Analysis

  • max time kernel
    61s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:14

General

  • Target

    dcb48e993616f749cbe9d7fb1046b26ae12ae3c06c391e7a6263b80d18156876.exe

  • Size

    699KB

  • MD5

    82fa2f893b95f6ab11a9ae6cbd3dbb18

  • SHA1

    85289d7aafc031b688a1ba7e7ab96a255a3950a6

  • SHA256

    dcb48e993616f749cbe9d7fb1046b26ae12ae3c06c391e7a6263b80d18156876

  • SHA512

    131534f805c14bf64dc118844b1d48e4e1db60c319250894c000da2f5c17dc02b8f68633b29a32a88096e9d0f705166d7f88b80a9339f63be47e81430cc60344

  • SSDEEP

    12288:aMrCy90l21BMFJ4mGgPgVWGm+8yyPijbj7klwMkAm:QyT1qPgV4yyPiHHklwMkAm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcb48e993616f749cbe9d7fb1046b26ae12ae3c06c391e7a6263b80d18156876.exe
    "C:\Users\Admin\AppData\Local\Temp\dcb48e993616f749cbe9d7fb1046b26ae12ae3c06c391e7a6263b80d18156876.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775490.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775490.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9468.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9468.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 1036
          4⤵
          • Program crash
          PID:4880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2117.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2117.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 1328
          4⤵
          • Program crash
          PID:2108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488383.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488383.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3588
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 772 -ip 772
    1⤵
      PID:4052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3548 -ip 3548
      1⤵
        PID:2112

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488383.exe

        Filesize

        175KB

        MD5

        420f83b565f709722f2c352c7e329069

        SHA1

        43588449f59ecec6ae6cdcbcf4aebb5ae190ded8

        SHA256

        a0b0d5cd000a52074ed8da37784a6cff0dc70593f6738399d747bd6aedb2b9df

        SHA512

        1599357cc3ff0262fc02e8456fba6275362d4e9ccafad93292f6ee4a005a06e7bb3f52aaf6b2796230a48b01f3b773dad71d71c4017fb307a13424707de2152f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488383.exe

        Filesize

        175KB

        MD5

        420f83b565f709722f2c352c7e329069

        SHA1

        43588449f59ecec6ae6cdcbcf4aebb5ae190ded8

        SHA256

        a0b0d5cd000a52074ed8da37784a6cff0dc70593f6738399d747bd6aedb2b9df

        SHA512

        1599357cc3ff0262fc02e8456fba6275362d4e9ccafad93292f6ee4a005a06e7bb3f52aaf6b2796230a48b01f3b773dad71d71c4017fb307a13424707de2152f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775490.exe

        Filesize

        558KB

        MD5

        16febc9d3b204637d790ccf9365d102e

        SHA1

        2a6914d3bade8ec74a306e1568e8ffb3ae7d206c

        SHA256

        1323c3981e3f7dd7161398e4761b9419512f9540dbd65bbf5327b391ace6502c

        SHA512

        55e074414632b563d8cc7261dcd18ebab9f6f5971900481a0807b8c98cc0a1ee7c9d570c9d0142ffa55dfe85e44c1234ea5069de5d9b314d4c02ce00dee0663f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775490.exe

        Filesize

        558KB

        MD5

        16febc9d3b204637d790ccf9365d102e

        SHA1

        2a6914d3bade8ec74a306e1568e8ffb3ae7d206c

        SHA256

        1323c3981e3f7dd7161398e4761b9419512f9540dbd65bbf5327b391ace6502c

        SHA512

        55e074414632b563d8cc7261dcd18ebab9f6f5971900481a0807b8c98cc0a1ee7c9d570c9d0142ffa55dfe85e44c1234ea5069de5d9b314d4c02ce00dee0663f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9468.exe

        Filesize

        307KB

        MD5

        b8c5f55da76fad38b1b8d0334074b9bb

        SHA1

        bb70f0e4a896c4396a8667eff38d123634b0c97c

        SHA256

        b321bb90bfd0c4032e397afa0fe8a0bb677555db957710560d3473c77748e48e

        SHA512

        5c8f0f9430e52653cc5d69d1acd9dd02f03c6325461555349d8d743078993b9cbdbc1e6a59f0fd50632a77d35ff0c1a50e571bba076cb832fc15fa84efe66bcc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9468.exe

        Filesize

        307KB

        MD5

        b8c5f55da76fad38b1b8d0334074b9bb

        SHA1

        bb70f0e4a896c4396a8667eff38d123634b0c97c

        SHA256

        b321bb90bfd0c4032e397afa0fe8a0bb677555db957710560d3473c77748e48e

        SHA512

        5c8f0f9430e52653cc5d69d1acd9dd02f03c6325461555349d8d743078993b9cbdbc1e6a59f0fd50632a77d35ff0c1a50e571bba076cb832fc15fa84efe66bcc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2117.exe

        Filesize

        365KB

        MD5

        4a5a47e06bf6918d06e5bce06d20843a

        SHA1

        1b6a93b0ec3fcfd341d6f50f86354ab1eeec5b23

        SHA256

        279d9a57ede68546177da7fbdae5fbb68dd988cff1102364faabc75d9092a9a7

        SHA512

        4696b690ad05fc6d4df24d8ca4d7247d1128dae5928ce983f5c2c15632105db4630740ee093e49f970a199debdf19847f5997060336bcb1879f7eba0510464ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2117.exe

        Filesize

        365KB

        MD5

        4a5a47e06bf6918d06e5bce06d20843a

        SHA1

        1b6a93b0ec3fcfd341d6f50f86354ab1eeec5b23

        SHA256

        279d9a57ede68546177da7fbdae5fbb68dd988cff1102364faabc75d9092a9a7

        SHA512

        4696b690ad05fc6d4df24d8ca4d7247d1128dae5928ce983f5c2c15632105db4630740ee093e49f970a199debdf19847f5997060336bcb1879f7eba0510464ac

      • memory/772-148-0x0000000004E10000-0x00000000053B4000-memory.dmp

        Filesize

        5.6MB

      • memory/772-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/772-152-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-153-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/772-151-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/772-150-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-155-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-157-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-159-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-161-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-163-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-165-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-167-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-169-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-171-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-173-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-175-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-177-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-179-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/772-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/772-181-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/772-182-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/772-183-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/772-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3548-191-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-190-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-193-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-195-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-197-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-199-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-201-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-203-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-205-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-207-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-209-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-211-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-213-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-215-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-217-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-219-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-221-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-223-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3548-229-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-227-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/3548-231-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-233-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/3548-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3548-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3548-1103-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3548-1105-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/3548-1106-0x0000000006610000-0x00000000066A2000-memory.dmp

        Filesize

        584KB

      • memory/3548-1108-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-1109-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-1110-0x0000000004B10000-0x0000000004B20000-memory.dmp

        Filesize

        64KB

      • memory/3548-1111-0x0000000006950000-0x00000000069C6000-memory.dmp

        Filesize

        472KB

      • memory/3548-1112-0x00000000069E0000-0x0000000006A30000-memory.dmp

        Filesize

        320KB

      • memory/3548-1113-0x0000000006A50000-0x0000000006C12000-memory.dmp

        Filesize

        1.8MB

      • memory/3548-1114-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/3588-1120-0x0000000000510000-0x0000000000542000-memory.dmp

        Filesize

        200KB

      • memory/3588-1121-0x00000000050F0000-0x0000000005100000-memory.dmp

        Filesize

        64KB