Analysis

  • max time kernel
    83s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:03

General

  • Target

    329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe

  • Size

    700KB

  • MD5

    dddfcbed91b285be083eff7fb9ca192a

  • SHA1

    fe1a52dac4971628beaf625842e8ce434399d752

  • SHA256

    329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e

  • SHA512

    57761de9e3aceb18d91d8621184f0cfdc2040cfa38e25dcb81d4a9f55b41b44a2e7f89a7b9e44baad0a07cf485f4a4921467731352645629d8f6cf49ad782a04

  • SSDEEP

    12288:IMr9y90FXGfzQy0iYW9DuTcAYNGeloatZQMC+zHHqFIiQlK:1y+WfKiiHelPtZo+HxK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe
    "C:\Users\Admin\AppData\Local\Temp\329fbfc3a516c146eace98302a4647b09ba1c8603cf644872f28d935b3140e7e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479822.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479822.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6548.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6548.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 1092
          4⤵
          • Program crash
          PID:1784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5187.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 1348
          4⤵
          • Program crash
          PID:3196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428938.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428938.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4812
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5064 -ip 5064
    1⤵
      PID:4344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4100 -ip 4100
      1⤵
        PID:4972

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428938.exe

        Filesize

        175KB

        MD5

        5128ba2c442c1b12e24e27b261b602b9

        SHA1

        0478e3a20d8705421d2d8c5190d57ea4b425e472

        SHA256

        2d2c29290880071f56dcc5d1b6443af6b4d8f1cf1950f6bc9848f34be4ec63e8

        SHA512

        bada1ef68ae1e319c6b8af47590b048a995adf10c4c98526999508ac35de42c61310a46beac4c11c688087f8fbfea5e0110be2c43224f8aed00f8ebb1e25db81

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428938.exe

        Filesize

        175KB

        MD5

        5128ba2c442c1b12e24e27b261b602b9

        SHA1

        0478e3a20d8705421d2d8c5190d57ea4b425e472

        SHA256

        2d2c29290880071f56dcc5d1b6443af6b4d8f1cf1950f6bc9848f34be4ec63e8

        SHA512

        bada1ef68ae1e319c6b8af47590b048a995adf10c4c98526999508ac35de42c61310a46beac4c11c688087f8fbfea5e0110be2c43224f8aed00f8ebb1e25db81

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479822.exe

        Filesize

        558KB

        MD5

        e4966c179303a62e8cb9c848cf6d93cd

        SHA1

        5dd13f8a04f0dc612a826959b309811afe571aed

        SHA256

        65d0eb672becd4f2cbfc1f26faaeb6b863373cbf44465ad9fcaa0d939615d303

        SHA512

        fe8f31cf593424754bc436fab24adfda397fec76ca85a9d8b1372d9c0c6910a775c44ce5649b02613a669f3c28657f63a23ef626d104b7a0e1ed473760b4b1c6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479822.exe

        Filesize

        558KB

        MD5

        e4966c179303a62e8cb9c848cf6d93cd

        SHA1

        5dd13f8a04f0dc612a826959b309811afe571aed

        SHA256

        65d0eb672becd4f2cbfc1f26faaeb6b863373cbf44465ad9fcaa0d939615d303

        SHA512

        fe8f31cf593424754bc436fab24adfda397fec76ca85a9d8b1372d9c0c6910a775c44ce5649b02613a669f3c28657f63a23ef626d104b7a0e1ed473760b4b1c6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6548.exe

        Filesize

        307KB

        MD5

        fae5a438c78d6a23db085b53a1e40537

        SHA1

        10575440059224983c1d92cd85b08a0a82c0aa41

        SHA256

        1f4a7f79137fda57a93517dacfd14838a6f90a402bd0ac8399629f410632393a

        SHA512

        55caccf47c437ccfbb9d867f284f121843b7aa4ed6e3084b7e84683b4c2ac3e6d8cebd4f32d88ff7b846065fb824a7171ec8849e49bcc2d6b4984a83523784f0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6548.exe

        Filesize

        307KB

        MD5

        fae5a438c78d6a23db085b53a1e40537

        SHA1

        10575440059224983c1d92cd85b08a0a82c0aa41

        SHA256

        1f4a7f79137fda57a93517dacfd14838a6f90a402bd0ac8399629f410632393a

        SHA512

        55caccf47c437ccfbb9d867f284f121843b7aa4ed6e3084b7e84683b4c2ac3e6d8cebd4f32d88ff7b846065fb824a7171ec8849e49bcc2d6b4984a83523784f0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5187.exe

        Filesize

        365KB

        MD5

        0674f13c5ad63bd64e4dd70ddcc9553d

        SHA1

        7735dd1c7b43b8e129e57ce89b7bc5ef117ac319

        SHA256

        32b5d9c8ab07c21902305d3a2b74b0a3940e64777a7b54b0df47fbfe5b6fe325

        SHA512

        fab4766bb1ceb5c6e1817083130f83c39eafe5f032dc3f59ad24d7d2ec592d102163c02151cd01a036d78fd8ae41ca736720cba2e526f743397f64536241ed4d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5187.exe

        Filesize

        365KB

        MD5

        0674f13c5ad63bd64e4dd70ddcc9553d

        SHA1

        7735dd1c7b43b8e129e57ce89b7bc5ef117ac319

        SHA256

        32b5d9c8ab07c21902305d3a2b74b0a3940e64777a7b54b0df47fbfe5b6fe325

        SHA512

        fab4766bb1ceb5c6e1817083130f83c39eafe5f032dc3f59ad24d7d2ec592d102163c02151cd01a036d78fd8ae41ca736720cba2e526f743397f64536241ed4d

      • memory/4100-407-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-1102-0x0000000004D10000-0x0000000004D22000-memory.dmp

        Filesize

        72KB

      • memory/4100-1115-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-1114-0x0000000006990000-0x0000000006EBC000-memory.dmp

        Filesize

        5.2MB

      • memory/4100-1113-0x00000000067C0000-0x0000000006982000-memory.dmp

        Filesize

        1.8MB

      • memory/4100-1112-0x0000000006740000-0x0000000006790000-memory.dmp

        Filesize

        320KB

      • memory/4100-1111-0x00000000066C0000-0x0000000006736000-memory.dmp

        Filesize

        472KB

      • memory/4100-1110-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-1109-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-1108-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4100-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4100-1104-0x0000000004D30000-0x0000000004D6C000-memory.dmp

        Filesize

        240KB

      • memory/4100-1103-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-1101-0x0000000005AA0000-0x0000000005BAA000-memory.dmp

        Filesize

        1.0MB

      • memory/4100-1100-0x0000000005480000-0x0000000005A98000-memory.dmp

        Filesize

        6.1MB

      • memory/4100-404-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-401-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4100-400-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4100-223-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-221-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-219-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-190-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-191-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-193-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-195-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-197-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-199-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-201-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-203-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-205-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-207-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-209-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-211-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-213-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-215-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4100-217-0x00000000027B0000-0x00000000027EF000-memory.dmp

        Filesize

        252KB

      • memory/4812-1121-0x0000000000E90000-0x0000000000EC2000-memory.dmp

        Filesize

        200KB

      • memory/4812-1122-0x0000000003360000-0x0000000003370000-memory.dmp

        Filesize

        64KB

      • memory/5064-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/5064-182-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/5064-181-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/5064-150-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/5064-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/5064-179-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-177-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-175-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-183-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/5064-165-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-167-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-169-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-163-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-161-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-159-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-157-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-155-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-149-0x0000000004D80000-0x0000000005324000-memory.dmp

        Filesize

        5.6MB

      • memory/5064-171-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5064-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/5064-151-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB