Analysis

  • max time kernel
    92s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:04

General

  • Target

    0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7.exe

  • Size

    699KB

  • MD5

    d9c0f2cf1287db246724ac4f7e1cb2ef

  • SHA1

    5078e2c2268c4c02e569f2ab00241dcd47035123

  • SHA256

    0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7

  • SHA512

    8a5055ce5954599b3e7cff7e4c16b0f2a5967caf4043727ae4e49c8d24959e7e22bd8995840f8c71d5774fd2d3a058913d12d75ec1a2b0568844bbb1fc1914e9

  • SSDEEP

    12288:kMrZy90Etf6B6Sxb9D7hcA5JOAO9vp0kj7ASiz5/nRz:FyJSB625JOAy9HAL/nRz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097186.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097186.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7264.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 1084
          4⤵
          • Program crash
          PID:4680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2762.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2762.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 1348
          4⤵
          • Program crash
          PID:1496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si100084.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si100084.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3192
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1640 -ip 1640
    1⤵
      PID:3856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4596 -ip 4596
      1⤵
        PID:2428

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si100084.exe

        Filesize

        175KB

        MD5

        54864770c9a98d9102d70f0dbea8f09b

        SHA1

        2b0dacaca3eb4a8f29417672c5bec87b3169a3c0

        SHA256

        858d762925892bd486996605c764b747eb6c6265b323e2bdc8f1ba6248b3f8db

        SHA512

        24bb0fdc4cd8cb997e57f3e42a38221cf87788b1459799bfb19e72846770f50e599fb9077b102bd7470b506c25a8d88044412dd48d1ad84e60695db42fa25e1c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si100084.exe

        Filesize

        175KB

        MD5

        54864770c9a98d9102d70f0dbea8f09b

        SHA1

        2b0dacaca3eb4a8f29417672c5bec87b3169a3c0

        SHA256

        858d762925892bd486996605c764b747eb6c6265b323e2bdc8f1ba6248b3f8db

        SHA512

        24bb0fdc4cd8cb997e57f3e42a38221cf87788b1459799bfb19e72846770f50e599fb9077b102bd7470b506c25a8d88044412dd48d1ad84e60695db42fa25e1c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097186.exe

        Filesize

        557KB

        MD5

        15df68528dad136c80a676f54bda1268

        SHA1

        e770263774677d3ab98ca2d3df7c2ece8d738be6

        SHA256

        d712e111bd76eda5e2315bd0a8235eb9ff9d6f83f2a03dd3c538314cdbe0cbf2

        SHA512

        453c8512e6d377ef32deaa774f5c7f3fe373e5622a3f594570f0de2893c0e5fe5ac6ac34c567517c6bb9a895bd4914360af2a13983a89b83a93df6b8cd51c800

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097186.exe

        Filesize

        557KB

        MD5

        15df68528dad136c80a676f54bda1268

        SHA1

        e770263774677d3ab98ca2d3df7c2ece8d738be6

        SHA256

        d712e111bd76eda5e2315bd0a8235eb9ff9d6f83f2a03dd3c538314cdbe0cbf2

        SHA512

        453c8512e6d377ef32deaa774f5c7f3fe373e5622a3f594570f0de2893c0e5fe5ac6ac34c567517c6bb9a895bd4914360af2a13983a89b83a93df6b8cd51c800

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7264.exe

        Filesize

        307KB

        MD5

        743590a345fd95baac5efa95e5c2d119

        SHA1

        82588498811b30ca26db995c2f8d71c452b94fbd

        SHA256

        80c36f8f90f37a67f6f66545237902358d5bf975e3bd5b4e9c163943e02f2afb

        SHA512

        5527b1471136f645e0ef970e7e1d6ac15b73dc8566eb692e69c68158572af64d35158f448e3352af2f2c46ff315b1e446a0bd347d3d4005e2ffae1e4d01ae661

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7264.exe

        Filesize

        307KB

        MD5

        743590a345fd95baac5efa95e5c2d119

        SHA1

        82588498811b30ca26db995c2f8d71c452b94fbd

        SHA256

        80c36f8f90f37a67f6f66545237902358d5bf975e3bd5b4e9c163943e02f2afb

        SHA512

        5527b1471136f645e0ef970e7e1d6ac15b73dc8566eb692e69c68158572af64d35158f448e3352af2f2c46ff315b1e446a0bd347d3d4005e2ffae1e4d01ae661

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2762.exe

        Filesize

        365KB

        MD5

        0d8955419a4fe84926d41db5bdb54825

        SHA1

        f0fd72fdc7afa2bc33873051b82d67a53207e94b

        SHA256

        c8aebc3990468652a9a7d15933d61641dae5db4bc37d3c70ed9fe018fcc374a4

        SHA512

        3a3632b65db78ad2c9bc2e0094490baded70baa316e1a9b4141f6403e63cb97fedb918cdb068f9811bee82c97c6855cbdc363916d5c8908eef93b26f29c82ba6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2762.exe

        Filesize

        365KB

        MD5

        0d8955419a4fe84926d41db5bdb54825

        SHA1

        f0fd72fdc7afa2bc33873051b82d67a53207e94b

        SHA256

        c8aebc3990468652a9a7d15933d61641dae5db4bc37d3c70ed9fe018fcc374a4

        SHA512

        3a3632b65db78ad2c9bc2e0094490baded70baa316e1a9b4141f6403e63cb97fedb918cdb068f9811bee82c97c6855cbdc363916d5c8908eef93b26f29c82ba6

      • memory/1640-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1640-149-0x0000000005020000-0x00000000055C4000-memory.dmp

        Filesize

        5.6MB

      • memory/1640-150-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-151-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-153-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-155-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-157-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-159-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-161-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-163-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-165-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-167-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-169-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-171-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-173-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-175-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-177-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/1640-178-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/1640-179-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/1640-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1640-182-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/1640-183-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/1640-184-0x0000000005010000-0x0000000005020000-memory.dmp

        Filesize

        64KB

      • memory/1640-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3192-1121-0x0000000005160000-0x0000000005170000-memory.dmp

        Filesize

        64KB

      • memory/3192-1120-0x0000000000560000-0x0000000000592000-memory.dmp

        Filesize

        200KB

      • memory/4596-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-406-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4596-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-223-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-405-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4596-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-408-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4596-410-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4596-1100-0x0000000005450000-0x0000000005A68000-memory.dmp

        Filesize

        6.1MB

      • memory/4596-1101-0x0000000005A70000-0x0000000005B7A000-memory.dmp

        Filesize

        1.0MB

      • memory/4596-1102-0x0000000004E10000-0x0000000004E22000-memory.dmp

        Filesize

        72KB

      • memory/4596-1103-0x0000000004E30000-0x0000000004E6C000-memory.dmp

        Filesize

        240KB

      • memory/4596-1104-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4596-1105-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4596-1106-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4596-1107-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/4596-1109-0x00000000068B0000-0x0000000006DDC000-memory.dmp

        Filesize

        5.2MB

      • memory/4596-1110-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4596-1111-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4596-1112-0x0000000007060000-0x00000000070D6000-memory.dmp

        Filesize

        472KB

      • memory/4596-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-190-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4596-1113-0x00000000070E0000-0x0000000007130000-memory.dmp

        Filesize

        320KB

      • memory/4596-1114-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB