Analysis

  • max time kernel
    90s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:08

General

  • Target

    ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe

  • Size

    699KB

  • MD5

    86bdae3c1649572aa6ad1a4975b4b89a

  • SHA1

    2c4f511d4708900b857b91f83683b308e8f725ea

  • SHA256

    ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac

  • SHA512

    9633d3c128f8b6ddeace8cae2221c72ce088751d9b8d98841db366db4aa7747ed5293879db5d81f0bfc9e81432e699b3d00023cda97f0cb14d02ff74bb750309

  • SSDEEP

    12288:0Mr4y90RGOpp46GHom5bmGgJA9DSpcAmn3dKORj7CB/AZnr39G:UyAGZ6GHoCJgJMKGHCBC39G

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe
    "C:\Users\Admin\AppData\Local\Temp\ff293f9f892ba89a0a4cc757b5df155643d39880c4186651944fc5d31bd96dac.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619617.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619617.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3445.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3445.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 1100
          4⤵
          • Program crash
          PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1394.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 1592
          4⤵
          • Program crash
          PID:4332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670217.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3516 -ip 3516
    1⤵
      PID:3448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2424 -ip 2424
      1⤵
        PID:4244

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670217.exe

        Filesize

        175KB

        MD5

        4afe90d9f62a90eb2d9734bb5fc0e556

        SHA1

        a2469cde82905a62e073b0ec86a87854841b6088

        SHA256

        da183eefc4cc0a7dcabf5f977baa5214488119e5f706eed19ff1422c35c5e250

        SHA512

        52f19fd83a9fcbce79e64358716c894d0fd58800ec23ee560c9b2f26f4e43d00cd7996484eb193d97d0db047c659442643c528c53d83b8eabd0147e18fd6d0b1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670217.exe

        Filesize

        175KB

        MD5

        4afe90d9f62a90eb2d9734bb5fc0e556

        SHA1

        a2469cde82905a62e073b0ec86a87854841b6088

        SHA256

        da183eefc4cc0a7dcabf5f977baa5214488119e5f706eed19ff1422c35c5e250

        SHA512

        52f19fd83a9fcbce79e64358716c894d0fd58800ec23ee560c9b2f26f4e43d00cd7996484eb193d97d0db047c659442643c528c53d83b8eabd0147e18fd6d0b1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619617.exe

        Filesize

        557KB

        MD5

        4b62f95103c90b577b75a1d2193d781b

        SHA1

        d6a7bde6b2e3c27ec14f2348233129a7f0583bda

        SHA256

        f7ca8a1744c32e835096f04809f48d79f601607b6ee7e16973eeb3774ef9e075

        SHA512

        31f3b493e4b20aab45e1a4916196a1e186a88a54c7dbb6fa4cdfd8a89e8d79355168b5a2aa1e3d13144f4023f6a8ac10234fda9f5f704f9f6f2dbdbbb33f8519

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un619617.exe

        Filesize

        557KB

        MD5

        4b62f95103c90b577b75a1d2193d781b

        SHA1

        d6a7bde6b2e3c27ec14f2348233129a7f0583bda

        SHA256

        f7ca8a1744c32e835096f04809f48d79f601607b6ee7e16973eeb3774ef9e075

        SHA512

        31f3b493e4b20aab45e1a4916196a1e186a88a54c7dbb6fa4cdfd8a89e8d79355168b5a2aa1e3d13144f4023f6a8ac10234fda9f5f704f9f6f2dbdbbb33f8519

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3445.exe

        Filesize

        307KB

        MD5

        e2f51f6756e39b406ea445bc8599781f

        SHA1

        24a53d9bba526c363ef2d785c864c9fe46b74c04

        SHA256

        e7ec40cf138c55ab0a4808721f6078d55bde9286b4065a9fb0c9659a9dba54fe

        SHA512

        ec40b294efcef01a62574bfbcfb90066cad3adab8fe2078e505e1439311849eeb21984f137d3f947a690d4374680e38d0d12ef14c4237e38a669b8de9cf0ed4e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3445.exe

        Filesize

        307KB

        MD5

        e2f51f6756e39b406ea445bc8599781f

        SHA1

        24a53d9bba526c363ef2d785c864c9fe46b74c04

        SHA256

        e7ec40cf138c55ab0a4808721f6078d55bde9286b4065a9fb0c9659a9dba54fe

        SHA512

        ec40b294efcef01a62574bfbcfb90066cad3adab8fe2078e505e1439311849eeb21984f137d3f947a690d4374680e38d0d12ef14c4237e38a669b8de9cf0ed4e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1394.exe

        Filesize

        365KB

        MD5

        0c3cfbfe3142b54fd4b7aa21a7236f28

        SHA1

        d875845dee14f0aead0083e391918b8faf8212de

        SHA256

        ad632b950eaee1bb7cc24999d6aa7cd530695dc6a1dd1ac6bda7e4ae6cc7fcfa

        SHA512

        d219454f5e30656d74fb48d5fb48761f2bdc68e568a2ab7c2729da81ceae65bf7cf1ebe075ca79c94f501ab6fdac007d27df9505191a05f0848bd75db13a3b71

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1394.exe

        Filesize

        365KB

        MD5

        0c3cfbfe3142b54fd4b7aa21a7236f28

        SHA1

        d875845dee14f0aead0083e391918b8faf8212de

        SHA256

        ad632b950eaee1bb7cc24999d6aa7cd530695dc6a1dd1ac6bda7e4ae6cc7fcfa

        SHA512

        d219454f5e30656d74fb48d5fb48761f2bdc68e568a2ab7c2729da81ceae65bf7cf1ebe075ca79c94f501ab6fdac007d27df9505191a05f0848bd75db13a3b71

      • memory/2116-1123-0x0000000005290000-0x00000000052A0000-memory.dmp

        Filesize

        64KB

      • memory/2116-1122-0x00000000006F0000-0x0000000000722000-memory.dmp

        Filesize

        200KB

      • memory/2424-1102-0x0000000005B60000-0x0000000005C6A000-memory.dmp

        Filesize

        1.0MB

      • memory/2424-1104-0x0000000005C70000-0x0000000005CAC000-memory.dmp

        Filesize

        240KB

      • memory/2424-1116-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/2424-1115-0x0000000006A30000-0x0000000006BF2000-memory.dmp

        Filesize

        1.8MB

      • memory/2424-1114-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-1113-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-1111-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-1112-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-1109-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/2424-1108-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/2424-1107-0x0000000006610000-0x00000000066A2000-memory.dmp

        Filesize

        584KB

      • memory/2424-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/2424-1105-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-1103-0x0000000004E50000-0x0000000004E62000-memory.dmp

        Filesize

        72KB

      • memory/2424-1101-0x0000000005540000-0x0000000005B58000-memory.dmp

        Filesize

        6.1MB

      • memory/2424-228-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-226-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-224-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-222-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-220-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-218-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-199-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-197-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/2424-201-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-203-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/2424-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-214-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/2424-216-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3516-174-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-183-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3516-154-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3516-184-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3516-172-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-182-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3516-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3516-170-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-180-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-155-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-178-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-176-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3516-156-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3516-149-0x0000000000910000-0x000000000093D000-memory.dmp

        Filesize

        180KB

      • memory/3516-168-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-166-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-164-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-162-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-160-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-158-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-151-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3516-152-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-150-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3516-148-0x0000000004DB0000-0x0000000005354000-memory.dmp

        Filesize

        5.6MB