA512

        7014baff713be88a2b3b72e48f0ae8d00a6a401dc149cb5ec086c72f24311fe6b109b0b21f3c3d92190c061f07d590d83f50dd9a0271f0a73e3d033ec3916c10

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6888.exe

        Filesize

        365KB

        MD5

        d3833045c5d223fd21f8108c9c11b4db

        SHA1

        b754b693c02327e593a14da2aeed12dbc2f71bad

        SHA256

        2313b9722d3974dbb740027b1e22125a86d4d1c518f427005bf67a8b62728dc8

        SHA512

        3c1c52ef0d68726ab58c9713e532780c0da9af35264d5b87afd1f946072f8505042a18f3ca0ff9167c427bb4069d87e5f40292dd2386de1962ebdfb9621d5310

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6888.exe

        Filesize

        365KB

        MD5

        d3833045c5d223fd21f8108c9c11b4db

        SHA1

        b754b693c02327e593a14da2aeed12dbc2f71bad

        SHA256

        2313b9722d3974dbb740027b1e22125a86d4d1c518f427005bf67a8b62728dc8

        SHA512

        3c1c52ef0d68726ab58c9713e532780c0da9af35264d5b87afd1f946072f8505042a18f3ca0ff9167c427bb4069d87e5f40292dd2386de1962ebdfb9621d5310

      • memory/1800-149-0x0000000004EA0000-0x0000000005444000-memory.dmp

        Filesize

        5.6MB

      • memory/1800-148-0x0000000000800000-0x000000000082D000-memory.dmp

        Filesize

        180KB

      • memory/1800-150-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/1800-151-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/1800-152-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/1800-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1800-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1800-182-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/1800-183-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/1800-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2436-190-0x0000000000AC0000-0x0000000000B0B000-memory.dmp

        Filesize

        300KB

      • memory/2436-191-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-192-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-194-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-223-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-225-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-227-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2436-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/2436-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/2436-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/2436-1103-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/2436-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/2436-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/2436-1108-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-1109-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-1110-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-1111-0x0000000006820000-0x0000000006896000-memory.dmp

        Filesize

        472KB

      • memory/2436-1112-0x00000000068B0000-0x0000000006900000-memory.dmp

        Filesize

        320KB

      • memory/2436-1113-0x0000000004D30000-0x0000000004D40000-memory.dmp

        Filesize

        64KB

      • memory/2436-1114-0x0000000006930000-0x0000000006AF2000-memory.dmp

        Filesize

        1.8MB

      • memory/2436-1115-0x0000000006B00000-0x000000000702C000-memory.dmp

        Filesize

        5.2MB

      • memory/4204-1121-0x00000000008B0000-0x00000000008E2000-memory.dmp

        Filesize

        200KB

      • memory/4204-1122-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB